Falcão-Reis, Filipa; Correia, Manuel E
2010-01-01
With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.
Early Adopters: Playing New Literacies and Pretending New Technologies in Print-Centric Classrooms
ERIC Educational Resources Information Center
Wohlwend, Karen E.
2009-01-01
In this article, semiotic analysis of children's practices and designs with video game conventions considers how children use play and drawing as spatializing literacies that make room to import imagined technologies and user identities. Microanalysis of video data of classroom interactions collected during a three year ethnographic study of…
FORESEE™ User-Centric Energy Automation
DOE Office of Scientific and Technical Information (OSTI.GOV)
FORESEE™ is a home energy management system (HEMS) that provides a user centric energy automation solution for residential building occupants. Built upon advanced control and machine learning algorithms, FORESEE intelligently manages the home appliances and distributed energy resources (DERs) such as photovoltaics and battery storage in a home. Unlike existing HEMS in the market, FORESEE provides a tailored home automation solution for individual occupants by learning and adapting to their preferences on cost, comfort, convenience and carbon. FORESEE improves not only the energy efficiency of the home but also its capability to provide grid services such as demand response. Highlymore » reliable demand response services are likely to be incentivized by utility companies, making FORESEE economically viable for most homes.« less
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing
NASA Astrophysics Data System (ADS)
Xu, Shouhuai; Sandhu, Ravi; Bertino, Elisa
Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect, inappropriate, misleading, or maliciously introduced. With the advocated shift of information sharing paradigm from “need to know” to “need to share” this problem will be further compounded. This poses the challenge of achieving assured information sharing so that decision makers can always get and utilize the up-to-date information for making the right decisions, despite the existence of malicious attacks and without breaching privacy of honest participants. As a first step towards answering this challenge this paper proposes a systematic framework we call TIUPAM, which stands for “Trustworthiness-centric Identity, Usage, Provenance, and Attack Management.” The framework is centered at the need of trustworthiness and risk management for decision makers, and supported by four key components: identity management, usage management, provenance management and attack management. We explore the characterization of both the core functions and the supporting components in the TIUPAM framework, which may guide the design and realization of concrete schemes in the future.
A Cross-Layer User Centric Vertical Handover Decision Approach Based on MIH Local Triggers
NASA Astrophysics Data System (ADS)
Rehan, Maaz; Yousaf, Muhammad; Qayyum, Amir; Malik, Shahzad
Vertical handover decision algorithm that is based on user preferences and coupled with Media Independent Handover (MIH) local triggers have not been explored much in the literature. We have developed a comprehensive cross-layer solution, called Vertical Handover Decision (VHOD) approach, which consists of three parts viz. mechanism for collecting and storing user preferences, Vertical Handover Decision (VHOD) algorithm and the MIH Function (MIHF). MIHF triggers the VHOD algorithm which operates on user preferences to issue handover commands to mobility management protocol. VHOD algorithm is an MIH User and therefore needs to subscribe events and configure thresholds for receiving triggers from MIHF. In this regard, we have performed experiments in WLAN to suggest thresholds for Link Going Down trigger. We have also critically evaluated the handover decision process, proposed Just-in-time interface activation technique, compared our proposed approach with prominent user centric approaches and analyzed our approach from different aspects.
User Centric Policy Management
ERIC Educational Resources Information Center
Cheek, Gorrell P.
2013-01-01
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
A Domain Specific Modeling Approach for Coordinating User-Centric Communication Services
ERIC Educational Resources Information Center
Wu, Yali
2011-01-01
Rapid advances in electronic communication devices and technologies have resulted in a shift in the way communication applications are being developed. These new development strategies provide abstract views of the underlying communication technologies and lead to the so-called "user-centric communication applications." One user-centric…
Allowing the Advantaged User in a Network Centric System to Get Through the Disadvantaged Interface
2009-09-01
ADVANTAGED USER IN A NETWORK CENTRIC SYSTEM TO GET THROUGH THE DISADVANTAGED INTERFACE by Lawrence Brandon September 2009 Thesis Advisor...Through the Disadvantaged Interface 6. AUTHOR(S) Lawrence Brandon 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval...identify those factors that cause disadvantaged interfaces within network centric systems and provides recommendations to these challenges so that
Lin, Yu-Hsiu; Hu, Yu-Chen
2018-04-27
The emergence of smart Internet of Things (IoT) devices has highly favored the realization of smart homes in a down-stream sector of a smart grid. The underlying objective of Demand Response (DR) schemes is to actively engage customers to modify their energy consumption on domestic appliances in response to pricing signals. Domestic appliance scheduling is widely accepted as an effective mechanism to manage domestic energy consumption intelligently. Besides, to residential customers for DR implementation, maintaining a balance between energy consumption cost and users’ comfort satisfaction is a challenge. Hence, in this paper, a constrained Particle Swarm Optimization (PSO)-based residential consumer-centric load-scheduling method is proposed. The method can be further featured with edge computing. In contrast with cloud computing, edge computing—a method of optimizing cloud computing technologies by driving computing capabilities at the IoT edge of the Internet as one of the emerging trends in engineering technology—addresses bandwidth-intensive contents and latency-sensitive applications required among sensors and central data centers through data analytics at or near the source of data. A non-intrusive load-monitoring technique proposed previously is utilized to automatic determination of physical characteristics of power-intensive home appliances from users’ life patterns. The swarm intelligence, constrained PSO, is used to minimize the energy consumption cost while considering users’ comfort satisfaction for DR implementation. The residential consumer-centric load-scheduling method proposed in this paper is evaluated under real-time pricing with inclining block rates and is demonstrated in a case study. The experimentation reported in this paper shows the proposed residential consumer-centric load-scheduling method can re-shape loads by home appliances in response to DR signals. Moreover, a phenomenal reduction in peak power consumption is achieved by 13.97%.
Data Retention Policy | High-Performance Computing | NREL
HPC Data Retention Policy. File storage areas on Peregrine and Gyrfalcon are either user-centric to reclaim storage. We can make special arrangements for permanent storage, if needed. User-Centric > is 3 months after the last project ends. During this retention period, the user may log in to
FORCEnet Net Centric Architecture - A Standards View
2006-06-01
SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM DATA INTERCHANGE/INTEGRATION DATA MANAGEMENT APPLICATION...R V I C E P L A T F O R M S E R V I C E F R A M E W O R K USER-FACING SERVICES SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM...E F R A M E W O R K USER-FACING SERVICES SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM DATA INTERCHANGE/INTEGRATION
User-Centric Multi-Criteria Information Retrieval
NASA Technical Reports Server (NTRS)
Wolfe, Shawn R.; Zhang, Yi
2009-01-01
Information retrieval models usually represent content only, and not other considerations, such as authority, cost, and recency. How could multiple criteria be utilized in information retrieval, and how would it affect the results? In our experiments, using multiple user-centric criteria always produced better results than a single criteria.
User-Centric Approach for Benchmark RDF Data Generator in Big Data Performance Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purohit, Sumit; Paulson, Patrick R.; Rodriguez, Luke R.
This research focuses on user-centric approach of building such tools and proposes a flexible, extensible, and easy to use framework to support performance analysis of Big Data systems. Finally, case studies from two different domains are presented to validate the framework.
Policies | High-Performance Computing | NREL
Use Learn about policy governing user accountability, resource use, use by foreign nationals states. Data Security Learn about the data security policy, including data protection, data security retention policy, including project-centric and user-centric data. Shared Storage Usage Learn about a policy
User-centric incentive design for participatory mobile phone sensing
NASA Astrophysics Data System (ADS)
Gao, Wei; Lu, Haoyang
2014-05-01
Mobile phone sensing is a critical underpinning of pervasive mobile computing, and is one of the key factors for improving people's quality of life in modern society via collective utilization of the on-board sensing capabilities of people's smartphones. The increasing demands for sensing services and ambient awareness in mobile environments highlight the necessity of active participation of individual mobile users in sensing tasks. User incentives for such participation have been continuously offered from an application-centric perspective, i.e., as payments from the sensing server, to compensate users' sensing costs. These payments, however, are manipulated to maximize the benefits of the sensing server, ignoring the runtime flexibility and benefits of participating users. This paper presents a novel framework of user-centric incentive design, and develops a universal sensing platform which translates heterogenous sensing tasks to a generic sensing plan specifying the task-independent requirements of sensing performance. We use this sensing plan as input to reduce three categories of sensing costs, which together cover the possible sources hindering users' participation in sensing.
Network-Centric Quantum Communications
NASA Astrophysics Data System (ADS)
Hughes, Richard
2014-03-01
Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.
Understand, Identify, and Respond: The New Focus of Access Services
ERIC Educational Resources Information Center
Rodriguez, Juan Carlos; Meyer, Kristin; Merry, Brian
2017-01-01
Library public services staff have primarily focused on providing services through interactions with their users. Although service quality and customer satisfaction are important in the delivery of these services, the emphasis and nature of the work have often been influenced by a library-centric philosophy rather than a user-centric philosophy.…
ERIC Educational Resources Information Center
Shen, Yi
2016-01-01
The data landscape study at Virginia Tech addresses the changing modes of faculty scholarship and supports the development of a user-centric data infrastructure, management, and curation system. The study investigates faculty researchers' current practices in organizing, describing, and preserving data and the emerging needs for services and…
A User-Centric Adaptive Learning System for E-Learning 2.0
ERIC Educational Resources Information Center
Huang, Shiu-Li; Shiu, Jung-Hung
2012-01-01
The success of Web 2.0 inspires e-learning to evolve into e-learning 2.0, which exploits collective intelligence to achieve user-centric learning. However, searching for suitable learning paths and content for achieving a learning goal is time consuming and troublesome on e-learning 2.0 platforms. Therefore, introducing formal learning in these…
Foresee: A user-centric home energy management system for energy efficiency and demand response
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jin, Xin; Baker, Kyri A.; Christensen, Dane T.
This paper presents foresee, a user-centric home energy management system that can help optimize how a home operates to concurrently meet users' needs, achieve energy efficiency and commensurate utility cost savings, and reliably deliver grid services based on utility signals. Foresee is built on a multiobjective model predictive control framework, wherein the objectives consist of energy cost, thermal comfort, user convenience, and carbon emission. Foresee learns user preferences on different objectives and acts on their behalf to operate building equipment, such as home appliances, photovoltaic systems, and battery storage. In this work, machine-learning algorithms were used to derive data-driven appliancemore » models and usage patterns to predict the home's future energy consumption. This approach enables highly accurate predictions of comfort needs, energy costs, environmental impacts, and grid service availability. Simulation studies were performed on field data from a residential building stock data set collected in the Pacific Northwest. Results indicated that foresee generated up to 7.6% whole-home energy savings without requiring substantial behavioral changes. When responding to demand response events, foresee was able to provide load forecasts upon receipt of event notifications and delivered the committed demand response services with 10% or fewer errors. Foresee fully utilized the potential of the battery storage and controllable building loads and delivered up to 7.0-kW load reduction and 13.5-kW load increase. As a result, these benefits are provided while maintaining the occupants' thermal comfort or convenience in using their appliances.« less
Foresee: A user-centric home energy management system for energy efficiency and demand response
Jin, Xin; Baker, Kyri A.; Christensen, Dane T.; ...
2017-08-23
This paper presents foresee, a user-centric home energy management system that can help optimize how a home operates to concurrently meet users' needs, achieve energy efficiency and commensurate utility cost savings, and reliably deliver grid services based on utility signals. Foresee is built on a multiobjective model predictive control framework, wherein the objectives consist of energy cost, thermal comfort, user convenience, and carbon emission. Foresee learns user preferences on different objectives and acts on their behalf to operate building equipment, such as home appliances, photovoltaic systems, and battery storage. In this work, machine-learning algorithms were used to derive data-driven appliancemore » models and usage patterns to predict the home's future energy consumption. This approach enables highly accurate predictions of comfort needs, energy costs, environmental impacts, and grid service availability. Simulation studies were performed on field data from a residential building stock data set collected in the Pacific Northwest. Results indicated that foresee generated up to 7.6% whole-home energy savings without requiring substantial behavioral changes. When responding to demand response events, foresee was able to provide load forecasts upon receipt of event notifications and delivered the committed demand response services with 10% or fewer errors. Foresee fully utilized the potential of the battery storage and controllable building loads and delivered up to 7.0-kW load reduction and 13.5-kW load increase. As a result, these benefits are provided while maintaining the occupants' thermal comfort or convenience in using their appliances.« less
The Device Centric Communication System for 5G Networks
NASA Astrophysics Data System (ADS)
Biswash, S. K.; Jayakody, D. N. K.
2017-01-01
The Fifth Generation Communication (5G) networks have several functional features such as: Massive Multiple Input and Multiple Output (MIMO), Device centric data and voice support, Smarter-device communications, etc. The objective for 5G networks is to gain the 1000x more throughput, 10x spectral efficiency, 100 x more energy efficiency than existing technologies. The 5G system will provide the balance between the Quality of Experience (QoE) and the Quality of Service (QoS), without compromising the user benefit. The data rate has been the key metric for wireless QoS; QoE deals with the delay and throughput. In order to realize a balance between the QoS and QoE, we propose a cellular Device centric communication methodology for the overlapping network coverage area in the 5G communication system. The multiple beacon signals mobile tower refers to an overlapping network area, and a user must be forwarded to the next location area. To resolve this issue, we suggest the user centric methodology (without Base Station interface) to handover the device in the next area, until the users finalize the communication. The proposed method will reduce the signalling cost and overheads for the communication.
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.
Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2016-03-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.
Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chard, Kyle; Lidman, Mattias; McCollam, Brendan
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management
Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2015-01-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598
Distributed Architecture for the Object-Oriented Method for Interoperability
2003-03-01
Collaborative Environment. ......................121 Figure V-2. Distributed OOMI And The Collaboration Centric Paradigm. .....................123 Figure V...of systems are formed into a system federation to resolve differences in modeling. An OOMI Integrated Development Environment (OOMI IDE) lends ...space for the creation of possible distributed systems is partitioned into User Centric systems, Processing/Storage Centric systems, Implementation
NASA Astrophysics Data System (ADS)
Farroha, Bassam; Farroha, Deborah
2012-05-01
Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.
Playing It Safe: Identity Management and Single Sign-On
ERIC Educational Resources Information Center
Alawneh, John
2012-01-01
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Developing a Leadership Identity: A Grounded Theory
ERIC Educational Resources Information Center
Komives, Susan R.; Owen, Julie E; Longerbeam, Susan D.; Mainella, Felicia C.; Osteen, Laura
2005-01-01
This grounded theory study on developing a leadership identity revealed a 6-stage developmental process. The thirteen diverse students in this study described their leadership identity as moving from a leader-centric view to one that embraced leadership as a collaborative, relational process. Developing a leadership identity was connected to the…
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
NASA Astrophysics Data System (ADS)
Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes
We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.
Balancing the Needs of Personalization and Reasoning in a User-Centric Scheduling Assistant
2007-02-01
perform the diarying, either due to excessive busyness (despite the low overhead of the exercise), or because their schedules are managed by their...and existing meetings; (4) locations of meetings; (5) participants in meetings; (6) time or duration changes for existing meetings; and (7...after each change to detect conflicts and display them with suggestions for removing them. The calendaring domains allows specialized partial
Bringing Federated Identity to Grid Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Teheran, Jeny
The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less
Identity management and privacy languages technologies: Improving user control of data privacy
NASA Astrophysics Data System (ADS)
García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz
The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.
Use of Context in Video Processing
NASA Astrophysics Data System (ADS)
Wu, Chen; Aghajan, Hamid
Interpreting an event or a scene based on visual data often requires additional contextual information. Contextual information may be obtained from different sources. In this chapter, we discuss two broad categories of contextual sources: environmental context and user-centric context. Environmental context refers to information derived from domain knowledge or from concurrently sensed effects in the area of operation. User-centric context refers to information obtained and accumulated from the user. Both types of context can include static or dynamic contextual elements. Examples from a smart home environment are presented to illustrate how different types of contextual data can be applied to aid the decision-making process.
Nunes, David; Tran, Thanh-Dien; Raposo, Duarte; Pinto, André; Gomes, André; Silva, Jorge Sá
2012-01-01
As the Internet evolved, social networks (such as Facebook) have bloomed and brought together an astonishing number of users. Mashing up mobile phones and sensors with these social environments enables the creation of people-centric sensing systems which have great potential for expanding our current social networking usage. However, such systems also have many associated technical challenges, such as privacy concerns, activity detection mechanisms or intermittent connectivity, as well as limitations due to the heterogeneity of sensor nodes and networks. Considering the openness of the Web 2.0, good technical solutions for these cases consist of frameworks that expose sensing data and functionalities as common Web-Services. This paper presents our RESTful Web Service-based model for people-centric sensing frameworks, which uses sensors and mobile phones to detect users' activities and locations, sharing this information amongst the user's friends within a social networking site. We also present some screenshot results of our experimental prototype.
Beyond knowledge capture: creating useful work-centric systems
NASA Technical Reports Server (NTRS)
Cooper, L. P.; Majchrzak, A.
2001-01-01
Once you have successfully captured knowledge, the challenge then becomes one of creating an affective way to use that knowledge. Two high knowledge content systems developed at the Jet Propulsion Laboratory are presented as examples of work-centric systems, where the primary value to the user is in the content.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bradel, Lauren; Endert, Alexander; Koch, Kristen
2013-08-01
Large, high-resolution vertical displays carry the potential to increase the accuracy of collaborative sensemaking, given correctly designed visual analytics tools. From an exploratory user study using a fictional textual intelligence analysis task, we investigated how users interact with the display to construct spatial schemas and externalize information, as well as how they establish shared and private territories. We investigated the space management strategies of users partitioned by type of tool philosophy followed (visualization- or text-centric). We classified the types of territorial behavior exhibited in terms of how the users interacted with information on the display (integrated or independent workspaces). Next,more » we examined how territorial behavior impacted the common ground between the pairs of users. Finally, we offer design suggestions for building future co-located collaborative visual analytics tools specifically for use on large, high-resolution vertical displays.« less
Managing business compliance using model-driven security management
NASA Astrophysics Data System (ADS)
Lang, Ulrich; Schreiner, Rudolf
Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.
Linking User Identities Across the DataONE Federation of Data Repositories
NASA Astrophysics Data System (ADS)
Jones, M. B.; Mecum, B.; Leinfelder, B.; Jones, C. S.; Walker, L.
2016-12-01
DataONE provides services for identifying, authenticating, and authorizing researchers to access and contribute data to repositories within the DataONE federation. In the earth sciences, thousands of institutional and disciplinary repositories have created their own user identity and authentication systems with their own user directory based on a database or web content management systems. Thus, researchers have many identities that are neither linked nor interoperable, making it difficult to reference the identity of these users across systems. Key user information is hidden, and only a non-disambiguated name is often available. From a sample of 160,000 data sets within DataONE, a super-majority of references to the data creators lack even an email address. In an attempt to disambiguate these people via the GeoLink project, we conservatively estimate they represent at least 57,000 unique identities, but without a clear user identifier, there could be as many as 223,000. Interoperability among repositories is critical to improving the scope of scientific synthesis and capabilities for research collaboration. While many have focused on the convenience of Single Sign-On (SSO), we have found that sharing user identifiers is far more useful for interoperability. With an unambiguous user identity in incoming metadata, DataONE has built user-profiles that present that user's data across repositories, that link users and their organizational affiliations, and that allow users to work collaboratively in private groups that span repository systems. DataONE's user identity solution leverages existing systems such as InCommon, CILogon, Google, and ORCID to not further proliferate user identities. DataONE provides a core service allowing users to link their multiple identities so that authenticating with one identity (e.g., ORCID) can authorize access to data protected via another identity (e.g., InCommon). Currently, DataONE is using ORCID identities to link and identify users, but challenges must still be overcome to support historical records for which ORCIDs can not be used because the associated people are unavailable to confirm their identity. DataONE's identity systems facilitate crosslinking between user identities and scientific metadata to accelerate collaboration and synthesis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Chase Qishi; Zhu, Michelle Mengxia
The advent of large-scale collaborative scientific applications has demonstrated the potential for broad scientific communities to pool globally distributed resources to produce unprecedented data acquisition, movement, and analysis. System resources including supercomputers, data repositories, computing facilities, network infrastructures, storage systems, and display devices have been increasingly deployed at national laboratories and academic institutes. These resources are typically shared by large communities of users over Internet or dedicated networks and hence exhibit an inherent dynamic nature in their availability, accessibility, capacity, and stability. Scientific applications using either experimental facilities or computation-based simulations with various physical, chemical, climatic, and biological models featuremore » diverse scientific workflows as simple as linear pipelines or as complex as a directed acyclic graphs, which must be executed and supported over wide-area networks with massively distributed resources. Application users oftentimes need to manually configure their computing tasks over networks in an ad hoc manner, hence significantly limiting the productivity of scientists and constraining the utilization of resources. The success of these large-scale distributed applications requires a highly adaptive and massively scalable workflow platform that provides automated and optimized computing and networking services. This project is to design and develop a generic Scientific Workflow Automation and Management Platform (SWAMP), which contains a web-based user interface specially tailored for a target application, a set of user libraries, and several easy-to-use computing and networking toolkits for application scientists to conveniently assemble, execute, monitor, and control complex computing workflows in heterogeneous high-performance network environments. SWAMP will enable the automation and management of the entire process of scientific workflows with the convenience of a few mouse clicks while hiding the implementation and technical details from end users. Particularly, we will consider two types of applications with distinct performance requirements: data-centric and service-centric applications. For data-centric applications, the main workflow task involves large-volume data generation, catalog, storage, and movement typically from supercomputers or experimental facilities to a team of geographically distributed users; while for service-centric applications, the main focus of workflow is on data archiving, preprocessing, filtering, synthesis, visualization, and other application-specific analysis. We will conduct a comprehensive comparison of existing workflow systems and choose the best suited one with open-source code, a flexible system structure, and a large user base as the starting point for our development. Based on the chosen system, we will develop and integrate new components including a black box design of computing modules, performance monitoring and prediction, and workflow optimization and reconfiguration, which are missing from existing workflow systems. A modular design for separating specification, execution, and monitoring aspects will be adopted to establish a common generic infrastructure suited for a wide spectrum of science applications. We will further design and develop efficient workflow mapping and scheduling algorithms to optimize the workflow performance in terms of minimum end-to-end delay, maximum frame rate, and highest reliability. We will develop and demonstrate the SWAMP system in a local environment, the grid network, and the 100Gpbs Advanced Network Initiative (ANI) testbed. The demonstration will target scientific applications in climate modeling and high energy physics and the functions to be demonstrated include workflow deployment, execution, steering, and reconfiguration. Throughout the project period, we will work closely with the science communities in the fields of climate modeling and high energy physics including Spallation Neutron Source (SNS) and Large Hadron Collider (LHC) projects to mature the system for production use.« less
Integrated Approach to User Account Management
NASA Technical Reports Server (NTRS)
Kesselman, Glenn; Smith, William
2007-01-01
IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly diffi cult. If Microsoft#s Active Directory could be enhanced to extend a W indows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account manag ement could be realized.
Paladin Integrated Management (PIM)
2015-12-01
Strategy and Net- Centric Services Strategy, and the principles and rules identified in the DoD lEA, excepting tactical and non-IP communications 3...with Net-Centric Data Strategy and Net- Centric Services Strategy, and the principles and rules identified in the DoD lEA, excepting tactical and...effective information exchanges 2) Compliant with Net-Centric Data Strategy and Net-Centric Services Strategy, and the principles and rules
Signature scheme based on bilinear pairs
NASA Astrophysics Data System (ADS)
Tong, Rui Y.; Geng, Yong J.
2013-03-01
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
Multi-centric universal pseudonymisation for secondary use of the EHR.
Lo Iacono, Luigi
2007-01-01
This paper discusses the importance of protecting the privacy of patient data kept in an Electronic Health Record (EHR) in the case, where it leaves the control- and protection-sphere of the health care realm for secondary uses such as clinical or epidemiological research projects, health care research, assessment of treatment quality or economic assessments. The paper focuses on multi-centric studies, where various data sources are linked together using Grid technologies. It introduces a pseudonymisation system which enables a multi-centric universal pseudonymisation, meaning that a patient's identity will result in the same pseudonym, regardless of which participating study center the patient data is collected.
Learning To Live with Complexity.
ERIC Educational Resources Information Center
Dosa, Marta
Neither the design of information systems and networks nor the delivery of library services can claim true user centricity without an understanding of the multifaceted psychological environment of users and potential users. The complexity of the political process, social problems, challenges to scientific inquiry, entrepreneurship, and…
77 FR 13337 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
... ``Part B'' of the QualityNet Identity Management System Account Form (CMS-10267; OCN: 0938-1050). Once the ESRD System Access Form is approved, the QualityNet Identity Management System (QIMS) Account Form... the ESRD systems through the creation of user IDs and passwords within the QualityNet Identity...
NASA Astrophysics Data System (ADS)
Sova, Milan
Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures. The system uses identity management systems (IdMS) at participating institutions to perform the functions of registration authorities. The certificate enrollment application acts as a SAML Service Provider relying on information provided by IdMS performing as SAML Identity Providers (IdP). When applying for a personal certificate, users authenticate at their home IdP using credentials they normally use to access local services. The IdP controls the certificate issuance process by releasing SAML attributes specifying the user's eligibility for the service and the information to be included in the certificate such as the user's name and email address. The TCS eScience Personal CA is part of the TERENA Certificate Service that uses a commercial PKI provider. Outsourcing the actual CA machinery to a specialized company results in professional-level services such as CRL and OCSP management. The paper describes the legal, organizational and technical aspects of the TCS eScience PKI.
Intelligence Authorization Legislation: Status and Challenges
2012-09-18
foundation of shared services , mission-centric operations, and integrated mission management.”14 In addition to well known threats from terrorist groups and...centric practices to “a true Intelligence enterprise established on a collaborative foundation of shared services , mission-centric operations, and
Achieving Privacy in a Federated Identity Management System
NASA Astrophysics Data System (ADS)
Landau, Susan; Le van Gong, Hubert; Wilton, Robin
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.
User Centric Job Monitoring - a redesign and novel approach in the STAR experiment
NASA Astrophysics Data System (ADS)
Arkhipkin, D.; Lauret, J.; Zulkarneeva, Y.
2014-06-01
User Centric Monitoring (or UCM) has been a long awaited feature in STAR, whereas programs, workflows and system "events" could be logged, broadcast and later analyzed. UCM allows to collect and filter available job monitoring information from various resources and present it to users in a user-centric view rather than an administrative-centric point of view. The first attempt and implementation of "a" UCM approach was made in STAR 2004 using a log4cxx plug-in back-end and then further evolved with an attempt to push toward a scalable database back-end (2006) and finally using a Web-Service approach (2010, CSW4DB SBIR). The latest showed to be incomplete and not addressing the evolving needs of the experiment where streamlined messages for online (data acquisition) purposes as well as the continuous support for the data mining needs and event analysis need to coexists and unified in a seamless approach. The code also revealed to be hardly maintainable. This paper presents the next evolutionary step of the UCM toolkit, a redesign and redirection of our latest attempt acknowledging and integrating recent technologies and a simpler, maintainable and yet scalable manner. The extended version of the job logging package is built upon three-tier approach based on Task, Job and Event, and features a Web-Service based logging API, a responsive AJAX-powered user interface, and a database back-end relying on MongoDB, which is uniquely suited for STAR needs. In addition, we present details of integration of this logging package with the STAR offline and online software frameworks. Leveraging on the reported experience and work from the ATLAS and CMS experience on using the ESPER engine, we discuss and show how such approach has been implemented in STAR for meta-data event triggering stream processing and filtering. An ESPER based solution seems to fit well into the online data acquisition system where many systems are monitored.
What Is an Activity? Appropriating an Activity-Centric System
NASA Astrophysics Data System (ADS)
Yarosh, Svetlana; Matthews, Tara; Moran, Thomas P.; Smith, Barton
Activity-Centric Computing (ACC) systems seek to address the fragmentation of office work across tools and documents by allowing users to organize work around the computational construct of an Activity. Defining and structuring appropriate Activities within a system poses a challenge for users that must be overcome in order to benefit from ACC support. We know little about how knowledge workers appropriate the Activity construct. To address this, we studied users’ appropriation of a production-quality ACC system, Lotus Activities, for everyday work by employees in a large corporation. We contribute to a better understanding of how users articulate their individual and collaborative work in the system by providing empirical evidence of their patterns of appropriation. We conclude by discussing how our findings can inform the design of other ACC systems for the workplace.
NeuroLOG: a community-driven middleware design.
Montagnat, Johan; Gaignard, Alban; Lingrand, Diane; Rojas Balderrama, Javier; Collet, Philippe; Lahire, Philippe
2008-01-01
The NeuroLOG project designs an ambitious neurosciences middleware, gaining from many existing components and learning from past project experiences. It is targeting a focused application area and adopting a user-centric perspective to meet the neuroscientists expectations. It aims at fostering the adoption of HealthGrids in a pre-clinical community. This paper details the project's design study and methodology which were proposed to achieve the integration of heterogeneous site data schemas and the definition of a site-centric policy. The NeuroLOG middleware will bridge HealthGrid and local resources to match user desires to control their resources and provide a transitional model towards HealthGrids.
Multiple use management preferences by visitors with differing leisure identity salience
Ingrid E. Schneider; Patricia B. Winter
1998-01-01
Multiple use area management is of particular interest to both outdoor and urban planners due to an increase in and diversity of users. These areas pose special management challenges due to the diverse and potential conflicting interests involved. Diverse users are frequently excluded from management decisions, however. Further, when visitor input is solicited, it is...
Algorithm and Architecture Independent Benchmarking with SEAK
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tallent, Nathan R.; Manzano Franco, Joseph B.; Gawande, Nitin A.
2016-05-23
Many applications of high performance embedded computing are limited by performance or power bottlenecks. We have designed the Suite for Embedded Applications & Kernels (SEAK), a new benchmark suite, (a) to capture these bottlenecks in a way that encourages creative solutions; and (b) to facilitate rigorous, objective, end-user evaluation for their solutions. To avoid biasing solutions toward existing algorithms, SEAK benchmarks use a mission-centric (abstracted from a particular algorithm) and goal-oriented (functional) specification. To encourage solutions that are any combination of software or hardware, we use an end-user black-box evaluation that can capture tradeoffs between performance, power, accuracy, size, andmore » weight. The tradeoffs are especially informative for procurement decisions. We call our benchmarks future proof because each mission-centric interface and evaluation remains useful despite shifting algorithmic preferences. It is challenging to create both concise and precise goal-oriented specifications for mission-centric problems. This paper describes the SEAK benchmark suite and presents an evaluation of sample solutions that highlights power and performance tradeoffs.« less
The Suite for Embedded Applications and Kernels
DOE Office of Scientific and Technical Information (OSTI.GOV)
2016-05-10
Many applications of high performance embedded computing are limited by performance or power bottlenecks. We havedesigned SEAK, a new benchmark suite, (a) to capture these bottlenecks in a way that encourages creative solutions to these bottlenecks? and (b) to facilitate rigorous, objective, end-user evaluation for their solutions. To avoid biasing solutions toward existing algorithms, SEAK benchmarks use a mission-centric (abstracted from a particular algorithm) andgoal-oriented (functional) specification. To encourage solutions that are any combination of software or hardware, we use an end-user blackbox evaluation that can capture tradeoffs between performance, power, accuracy, size, and weight. The tradeoffs are especially informativemore » for procurement decisions. We call our benchmarks future proof because each mission-centric interface and evaluation remains useful despite shifting algorithmic preferences. It is challenging to create both concise and precise goal-oriented specifications for mission-centric problems. This paper describes the SEAK benchmark suite and presents an evaluation of sample solutions that highlights power and performance tradeoffs.« less
User-Centric Secure Cross-Site Interaction Framework for Online Social Networking Services
ERIC Educational Resources Information Center
Ko, Moo Nam
2011-01-01
Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited within the same social networking site. Although users can share some content on a social networking site…
NASA Astrophysics Data System (ADS)
Kil, Namyun; Holland, Stephen M.; Stein, Taylor V.
2012-09-01
Off-highway vehicle (OHV) riding is among the fastest growing recreational activities in the United States. However, little research exists about the central components of outcomes-focused management (OFM) as it relates to motorized recreation. Utilizing a two-activity dichotomy, OHV and non-OHV centric user groups were compared on several key concepts associated with OFM, including desired experiences, perceived and desired recreation opportunity spectrum-type settings, and intentional behaviors (i.e., place-protective behavior, spending-time intentions) toward potential changes in settings. Results indicated that the two groups were different in terms of intensity and relative rankings of their perceived experiences and settings. Although both groups preferred social bonding, stress relief, nostalgia and learning experiences, the OHV user group ranked using equipment and achieving physical fitness experiences as more important than the non-OHV group. The non-OHV user group preferred enjoying nature and solitude/tranquility experiences more strongly than the OHV user group. Further analysis found that both groups perceived settings that they recreated in to be pristine and preferred such conditions, and both groups preferred moderate levels of rules and regulations. Finally, the OHV user group was more reactive to rules and regulations, while the non-OHV user group expressed stronger intentions to protect the environmental quality of recreation areas. The results suggest that planners and managers who understand OHV user's perceptions and behaviors could provide enhanced recreation opportunities potentially providing additional beneficial outcomes for motorized and non-motorized groups in spatially different zones. Additional implications for planners and managers and future studies are discussed.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.
Agile IT: Thinking in User-Centric Models
NASA Astrophysics Data System (ADS)
Margaria, Tiziana; Steffen, Bernhard
We advocate a new teaching direction for modern CS curricula: extreme model-driven development (XMDD), a new development paradigm designed to continuously involve the customer/application expert throughout the whole systems' life cycle. Based on the `One-Thing Approach', which works by successively enriching and refining one single artifact, system development becomes in essence a user-centric orchestration of intuitive service functionality. XMDD differs radically from classical software development, which, in our opinion is no longer adequate for the bulk of application programming - in particular when it comes to heterogeneous, cross organizational systems which must adapt to rapidly changing market requirements. Thus there is a need for new curricula addressing this model-driven, lightweight, and cooperative development paradigm that puts the user process in the center of the development and the application expert in control of the process evolution.
Carriere, Rachel M; Kaplan, Samantha Jan
2017-01-01
Background Body listening, described as the act of paying attention to the body’s signals and cues, can be an important component of long-term health management. Objective The aim of this study was to introduce and evaluate the Body Listening Project, an innovative effort to engage the public in the creation of a public resource—to leverage collective wisdom in the health domain. This project involved a website where people could contribute their experiences of and dialogue with others concerning body listening and self-management. This article presents an analysis of the tags contributed, with a focus on the value of these tags for knowledge organization and incorporation into consumer-friendly health information retrieval systems. Methods First, we performed content analysis of the tags contributed, identifying a set of categories and refining the relational structure of the categories to develop a preliminary classification scheme, the Body Listening and Self-Management Taxonomy. Second, we compared the concepts in the Body Listening and Self-Management Taxonomy with concepts that were automatically identified from an extant health knowledge resource, the Unified Medical Language System (UMLS), to better characterize the information that participants contributed. Third, we employed visualization techniques to explore the concept space of the tags. A correlation matrix, based on the extent to which categories tended to be assigned to the same tags, was used to study the interrelatedness of the taxonomy categories. Then a network visualization was used to investigate structural relationships among the categories in the taxonomy. Results First, we proposed a taxonomy called the Body Listening and Self-Management Taxonomy, with four meta-level categories: (1) health management strategies, (2) concepts and states, (3) influencers, and (4) health-related information behavior. This taxonomy could inform future efforts to organize knowledge and content of this subject matter. Second, we compared the categories from this taxonomy with the UMLS concepts that were identified. Though the UMLS offers benefits such as speed and breadth of coverage, the Body Listening and Self-Management Taxonomy is more consumer-centric. Third, the correlation matrix and network visualization demonstrated that there are natural areas of ambiguity and semantic relatedness in the meanings of the concepts in the Body Listening and Self-Management Taxonomy. Use of these visualizations can be helpful in practice settings, to help library and information science practitioners understand and resolve potential challenges in classification; in research, to characterize the structure of the conceptual space of health management; and in the development of consumer-centric health information retrieval systems. Conclusions A participatory platform can be employed to collect data concerning patient experiences of health management, which can in turn be used to develop new health knowledge resources or augment existing ones, as well as be incorporated into consumer-centric health information systems. PMID:28882809
Chen, Annie T; Carriere, Rachel M; Kaplan, Samantha Jan
2017-09-07
Body listening, described as the act of paying attention to the body's signals and cues, can be an important component of long-term health management. The aim of this study was to introduce and evaluate the Body Listening Project, an innovative effort to engage the public in the creation of a public resource-to leverage collective wisdom in the health domain. This project involved a website where people could contribute their experiences of and dialogue with others concerning body listening and self-management. This article presents an analysis of the tags contributed, with a focus on the value of these tags for knowledge organization and incorporation into consumer-friendly health information retrieval systems. First, we performed content analysis of the tags contributed, identifying a set of categories and refining the relational structure of the categories to develop a preliminary classification scheme, the Body Listening and Self-Management Taxonomy. Second, we compared the concepts in the Body Listening and Self-Management Taxonomy with concepts that were automatically identified from an extant health knowledge resource, the Unified Medical Language System (UMLS), to better characterize the information that participants contributed. Third, we employed visualization techniques to explore the concept space of the tags. A correlation matrix, based on the extent to which categories tended to be assigned to the same tags, was used to study the interrelatedness of the taxonomy categories. Then a network visualization was used to investigate structural relationships among the categories in the taxonomy. First, we proposed a taxonomy called the Body Listening and Self-Management Taxonomy, with four meta-level categories: (1) health management strategies, (2) concepts and states, (3) influencers, and (4) health-related information behavior. This taxonomy could inform future efforts to organize knowledge and content of this subject matter. Second, we compared the categories from this taxonomy with the UMLS concepts that were identified. Though the UMLS offers benefits such as speed and breadth of coverage, the Body Listening and Self-Management Taxonomy is more consumer-centric. Third, the correlation matrix and network visualization demonstrated that there are natural areas of ambiguity and semantic relatedness in the meanings of the concepts in the Body Listening and Self-Management Taxonomy. Use of these visualizations can be helpful in practice settings, to help library and information science practitioners understand and resolve potential challenges in classification; in research, to characterize the structure of the conceptual space of health management; and in the development of consumer-centric health information retrieval systems. A participatory platform can be employed to collect data concerning patient experiences of health management, which can in turn be used to develop new health knowledge resources or augment existing ones, as well as be incorporated into consumer-centric health information systems. ©Annie T Chen, Rachel M Carriere, Samantha Jan Kaplan. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 07.09.2017.
Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules.
Barsocchi, Paolo; Calabrò, Antonello; Ferro, Erina; Gennaro, Claudio; Marchetti, Eda; Vairo, Claudio
2018-06-08
Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used to recognize and track the activities that people perform during the day, and to allow communication and cooperation of physical objects. Usually, the available infrastructures and applications leveraging these smart environments have a critical impact on the overall cost of the Smart Home construction, require to be preferably installed during the home construction and are still not user-centric. In this paper, we propose a low cost, easy to install, user-friendly, dynamic and flexible infrastructure able to perform runtime resources management by decoupling the different levels of control rules. The basic idea relies on the usage of off-the-shelf sensors and technologies to guarantee the regular exchange of critical information, without the necessity from the user to develop accurate models for managing resources or regulating their access/usage. This allows us to simplify the continuous updating and improvement, to reduce the maintenance effort and to improve residents’ living and security. A first validation of the proposed infrastructure on a case study is also presented.
ERIC Educational Resources Information Center
Shoham, Idan
2011-01-01
An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…
Military clouds: utilization of cloud computing systems at the battlefield
NASA Astrophysics Data System (ADS)
Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai
2012-05-01
Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.
Radcliffe, Polly; Stevens, Alex
2008-10-01
This article uses qualitative interviews with 53 problematic drug users who had dropped out of treatment in England, UK to explore how they describe the stigmatisation of drug users and drug services. It discusses the construction of the category of the junkie through its association with un-controlled heroin use and criminality. It shows how some drug users carefully manage information about their discreditable identities by excluding themselves from this category, while acknowledging its validity for other drug users. The junkie identity was generally seen as shameful and therefore to be avoided, although it holds attractions for some drug users. For many of the interviewees, entry to treatment risked exposing their own activities as shaming, as they saw treatment as being a place that was populated by junkies and where it becomes more difficult to manage discreditable information. The treatment regime, e.g. the routine of supervised consumption of methadone, was itself seen by some as stigmatising and was also seen as hindering progress to the desired 'normal' life of conventional employment. Participation in the community of users of both drugs and drug services was perceived as potentially damaging to the prospects of recovery. This emphasises the importance of social capital, including links to people and opportunities outside the drug market. It also highlights the danger that using the criminal justice system to concentrate prolific offenders in treatment may have the perverse effects of excluding other people who have drug problems and of prolonging the performance of the junkie identity within treatment services. It is concluded that treatment agencies should address these issues, including through the provision of more drug services in mainstream settings, in order to ensure that drug services are not seen to be suitable only for one particularly stigmatised category of drug user.
Herbert E. Echelberger; George H. Moeller
1977-01-01
Management of backcountry recreation areas in the eastern United States should be based in part on information about the identity of backcountry users and what they seek in their backcountry experiences. Because little of this kind of information is now available, managers may be adopting some strategies with inadequate knowledge of the consequences of their decisions...
An Analysis of Factors that Inhibit Business Use of User-Centered Design Principles: A Delphi Study
ERIC Educational Resources Information Center
Hilton, Tod M.
2010-01-01
The use of user-centered design (UCD) principles has a positive impact on the use of web-based interactive systems in customer-centric organizations. User-centered design methodologies are not widely adopted in organizations due to intraorganizational factors. A qualitative study using a modified Delphi technique was used to identify the factors…
A Cloud Computing Based Patient Centric Medical Information System
NASA Astrophysics Data System (ADS)
Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko
This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olson, Jarrod; Barr, Jonathan L.; Burtner, Edwin R.
A key challenge for research roadmapping in the crisis response and management domain is articulation of a shared vision that describes what the future can and should include. Visioning allows for far-reaching stakeholder engagement that can properly align research with stakeholders needs. Engagement includes feedback from researchers, policy makers, general public, and end-users on technical and non-technical factors. This work articulates a process and framework for the construction and maintenance of a stakeholder-centric research vision and roadmap in the emergency management domain. This novel roadmapping process integrates three pieces: analysis of the research and technology landscape, visioning, and stakeholder engagement.more » Our structured engagement process elicits research foci for the roadmap based on relevance to stakeholder mission, identifies collaborators, and builds consensus around the roadmap priorities. We find that the vision process and vision storyboard helps SMEs conceptualize and discuss a technology's strengths, weaknesses, and alignment with needs« less
ERIC Educational Resources Information Center
Medini, Khaled
2018-01-01
The increase of individualised customer demands and tough competition in the manufacturing sector gave rise to more customer-centric operations management such as products and services (mass) customisation. Mass customisation (MC), which inherits the "economy of scale" from mass production (MP), aims to meet specific customer demands…
ERIC Educational Resources Information Center
Wu, Huijuan
2013-01-01
Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…
Adams, Damian H
2013-10-01
Since its inception, donor conception practices have been a reproductive choice for the infertile. Past and current practices have the potential to cause significant and lifelong harm to the offspring through loss of kinship, heritage, identity, and family health history, and possibly through introducing physical problems. Legislation and regulation in Australia that specifies that the welfare of the child born as a consequence of donor conception is paramount may therefore be in conflict with the outcomes. Altering the paradigm to a child-centric model, however, impinges on reproductive choice and rights of adults involved in the process. With some lobby groups pushing for increased reproductive choice while others emphasise offspring rights there is a dichotomy of interests that society and legislators need to address. Concepts pertaining to a shift toward a child-centric paradigm are discussed.
Development of Gene Centric Modeling for Nutrient Cycling
opportunity to participate in the development of a gene-centric model to help predict potential changes in the biogeochemistry of aquatic ecosystems that may arise from anthropogenic stressors and management decisions
Open Targets: a platform for therapeutic target identification and validation
Koscielny, Gautier; An, Peter; Carvalho-Silva, Denise; Cham, Jennifer A.; Fumis, Luca; Gasparyan, Rippa; Hasan, Samiul; Karamanis, Nikiforos; Maguire, Michael; Papa, Eliseo; Pierleoni, Andrea; Pignatelli, Miguel; Platt, Theo; Rowland, Francis; Wankar, Priyanka; Bento, A. Patrícia; Burdett, Tony; Fabregat, Antonio; Forbes, Simon; Gaulton, Anna; Gonzalez, Cristina Yenyxe; Hermjakob, Henning; Hersey, Anne; Jupe, Steven; Kafkas, Şenay; Keays, Maria; Leroy, Catherine; Lopez, Francisco-Javier; Magarinos, Maria Paula; Malone, James; McEntyre, Johanna; Munoz-Pomer Fuentes, Alfonso; O'Donovan, Claire; Papatheodorou, Irene; Parkinson, Helen; Palka, Barbara; Paschall, Justin; Petryszak, Robert; Pratanwanich, Naruemon; Sarntivijal, Sirarat; Saunders, Gary; Sidiropoulos, Konstantinos; Smith, Thomas; Sondka, Zbyslaw; Stegle, Oliver; Tang, Y. Amy; Turner, Edward; Vaughan, Brendan; Vrousgou, Olga; Watkins, Xavier; Martin, Maria-Jesus; Sanseau, Philippe; Vamathevan, Jessica; Birney, Ewan; Barrett, Jeffrey; Dunham, Ian
2017-01-01
We have designed and developed a data integration and visualization platform that provides evidence about the association of known and potential drug targets with diseases. The platform is designed to support identification and prioritization of biological targets for follow-up. Each drug target is linked to a disease using integrated genome-wide data from a broad range of data sources. The platform provides either a target-centric workflow to identify diseases that may be associated with a specific target, or a disease-centric workflow to identify targets that may be associated with a specific disease. Users can easily transition between these target- and disease-centric workflows. The Open Targets Validation Platform is accessible at https://www.targetvalidation.org. PMID:27899665
The Defense Science Board Task Force on Tactical Battlefield Communications
1999-12-01
impact of the system is clearly under appreciated. It could be the foundation for a common- user , QoS, Internet and could integrate legacy systems...into a common- user framework as is occurring in the private sector. Unfortunately, the networking aspects of the system are being lost; the focus...system-centric framework to a common- user , internetwork framework . Recommendation V—Information Security
Automatic and user-centric approaches to video summary evaluation
NASA Astrophysics Data System (ADS)
Taskiran, Cuneyt M.; Bentley, Frank
2007-01-01
Automatic video summarization has become an active research topic in content-based video processing. However, not much emphasis has been placed on developing rigorous summary evaluation methods and developing summarization systems based on a clear understanding of user needs, obtained through user centered design. In this paper we address these two topics and propose an automatic video summary evaluation algorithm adapted from teh text summarization domain.
Technologies for network-centric C4ISR
NASA Astrophysics Data System (ADS)
Dunkelberger, Kirk A.
2003-07-01
Three technologies form the heart of any network-centric command, control, communication, intelligence, surveillance, and reconnaissance (C4ISR) system: distributed processing, reconfigurable networking, and distributed resource management. Distributed processing, enabled by automated federation, mobile code, intelligent process allocation, dynamic multiprocessing groups, check pointing, and other capabilities creates a virtual peer-to-peer computing network across the force. Reconfigurable networking, consisting of content-based information exchange, dynamic ad-hoc routing, information operations (perception management) and other component technologies forms the interconnect fabric for fault tolerant inter processor and node communication. Distributed resource management, which provides the means for distributed cooperative sensor management, foe sensor utilization, opportunistic collection, symbiotic inductive/deductive reasoning and other applications provides the canonical algorithms for network-centric enterprises and warfare. This paper introduces these three core technologies and briefly discusses a sampling of their component technologies and their individual contributions to network-centric enterprises and warfare. Based on the implied requirements, two new algorithms are defined and characterized which provide critical building blocks for network centricity: distributed asynchronous auctioning and predictive dynamic source routing. The first provides a reliable, efficient, effective approach for near-optimal assignment problems; the algorithm has been demonstrated to be a viable implementation for ad-hoc command and control, object/sensor pairing, and weapon/target assignment. The second is founded on traditional dynamic source routing (from mobile ad-hoc networking), but leverages the results of ad-hoc command and control (from the contributed auctioning algorithm) into significant increases in connection reliability through forward prediction. Emphasis is placed on the advantages gained from the closed-loop interaction of the multiple technologies in the network-centric application environment.
NASA Astrophysics Data System (ADS)
Zhu, Lijuan; Liu, Jingao
2013-07-01
This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.
gLExec and MyProxy integration in the ATLAS/OSG PanDA workload management system
NASA Astrophysics Data System (ADS)
Caballero, J.; Hover, J.; Litmaath, M.; Maeno, T.; Nilsson, P.; Potekhin, M.; Wenaus, T.; Zhao, X.
2010-04-01
Worker nodes on the grid exhibit great diversity, making it difficult to offer uniform processing resources. A pilot job architecture, which probes the environment on the remote worker node before pulling down a payload job, can help. Pilot jobs become smart wrappers, preparing an appropriate environment for job execution and providing logging and monitoring capabilities. PanDA (Production and Distributed Analysis), an ATLAS and OSG workload management system, follows this design. However, in the simplest (and most efficient) pilot submission approach of identical pilots carrying the same identifying grid proxy, end-user accounting by the site can only be done with application-level information (PanDA maintains its own end-user accounting), and end-user jobs run with the identity and privileges of the proxy carried by the pilots, which may be seen as a security risk. To address these issues, we have enabled PanDA to use gLExec, a tool provided by EGEE which runs payload jobs under an end-user's identity. End-user proxies are pre-staged in a credential caching service, MyProxy, and the information needed by the pilots to access them is stored in the PanDA DB. gLExec then extracts from the user's proxy the proper identity under which to run. We describe the deployment, installation, and configuration of gLExec, and how PanDA components have been augmented to use it. We describe how difficulties were overcome, and how security risks have been mitigated. Results are presented from OSG and EGEE Grid environments performing ATLAS analysis using PanDA and gLExec.
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
RCAS: an RNA centric annotation system for transcriptome-wide regions of interest.
Uyar, Bora; Yusuf, Dilmurat; Wurmus, Ricardo; Rajewsky, Nikolaus; Ohler, Uwe; Akalin, Altuna
2017-06-02
In the field of RNA, the technologies for studying the transcriptome have created a tremendous potential for deciphering the puzzles of the RNA biology. Along with the excitement, the unprecedented volume of RNA related omics data is creating great challenges in bioinformatics analyses. Here, we present the RNA Centric Annotation System (RCAS), an R package, which is designed to ease the process of creating gene-centric annotations and analysis for the genomic regions of interest obtained from various RNA-based omics technologies. The design of RCAS is modular, which enables flexible usage and convenient integration with other bioinformatics workflows. RCAS is an R/Bioconductor package but we also created graphical user interfaces including a Galaxy wrapper and a stand-alone web service. The application of RCAS on published datasets shows that RCAS is not only able to reproduce published findings but also helps generate novel knowledge and hypotheses. The meta-gene profiles, gene-centric annotation, motif analysis and gene-set analysis provided by RCAS provide contextual knowledge which is necessary for understanding the functional aspects of different biological events that involve RNAs. In addition, the array of different interfaces and deployment options adds the convenience of use for different levels of users. RCAS is available at http://bioconductor.org/packages/release/bioc/html/RCAS.html and http://rcas.mdc-berlin.de. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.
A Federated Digital Identity Management Approach for Business Processes
NASA Astrophysics Data System (ADS)
Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.
Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.
NASA Astrophysics Data System (ADS)
Yang, Liang-Chih; Lu, Hsi-Peng
This paper depicts a longitudinal investigation of knowledge management system development from industrial perspectives. Snapshots on three surveys (2002, 2006, and 2010) of Taiwanese companies were conducted and compared, which is to explore the perceived understandings and requirements for the applications of a knowledge management system.From the surveys, it was found that the most useful applications were document management, knowledge search and retrieval, and knowledge repository and map. The emerging applications were expert management, document security, and knowledge automation such as auto-classification, auto-abstract and auto-keyword generation. The most wanted services along with KMS were consulting service, success story-sharing, and modularization while deploying knowledge management system in the enterprises. The trends and transformation of a KM system were also collected and analyzed. We suggest that a company should use different knowledge management approach according to its corporate main business function. Combing intellectual capital theories proposed by other researchers, we categorize knowledge management focus as staff-centric, system-centric, and customer-centric knowledge from industrial perspectives.
5G: rethink mobile communications for 2020+.
Chih-Lin, I; Han, Shuangfeng; Xu, Zhikun; Sun, Qi; Pan, Zhengang
2016-03-06
The 5G network is anticipated to meet the challenging requirements of mobile traffic in the 2020s, which are characterized by super high data rate, low latency, high mobility, high energy efficiency and high traffic density. This paper provides an overview of China Mobile's 5G vision and potential solutions. Three key characteristics of 5G are analysed, i.e. super fast, soft and green. The main 5G R&D themes are further elaborated, which include five fundamental rethinkings of the traditional design methodologies. The 5G network design considerations are also discussed, with cloud radio access network, ultra-dense network, software defined network and network function virtualization examined as key potential solutions towards a green and soft 5G network. The paradigm shift to user-centric network operation from the traditional cell-centric operation is also investigated, where the decoupled downlink and uplink, control and data, and adaptive multiple connections provide sufficient means to achieve a user-centric 5G network with 'no more cells'. The software defined air interface is investigated under a uniform framework and can adaptively adapt the parameters to well satisfy various requirements in different 5G scenarios. © 2016 The Author(s).
Defining Patient Centric Pharmaceutical Drug Product Design.
Stegemann, Sven; Ternik, Robert L; Onder, Graziano; Khan, Mansoor A; van Riet-Nales, Diana A
2016-09-01
The term "patient centered," "patient centric," or "patient centricity" is increasingly used in the scientific literature in a wide variety of contexts. Generally, patient centric medicines are recognized as an essential contributor to healthy aging and the overall patient's quality of life and life expectancy. Besides the selection of the appropriate type of drug substance and strength for a particular indication in a particular patient, due attention must be paid that the pharmaceutical drug product design is also adequately addressing the particular patient's needs, i.e., assuring adequate patient adherence and the anticipate drug safety and effectiveness. Relevant pharmaceutical design aspects may e.g., involve the selection of the route of administration, the tablet size and shape, the ease of opening the package, the ability to read the user instruction, or the ability to follow the recommended (in-use) storage conditions. Currently, a harmonized definition on patient centric drug development/design has not yet been established. To stimulate scientific research and discussions and the consistent interpretation of test results, it is essential that such a definition is established. We have developed a first draft definition through various rounds of discussions within an interdisciplinary AAPS focus group of experts. This publication summarizes the outcomes and is intended to stimulate further discussions with all stakeholders towards a common definition of patient centric pharmaceutical drug product design that is useable across all disciplines involved.
Net-Centric Warfare 2.0: Cloud Computing and the New Age of War
2009-02-01
Ellyssa Kroski, author of The Hive Mind: Folksonomies and User-based Tagging, writes: “With the advent of social software and Web 2.0, we usher in a new... Folksonomies and User-Based Tagging, (2007), http://infotangle.blogsome. com/2005/12/07/the-hive-mind- folksonomies -and-user-based-tagging/. 45 Office...www.govexec.com/dailyfed/1007/101007cdam1.htm (accessed February 4, 2009). Kroski, Ellyssa. "The Hive Mind: Folksonomies and User-Based Tagging
Of What Benefit and to Whom? Linking Australian Humanities Research with Its "End Users"
ERIC Educational Resources Information Center
Pitman, Tim; Berman, Judith E.
2009-01-01
There is increasing pressure for university researchers to secure "end-user" support for their research projects. Yet the ways in which this imperative affects humanities researchers, operating in a science-centric funding environment, have not yet been fully explored. This paper presents the findings of an empirical study into the…
Information architecture for a patient-specific dashboard in head and neck tumor boards.
Oeser, Alexander; Gaebel, Jan; Dietz, Andreas; Wiegand, Susanne; Oeltze-Jafra, Steffen
2018-03-28
Overcoming the flaws of current data management conditions in head and neck oncology could enable integrated information systems specifically tailored to the needs of medical experts in a tumor board meeting. Clinical dashboards are a promising method to assist various aspects of the decision-making process in such cognitively demanding scenarios. However, in order to provide extensive and intuitive assistance to the participating physicians, the design and development of such a system have to be user-centric. To accomplish this task, conceptual methods need to be performed prior to the technical development and integration stages. We have conducted a qualitative survey including eight clinical experts with different levels of expertise in the field of head and neck oncology. According to the principles of information architecture, the survey focused on the identification and causal interconnection of necessary metrics for information assessment in the tumor board. Based on the feedback by the clinical experts, we have constructed a detailed map of the required information items for a tumor board dashboard in head and neck oncology. Furthermore, we have identified three distinct groups of metrics (patient, disease and therapy metrics) as well as specific recommendations for their structural and graphical implementation. By using the information architecture, we were able to gather valuable feedback about the requirements and cognitive processes of the tumor board members. Those insights have helped us to develop a dashboard application that closely adapts to the specified needs and characteristics, and thus is primarily user-centric.
Managed consumerism in health care.
Robinson, James C
2005-01-01
The future of market-oriented health policy and practice lies in "managed consumerism," a blend of the patient-centric focus of consumer-driven health care and the provider-centric focus of managed competition. The optimal locus of incentives will vary among health services according to the nature of the illness, the clinical technology, and the extent of discretion in utilization. A competitive market will manifest a variety of comprehensive and limited benefit designs, broad and narrow contractual networks, and single-and multispecialty provider organizations.
Visualization of Data Regarding Infections Using Eye Tracking Techniques
Yoon, Sunmoo; Cohen, Bevin; Cato, Kenrick D.; Liu, Jianfang; Larson, Elaine L.
2016-01-01
Objective To evaluate ease of use and usefulness for nurses of visualizations of infectious disease transmission in a hospital. Design An observational study was used to evaluate perceptions of several visualizations of data extracted from electronic health records designed using a participatory approach. Twelve nurses in the master’s program in an urban research-intensive nursing school participated in May 2015. Methods A convergent parallel mixed method was used to evaluate nurses’ perceptions on ease of use and usefulness of five visualization conveying trends in hospital infection transmission applying think-aloud, interview, and eye-tracking techniques. Findings Subjective data from the interview and think-aloud techniques indicated that participants preferred the traditional line graphs in simple data representation due to their familiarity, clarity, and easiness to read. An objective quantitative measure of eye movement analysis (444,421 gaze events) identified a high degree of participants’ attention span in infographics in all three scenarios. All participants responded with the correct answer within 1 min in comprehensive tests. Conclusions A user-centric approach was effective in developing and evaluating visualizations for hospital infection transmission. For the visualizations designed by the users, the participants were easily able to comprehend the infection visualizations on both line graphs and infographics for simple visualization. The findings from the objective comprehension test and eye movement and subjective attitudes support the feasibility of integrating user-centric visualization designs into electronic health records, which may inspire clinicians to be mindful of hospital infection transmission. Future studies are needed to investigate visualizations and motivation, and the effectiveness of visualization on infection rate. Clinical Relevance This study designed visualization images using clinical data from electronic health records applying a user-centric approach. The design insights can be applied for visualizing patient data in electronic health records. PMID:27061619
Visualization of Data Regarding Infections Using Eye Tracking Techniques.
Yoon, Sunmoo; Cohen, Bevin; Cato, Kenrick D; Liu, Jianfang; Larson, Elaine L
2016-05-01
To evaluate ease of use and usefulness for nurses of visualizations of infectious disease transmission in a hospital. An observational study was used to evaluate perceptions of several visualizations of data extracted from electronic health records designed using a participatory approach. Twelve nurses in the master's program in an urban research-intensive nursing school participated in May 2015. A convergent parallel mixed method was used to evaluate nurses' perceptions on ease of use and usefulness of five visualization conveying trends in hospital infection transmission applying think-aloud, interview, and eye-tracking techniques. Subjective data from the interview and think-aloud techniques indicated that participants preferred the traditional line graphs in simple data representation due to their familiarity, clarity, and easiness to read. An objective quantitative measure of eye movement analysis (444,421 gaze events) identified a high degree of participants' attention span in infographics in all three scenarios. All participants responded with the correct answer within 1 min in comprehensive tests. A user-centric approach was effective in developing and evaluating visualizations for hospital infection transmission. For the visualizations designed by the users, the participants were easily able to comprehend the infection visualizations on both line graphs and infographics for simple visualization. The findings from the objective comprehension test and eye movement and subjective attitudes support the feasibility of integrating user-centric visualization designs into electronic health records, which may inspire clinicians to be mindful of hospital infection transmission. Future studies are needed to investigate visualizations and motivation, and the effectiveness of visualization on infection rate. This study designed visualization images using clinical data from electronic health records applying a user-centric approach. The design insights can be applied for visualizing patient data in electronic health records. © 2016 Sigma Theta Tau International.
A Lessons Learned Knowledge Warehouse to Support the Army Knowledge Management Command-Centric
2004-03-01
Warehouse to Support the Army Knowledge Management Command-Centric increase the quality and availability of information in context ( knowledge ) to the... information , geographical information , knowledge base, Intelligence data (HUMINT, SIGINT, etc.); and • • Human Computer Interaction (HCI): allows...the Data Fusion Process from the HCI point of view? Can the LL Knowledge Base provide any valuable information to achieve better estimates of the
Type-Based Access Control in Data-Centric Systems
NASA Astrophysics Data System (ADS)
Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio
Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.
Scheduling from the perspective of the application
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berman, F.; Wolski, R.
1996-12-31
Metacomputing is the aggregation of distributed and high-performance resources on coordinated networks. With careful scheduling, resource-intensive applications can be implemented efficiently on metacomputing systems at the sizes of interest to developers and users. In this paper we focus on the problem of scheduling applications on metacomputing systems. We introduce the concept of application-centric scheduling in which everything about the system is evaluated in terms of its impact on the application. Application-centric scheduling is used by virtually all metacomputer programmers to achieve performance on metacomputing systems. We describe two successful metacomputing applications to illustrate this approach, and describe AppLeS scheduling agentsmore » which generalize the application-centric scheduling approach. Finally, we show preliminary results which compare AppLeS-derived schedules with conventional strip and blocked schedules for a two-dimensional Jacobi code.« less
ERIC Educational Resources Information Center
Wu, Baixue
2010-01-01
As both computer and mobile phone reach nearly ubiquity in the U.S. market, the slow uptake of mobile video, in contrast to the thriving usage of PC-based video, warrants a deeper understanding of user-oriented factors contributing to the two diffusion paths. Unlike the majority of existing diffusion research practices, the dissertation…
BioGPS and MyGene.info: organizing online, gene-centric information.
Wu, Chunlei; Macleod, Ian; Su, Andrew I
2013-01-01
Fast-evolving technologies have enabled researchers to easily generate data at genome scale, and using these technologies to compare biological states typically results in a list of candidate genes. Researchers are then faced with the daunting task of prioritizing these candidate genes for follow-up studies. There are hundreds, possibly even thousands, of web-based gene annotation resources available, but it quickly becomes impractical to manually access and review all of these sites for each gene in a candidate gene list. BioGPS (http://biogps.org) was created as a centralized gene portal for aggregating distributed gene annotation resources, emphasizing community extensibility and user customizability. BioGPS serves as a convenient tool for users to access known gene-centric resources, as well as a mechanism to discover new resources that were previously unknown to the user. This article describes updates to BioGPS made after its initial release in 2008. We summarize recent additions of features and data, as well as the robust user activity that underlies this community intelligence application. Finally, we describe MyGene.info (http://mygene.info) and related web services that provide programmatic access to BioGPS.
44 CFR 5.43 - Waiver or reduction of fees.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Waiver or reduction of fees. 5.43 Section 5.43 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... requester's and/or intended user's identity and qualifications, expertise in the subject area and ability...
Unlocking data: federated identity with LSDMA and dCache
NASA Astrophysics Data System (ADS)
Millar, AP; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Hardt, M.; Hayrapetyan, A.; Litvintsev, D.; Mkrtchyan, T.; Rossi, A.; Schwank, K.
2015-12-01
X.509, the dominant identity system from grid computing, has proved unpopular for many user communities. More popular alternatives generally assume the user is interacting via their web-browser. Such alternatives allow a user to authenticate with many services with the same credentials (user-name and password). They also allow users from different organisations form collaborations quickly and simply. Scientists generally require that their custom analysis software has direct access to the data. Such direct access is not currently supported by alternatives to X.509, as they require the use of a web-browser. Various approaches to solve this issue are being investigated as part of the Large Scale Data Management and Analysis (LSDMA) project, a German funded national R&D project. These involve dynamic credential translation (creating an X.509 credential) to allow backwards compatibility in addition to direct SAML- and OpenID Connect-based authentication. We present a summary of the current state of art and the current status of the federated identity work funded by the LSDMA project along with the future road map.
Evolving from Course-Centric to Learning-Centric: Portfolios, Wikis, and Social Learning
ERIC Educational Resources Information Center
Everhart, Deborah
2006-01-01
Teaching and learning strategies for using course management systems have evolved from basic "fill in the blank" models to interactive designs that encourage multi-formatted individual contributions and collaborative forms of learning. In keeping with the participatory development of online resources, web-based courses are shifting from…
A Personalized e-Learning Framework
ERIC Educational Resources Information Center
Alhawiti, Mohammed M.; Abdelhamid, Yasser
2017-01-01
With the advent of web based learning and content management tools, e-learning has become a matured learning paradigm, and changed the trend of instructional design from instructor centric learning paradigm to learner centric approach, and evolved from "one instructional design for many learners" to "one design for one learner"…
Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE
NASA Astrophysics Data System (ADS)
Kermarrec, Anne-Marie
Social networks and collaborative tagging systems have taken off at an unexpected scale and speed (Facebook, YouTube, Flickr, Last.fm, Delicious, etc). Web content is now generated by you, me, our friends and millions of others. This represents a revolution in usage and a great opportunity to leverage collaborative knowledge to enhance the user's Internet experience. The GOSSPLE project aims at precisely achieving this: automatically capturing affinities between users that are potentially unknown yet share similar interests, or exhibiting similar behaviors on the Web. This fully personalizes the search process, increasing the ability of a user to find relevant content. This personalization calls for decentralization. (1) Centralized servers might dissuade users from generating new content for they expose their privacy and represent a single point of attack. (2) The amount of information to store grows exponentially with the size of the system and centralized systems cannot sustain storing a growing amount of data at a user granularity. We believe that the salvation can only come from a fully decentralized user centric approach where every participant is entrusted to harvest the Web with information relevant to her own activity. This poses a number of scientific challenges: How to discover similar users, how to define the relevant metrics for such personalization, how to preserve privacy when needed, how to deal with free-riders and misheavior and how to manage efficiently a growing amount of data.
Interactive Model-Centric Systems Engineering (IMCSE) Phase Two
2015-02-28
109 Backend Implementation...42 Figure 10. Interactive Epoch-Era Analysis leverages humans-in-the-loop analysis and supporting infrastructure ...preliminary supporting 10 infrastructure . This will inform the transition strategies, additional case application and prototype user testing. • The
Examining Digital Literacy Practices on Social Network Sites
ERIC Educational Resources Information Center
Buck, Amber
2012-01-01
Young adults represent the most avid users of social network sites, and they are also the most concerned with their online identity management, according to the Pew Internet and American Life Project. These practices represent important literate activity today, as individuals who are writing online learn to negotiate interfaces, user agreements,…
Research on Information Sharing Method for Future C2 in Network Centric Environment
2011-06-01
subscription (or search) request. Then, some of the information service nodes for future C2 deal with these users’ requests, locate, federated search the... federated search server is responsible for resolving the search requests sending out from the users, and executing the federated search . The information... federated search server, information filtering model, or information subscription matching algorithm (such as users subscribe the target information at two
iHOPerator: user-scripting a personalized bioinformatics Web, starting with the iHOP website
Good, Benjamin M; Kawas, Edward A; Kuo, Byron Yu-Lin; Wilkinson, Mark D
2006-01-01
Background User-scripts are programs stored in Web browsers that can manipulate the content of websites prior to display in the browser. They provide a novel mechanism by which users can conveniently gain increased control over the content and the display of the information presented to them on the Web. As the Web is the primary medium by which scientists retrieve biological information, any improvements in the mechanisms that govern the utility or accessibility of this information may have profound effects. GreaseMonkey is a Mozilla Firefox extension that facilitates the development and deployment of user-scripts for the Firefox web-browser. We utilize this to enhance the content and the presentation of the iHOP (information Hyperlinked Over Proteins) website. Results The iHOPerator is a GreaseMonkey user-script that augments the gene-centred pages on iHOP by providing a compact, configurable visualization of the defining information for each gene and by enabling additional data, such as biochemical pathway diagrams, to be collected automatically from third party resources and displayed in the same browsing context. Conclusion This open-source script provides an extension to the iHOP website, demonstrating how user-scripts can personalize and enhance the Web browsing experience in a relevant biological setting. The novel, user-driven controls over the content and the display of Web resources made possible by user-scripts, such as the iHOPerator, herald the beginning of a transition from a resource-centric to a user-centric Web experience. We believe that this transition is a necessary step in the development of Web technology that will eventually result in profound improvements in the way life scientists interact with information. PMID:17173692
Research on multi-user encrypted search scheme in cloud environment
NASA Astrophysics Data System (ADS)
Yu, Zonghua; Lin, Sui
2017-05-01
Aiming at the existing problems of multi-user encrypted search scheme in cloud computing environment, a basic multi-user encrypted scheme is proposed firstly, and then the basic scheme is extended to an anonymous hierarchical management authority. Compared with most of the existing schemes, the scheme not only to achieve the protection of keyword information, but also to achieve the protection of user identity privacy; the same time, data owners can directly control the user query permissions, rather than the cloud server. In addition, through the use of a special query key generation rules, to achieve the hierarchical management of the user's query permissions. The safety analysis shows that the scheme is safe and that the performance analysis and experimental data show that the scheme is practicable.
BIRCH: a user-oriented, locally-customizable, bioinformatics system.
Fristensky, Brian
2007-02-09
Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be challenging, pipelining data from one program to the next is particularly awkward, especially when using web-based programs. At the same time, system administrators tasked with maintaining these tools do not always appreciate the needs of research biologists. BIRCH (Biological Research Computing Hierarchy) is an organizational framework for delivering bioinformatics resources to a user group, scaling from a single lab to a large institution. The BIRCH core distribution includes many popular bioinformatics programs, unified within the GDE (Genetic Data Environment) graphic interface. Of equal importance, BIRCH provides the system administrator with tools that simplify the job of managing a multiuser bioinformatics system across different platforms and operating systems. These include tools for integrating locally-installed programs and databases into BIRCH, and for customizing the local BIRCH system to meet the needs of the user base. BIRCH can also act as a front end to provide a unified view of already-existing collections of bioinformatics software. Documentation for the BIRCH and locally-added programs is merged in a hierarchical set of web pages. In addition to manual pages for individual programs, BIRCH tutorials employ step by step examples, with screen shots and sample files, to illustrate both the important theoretical and practical considerations behind complex analytical tasks. BIRCH provides a versatile organizational framework for managing software and databases, and making these accessible to a user base. Because of its network-centric design, BIRCH makes it possible for any user to do any task from anywhere.
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Fristensky, Brian
2007-01-01
Background Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be challenging, pipelining data from one program to the next is particularly awkward, especially when using web-based programs. At the same time, system administrators tasked with maintaining these tools do not always appreciate the needs of research biologists. Results BIRCH (Biological Research Computing Hierarchy) is an organizational framework for delivering bioinformatics resources to a user group, scaling from a single lab to a large institution. The BIRCH core distribution includes many popular bioinformatics programs, unified within the GDE (Genetic Data Environment) graphic interface. Of equal importance, BIRCH provides the system administrator with tools that simplify the job of managing a multiuser bioinformatics system across different platforms and operating systems. These include tools for integrating locally-installed programs and databases into BIRCH, and for customizing the local BIRCH system to meet the needs of the user base. BIRCH can also act as a front end to provide a unified view of already-existing collections of bioinformatics software. Documentation for the BIRCH and locally-added programs is merged in a hierarchical set of web pages. In addition to manual pages for individual programs, BIRCH tutorials employ step by step examples, with screen shots and sample files, to illustrate both the important theoretical and practical considerations behind complex analytical tasks. Conclusion BIRCH provides a versatile organizational framework for managing software and databases, and making these accessible to a user base. Because of its network-centric design, BIRCH makes it possible for any user to do any task from anywhere. PMID:17291351
SLIMS--a user-friendly sample operations and inventory management system for genotyping labs.
Van Rossum, Thea; Tripp, Ben; Daley, Denise
2010-07-15
We present the Sample-based Laboratory Information Management System (SLIMS), a powerful and user-friendly open source web application that provides all members of a laboratory with an interface to view, edit and create sample information. SLIMS aims to simplify common laboratory tasks with tools such as a user-friendly shopping cart for subjects, samples and containers that easily generates reports, shareable lists and plate designs for genotyping. Further key features include customizable data views, database change-logging and dynamically filled pre-formatted reports. Along with being feature-rich, SLIMS' power comes from being able to handle longitudinal data from multiple time-points and biological sources. This type of data is increasingly common from studies searching for susceptibility genes for common complex diseases that collect thousands of samples generating millions of genotypes and overwhelming amounts of data. LIMSs provide an efficient way to deal with this data while increasing accessibility and reducing laboratory errors; however, professional LIMS are often too costly to be practical. SLIMS gives labs a feasible alternative that is easily accessible, user-centrically designed and feature-rich. To facilitate system customization, and utilization for other groups, manuals have been written for users and developers. Documentation, source code and manuals are available at http://genapha.icapture.ubc.ca/SLIMS/index.jsp. SLIMS was developed using Java 1.6.0, JSPs, Hibernate 3.3.1.GA, DB2 and mySQL, Apache Tomcat 6.0.18, NetBeans IDE 6.5, Jasper Reports 3.5.1 and JasperSoft's iReport 3.5.1.
Mining microarray data at NCBI's Gene Expression Omnibus (GEO)*.
Barrett, Tanya; Edgar, Ron
2006-01-01
The Gene Expression Omnibus (GEO) at the National Center for Biotechnology Information (NCBI) has emerged as the leading fully public repository for gene expression data. This chapter describes how to use Web-based interfaces, applications, and graphics to effectively explore, visualize, and interpret the hundreds of microarray studies and millions of gene expression patterns stored in GEO. Data can be examined from both experiment-centric and gene-centric perspectives using user-friendly tools that do not require specialized expertise in microarray analysis or time-consuming download of massive data sets. The GEO database is publicly accessible through the World Wide Web at http://www.ncbi.nlm.nih.gov/geo.
Flynn, Karen Coen; Hoffer, Lee D
2017-07-05
Understanding the social dynamics of local methamphetamine markets is critical to improving community health and reducing social costs associated with illicit drug use. We examine a local drug market in Summit County, Ohio, wherein methamphetamine users ascribe themselves different ethnic identities from those long associated with the drug elsewhere in the United States. Qualitative interviews with 52 study participants demonstrate that very poor and homeless White males and females are now using methamphetamine; however, even more surprising is that 31 of the participants identified themselves as poor or homeless, male or female African, Native, biracial, or multiracial Americans. The drug use trajectory of these 31 participants in particular involved a transition from a historical preference for crack to a present one for methamphetamine and, in some cases, a preference for concurrent use of methamphetamine and heroin. Many of these methamphetamine users also emphasized their ethnic identity to distinguish themselves as nonproducers of methamphetamine in comparison to Whites, who are commonly associated with methamphetamine production. Findings appear to suggest an emergent means of identity management resulting from the ethnic diversity of users in this methamphetamine market. These findings may have relevance in other communities with similar demographics and drug markets and may hold important implications for drug treatment, policy-making, and law enforcement professionals' work associated with methamphetamine users, producers, and distributors.
NASA Technical Reports Server (NTRS)
Majchrzak, Ann; Chellappa, Ramnath K.; Cooper, Lynne P.; Hars, Alexander
2003-01-01
The contents include: 1) What do most KMS in use today assume?; 2) Assumptions are violated when KMS is used by EKP workers - Why?; 3) Current State of KMS for EKPs are inadequate; 4) What would an "adequate" KMS for EKPs look like?; 5) "User-as-Consumer" Analogue: Ecommerce/Eem ployee Services; 6) Why is an ideal KMS for EKPs hard to achieve?; 7) So, what type of KMS design would work?; 8) Human-Based KMS for EKP - Proposal Call Managers at R&DLAB; 9) Proposal Call Managers (PCMs); 10) Specific PCM tasks; 11) Why is a R&DLAB PCM a human metaphor for a KMS for EKP?; 12) Data Collection; 13) Finding #1; 14) Finding #2; 15) Finding #3; 16) Factors affecting How/when; 17) Finding #4; 18) Finding #5; 19) Implication#l for a KMS for EKP: From System to Service; 20) Implication #2: From technology or human-centric to Mixed Mode; 21) Implication #3: From Simple User Profiles to Dynamic Delivery Profiles; 22) Implication #4: Maintaining a trustworthy environment; 23) Implication #5: Constructing a dynamic delivery profile; 24) Implications for Research: Model; and 25) Example Research Qs on KMS Support for EKPs.
2005 8th Annual Systems Engineering Conference. Volume 4, Thursday
2005-10-27
requirements, allocation , and utilization statistics Operations Decisions Acquisition Decisions Resource Management — Integrated Requirements/ Allocation ...Quality Improvement Consultants, Inc. “Automated Software Testing Increases Test Quality and Coverage Resulting in Improved Software Reliability.”, Mr...Steven Ligon, SAIC The Return of Discipline, Ms. Jacqueline Townsend, Air Force Materiel Command Track 4 - Net Centric Operations: Testing Net-Centric
Wilderness uses, users, values, and management
Alan Watson; David N. Cole; Gregory T. Friese; John C. Hendee; Peter Landres; Thoms F. Geary; Gerald L. Stokes; Jeff Jarvis; Wes Henry
1999-01-01
This chapter is a compendium of six papers written to add further depth to our national assessment of Wilderness, begun with the previous chapter. The first three papers summarize research and experience about the identity of Wilderness users and how Wilderness is used, use of Wilderness for personal growth, and changes of Wilderness values. The second three papers...
Sensor Webs with a Service-Oriented Architecture for On-demand Science Products
NASA Technical Reports Server (NTRS)
Mandl, Daniel; Ungar, Stephen; Ames, Troy; Justice, Chris; Frye, Stuart; Chien, Steve; Tran, Daniel; Cappelaere, Patrice; Derezinsfi, Linda; Paules, Granville;
2007-01-01
This paper describes the work being managed by the NASA Goddard Space Flight Center (GSFC) Information System Division (ISD) under a NASA Earth Science Technology Ofice (ESTO) Advanced Information System Technology (AIST) grant to develop a modular sensor web architecture which enables discovery of sensors and workflows that can create customized science via a high-level service-oriented architecture based on Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) web service standards. These capabilities serve as a prototype to a user-centric architecture for Global Earth Observing System of Systems (GEOSS). This work builds and extends previous sensor web efforts conducted at NASA/GSFC using the Earth Observing 1 (EO-1) satellite and other low-earth orbiting satellites.
NASA Astrophysics Data System (ADS)
Lenzini, Gabriele
We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.
ERIC Educational Resources Information Center
Elhindi, Mohamed A.
2010-01-01
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
CytoCom: a Cytoscape app to visualize, query and analyse disease comorbidity networks.
Moni, Mohammad Ali; Xu, Haoming; Liò, Pietro
2015-03-15
CytoCom is an interactive plugin for Cytoscape that can be used to search, explore, analyse and visualize human disease comorbidity network. It represents disease-disease associations in terms of bipartite graphs and provides International Classification of Diseases, Ninth Revision (ICD9)-centric and disease name centric views of disease information. It allows users to find associations between diseases based on the two measures: Relative Risk (RR) and [Formula: see text]-correlation values. In the disease network, the size of each node is based on the prevalence of that disease. CytoCom is capable of clustering disease network based on the ICD9 disease category. It provides user-friendly access that facilitates exploration of human diseases, and finds additional associated diseases by double-clicking a node in the existing network. Additional comorbid diseases are then connected to the existing network. It is able to assist users for interpretation and exploration of the human diseases by a variety of built-in functions. Moreover, CytoCom permits multi-colouring of disease nodes according to standard disease classification for expedient visualization. © The Author 2014. Published by Oxford University Press.
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties. PMID:25202737
Time pattern locking scheme for secure multimedia contents in human-centric device.
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.
Climate Data Analytics Workflow Management
NASA Astrophysics Data System (ADS)
Zhang, J.; Lee, S.; Pan, L.; Mattmann, C. A.; Lee, T. J.
2016-12-01
In this project we aim to pave a novel path to create a sustainable building block toward Earth science big data analytics and knowledge sharing. Closely studying how Earth scientists conduct data analytics research in their daily work, we have developed a provenance model to record their activities, and to develop a technology to automatically generate workflows for scientists from the provenance. On top of it, we have built the prototype of a data-centric provenance repository, and establish a PDSW (People, Data, Service, Workflow) knowledge network to support workflow recommendation. To ensure the scalability and performance of the expected recommendation system, we have leveraged the Apache OODT system technology. The community-approved, metrics-based performance evaluation web-service will allow a user to select a metric from the list of several community-approved metrics and to evaluate model performance using the metric as well as the reference dataset. This service will facilitate the use of reference datasets that are generated in support of the model-data intercomparison projects such as Obs4MIPs and Ana4MIPs. The data-centric repository infrastructure will allow us to catch richer provenance to further facilitate knowledge sharing and scientific collaboration in the Earth science community. This project is part of Apache incubator CMDA project.
Activity-Centric Approach to Distributed Programming
NASA Technical Reports Server (NTRS)
Levy, Renato; Satapathy, Goutam; Lang, Jun
2004-01-01
The first phase of an effort to develop a NASA version of the Cybele software system has been completed. To give meaning to even a highly abbreviated summary of the modifications to be embodied in the NASA version, it is necessary to present the following background information on Cybele: Cybele is a proprietary software infrastructure for use by programmers in developing agent-based application programs [complex application programs that contain autonomous, interacting components (agents)]. Cybele provides support for event handling from multiple sources, multithreading, concurrency control, migration, and load balancing. A Cybele agent follows a programming paradigm, called activity-centric programming, that enables an abstraction over system-level thread mechanisms. Activity centric programming relieves application programmers of the complex tasks of thread management, concurrency control, and event management. In order to provide such functionality, activity-centric programming demands support of other layers of software. This concludes the background information. In the first phase of the present development, a new architecture for Cybele was defined. In this architecture, Cybele follows a modular service-based approach to coupling of the programming and service layers of software architecture. In a service-based approach, the functionalities supported by activity-centric programming are apportioned, according to their characteristics, among several groups called services. A well-defined interface among all such services serves as a path that facilitates the maintenance and enhancement of such services without adverse effect on the whole software framework. The activity-centric application-program interface (API) is part of a kernel. The kernel API calls the services by use of their published interface. This approach makes it possible for any application code written exclusively under the API to be portable for any configuration of Cybele.
Nunes, David; Tran, Thanh-Dien; Raposo, Duarte; Pinto, André; Gomes, André; Silva, Jorge Sá
2012-01-01
As the Internet evolved, social networks (such as Facebook) have bloomed and brought together an astonishing number of users. Mashing up mobile phones and sensors with these social environments enables the creation of people-centric sensing systems which have great potential for expanding our current social networking usage. However, such systems also have many associated technical challenges, such as privacy concerns, activity detection mechanisms or intermittent connectivity, as well as limitations due to the heterogeneity of sensor nodes and networks. Considering the openness of the Web 2.0, good technical solutions for these cases consist of frameworks that expose sensing data and functionalities as common Web-Services. This paper presents our RESTful Web Service-based model for people-centric sensing frameworks, which uses sensors and mobile phones to detect users’ activities and locations, sharing this information amongst the user’s friends within a social networking site. We also present some screenshot results of our experimental prototype. PMID:22438732
Human-centric predictive model of task difficulty for human-in-the-loop control tasks
Majewicz Fey, Ann
2018-01-01
Quantitatively measuring the difficulty of a manipulation task in human-in-the-loop control systems is ill-defined. Currently, systems are typically evaluated through task-specific performance measures and post-experiment user surveys; however, these methods do not capture the real-time experience of human users. In this study, we propose to analyze and predict the difficulty of a bivariate pointing task, with a haptic device interface, using human-centric measurement data in terms of cognition, physical effort, and motion kinematics. Noninvasive sensors were used to record the multimodal response of human user for 14 subjects performing the task. A data-driven approach for predicting task difficulty was implemented based on several task-independent metrics. We compare four possible models for predicting task difficulty to evaluated the roles of the various types of metrics, including: (I) a movement time model, (II) a fusion model using both physiological and kinematic metrics, (III) a model only with kinematic metrics, and (IV) a model only with physiological metrics. The results show significant correlation between task difficulty and the user sensorimotor response. The fusion model, integrating user physiology and motion kinematics, provided the best estimate of task difficulty (R2 = 0.927), followed by a model using only kinematic metrics (R2 = 0.921). Both models were better predictors of task difficulty than the movement time model (R2 = 0.847), derived from Fitt’s law, a well studied difficulty model for human psychomotor control. PMID:29621301
Home Exercise in a Social Context: Real-Time Experience Sharing Using Avatars
NASA Astrophysics Data System (ADS)
Aghajan, Yasmin; Lacroix, Joyca; Cui, Jingyu; van Halteren, Aart; Aghajan, Hamid
This paper reports on the design of a vision-based exercise monitoring system. The system aims to promote well-being by making exercise sessions enjoyable experiences, either through real-time interaction and instructions proposed to the user, or via experience sharing or group gaming with peers in a virtual community. The use of avatars is explored as means of representation of the user’s exercise movements or appearance, and the system employs user-centric approaches in visual processing, behavior modeling via history data accumulation, and user feedback to learn the preferences. A preliminary survey study has been conducted to explore the avatar preferences in two user groups.
2004-06-01
Mark Adkins Director of Research Ph.D Human Communication adkins@arizona.edu Dr. John Kruse Director of Programming Ph.D Management Information Systems...Theory • Network Centric Warfare • Technology Adoption – Technology Adoption Model – Technology Transition Model • Human Communication – Social Context
Designing Computer-Based Assessments: Multidisciplinary Findings and Student Perspectives
ERIC Educational Resources Information Center
Dembitzer, Leah; Zelikovitz, Sarah; Kettler, Ryan J.
2017-01-01
A partnership was created between psychologists and computer programmers to develop a computer-based assessment program. Psychometric concerns of accessibility, reliability, and validity were juxtaposed with core development concepts of usability and user-centric design. Phases of development were iterative, with evaluation phases alternating with…
Network Centric Warfare and Joint Force 2020
2014-05-15
enabled moving map programs, unified communications, and every other bell and whistle a smart phone or tablet provides a user. The early adopters who...create conditions where the adversary is frozen out of all options at all levels and is reduced to a condition of decision paralysis , cognitive
Mobile Student Information System
ERIC Educational Resources Information Center
Asif, Muhammad; Krogstie, John
2011-01-01
Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…
2010-12-01
strategy “to establish a net- centric environment that increasingly leverages shared services and SOAs that are: Supported by…a single set of common...component services. As mentioned previously, this is an important characteristic of SOA. Also noteworthy is set of shared services seen on the...transmit information products directly to the user(s). 6. Shared Services One of the key benefits of Service Oriented Architecture is the ability to
Designing User-Centric Patient Portals: Clinician and Patients' Uses and Gratifications.
Alpert, Jordan M; Krist, Alex H; Aycock, Rebecca A; Kreps, Gary L
2017-03-01
Legislation mandates that clinicians make patients' medical information available digitally. This has resulted in hurriedly installing patient portals that do not fully meet the needs of patients or clinicians. This study examined a specific portal, MyPreventiveCare (MPC), a patient-centered portal designed to promote preventive care to consumers, to elicit recommendations from patients and clinicians about how it could be more beneficial by uncovering their uses and gratifications (U&G). In-depth interviews with 31 patients and two clinician focus groups were conducted. Multiple methods were utilized, such as grounded theory coding to develop themes and content analysis to classify responses according to the U&G framework. Four main categories emerged that users desire to be included in health portals: integration with technology (27%), coordination of care (27%), incorporation of lifestyle (26%), and increased control (20%). Additional analysis revealed that health portals are mainly utilized to fulfill cognitive and affective needs, with over 80% of recommendations related to the U&G categories of cognitive and affective needs. Cognitive (60%), affective (21%), social integrative (10%), personal integrative (9%), and tension release (0%). Portals will continue to evolve and become important health communication tools if they address the user's perspective and are inclusive of new technological advances. Specifically, portals must become more user centric and incorporate aspects of the patients' lifestyle and integrate health information technology.
Designing User-Centric Patient Portals: Clinician and Patients' Uses and Gratifications
Krist, Alex H.; Aycock, Rebecca A.; Kreps, Gary L.
2017-01-01
Abstract Background: Legislation mandates that clinicians make patients' medical information available digitally. This has resulted in hurriedly installing patient portals that do not fully meet the needs of patients or clinicians. This study examined a specific portal, MyPreventiveCare (MPC), a patient-centered portal designed to promote preventive care to consumers, to elicit recommendations from patients and clinicians about how it could be more beneficial by uncovering their uses and gratifications (U&G). Materials and Methods: In-depth interviews with 31 patients and two clinician focus groups were conducted. Multiple methods were utilized, such as grounded theory coding to develop themes and content analysis to classify responses according to the U&G framework. Results: Four main categories emerged that users desire to be included in health portals: integration with technology (27%), coordination of care (27%), incorporation of lifestyle (26%), and increased control (20%). Additional analysis revealed that health portals are mainly utilized to fulfill cognitive and affective needs, with over 80% of recommendations related to the U&G categories of cognitive and affective needs. Cognitive (60%), affective (21%), social integrative (10%), personal integrative (9%), and tension release (0%). Conclusions: Portals will continue to evolve and become important health communication tools if they address the user's perspective and are inclusive of new technological advances. Specifically, portals must become more user centric and incorporate aspects of the patients' lifestyle and integrate health information technology. PMID:27333468
Metrics for measuring net-centric data strategy implementation
NASA Astrophysics Data System (ADS)
Kroculick, Joseph B.
2010-04-01
An enterprise data strategy outlines an organization's vision and objectives for improved collection and use of data. We propose generic metrics and quantifiable measures for each of the DoD Net-Centric Data Strategy (NCDS) data goals. Data strategy metrics can be adapted to the business processes of an enterprise and the needs of stakeholders in leveraging the organization's data assets to provide for more effective decision making. Generic metrics are applied to a specific application where logistics supply and transportation data is integrated across multiple functional groups. A dashboard presents a multidimensional view of the current progress to a state where logistics data shared in a timely and seamless manner among users, applications, and systems.
Mining Microarray Data at NCBI’s Gene Expression Omnibus (GEO)*
Barrett, Tanya; Edgar, Ron
2006-01-01
Summary The Gene Expression Omnibus (GEO) at the National Center for Biotechnology Information (NCBI) has emerged as the leading fully public repository for gene expression data. This chapter describes how to use Web-based interfaces, applications, and graphics to effectively explore, visualize, and interpret the hundreds of microarray studies and millions of gene expression patterns stored in GEO. Data can be examined from both experiment-centric and gene-centric perspectives using user-friendly tools that do not require specialized expertise in microarray analysis or time-consuming download of massive data sets. The GEO database is publicly accessible through the World Wide Web at http://www.ncbi.nlm.nih.gov/geo. PMID:16888359
NASA Astrophysics Data System (ADS)
Krejcar, Ondrej
The ability to let a mobile device determine its location in an indoor environment supports the creation of a new range of mobile information system applications. The goal of my project is to complement the data networking capabilities of RF wireless LANs with accurate user location and tracking capabilities for user needed data prebuffering. I created a location based system enhancement for locating and tracking users of indoor information system. User position is used for data prebuffering and pushing information from a server to his mobile client. All server data is saved as artifacts (together) with its indoor position information. The area definition for artifacts selecting is described for current and predicted user position along with valuating options for artifacts ranging. Future trends are also discussed.
Design of a Mobile Application for Transfusion Medicine.
Albornoz, M A; Márquez, S; Rubin, L; Luna, D
2017-01-01
One of the most frequent error in transfusion medicine is the failure in verifying the patient's identity prior to transfusion. This paper describes the design and development of a Mobile Application (MA) for transfusion medicine. The app uses barcode and QR reading technology for the verification of the patient's identity and the administration of blood components when making a blood transfusion. Physicians, developers, technicians of transfusion medicine and a User Centered Design team participated in the design. The inclusion of end users was fundamental to get full representativeness of their workflow. The project was based on agile methodologies of project management and software development.
I Feel You: The Design and Evaluation of a Domotic Affect-Sensitive Spoken Conversational Agent
Lutfi, Syaheerah Lebai; Fernández-Martínez, Fernando; Lorenzo-Trueba, Jaime; Barra-Chicote, Roberto; Montero, Juan Manuel
2013-01-01
We describe the work on infusion of emotion into a limited-task autonomous spoken conversational agent situated in the domestic environment, using a need-inspired task-independent emotion model (NEMO). In order to demonstrate the generation of affect through the use of the model, we describe the work of integrating it with a natural-language mixed-initiative HiFi-control spoken conversational agent (SCA). NEMO and the host system communicate externally, removing the need for the Dialog Manager to be modified, as is done in most existing dialog systems, in order to be adaptive. The first part of the paper concerns the integration between NEMO and the host agent. The second part summarizes the work on automatic affect prediction, namely, frustration and contentment, from dialog features, a non-conventional source, in the attempt of moving towards a more user-centric approach. The final part reports the evaluation results obtained from a user study, in which both versions of the agent (non-adaptive and emotionally-adaptive) were compared. The results provide substantial evidences with respect to the benefits of adding emotion in a spoken conversational agent, especially in mitigating users' frustrations and, ultimately, improving their satisfaction. PMID:23945740
Cannabis use and 'safe' identities in an inner-city school risk environment.
Fletcher, Adam; Bonell, Chris; Sorhaindo, Annik; Rhodes, Tim
2009-05-01
Despite evidence of school effects on drug use, little is known about the social and institutional processes through which these may occur. This study explores how school experiences may shape young people's drug-related attitudes and actions and adds to existing evidence highlighting the importance of drug use in young people's identity construction and group bonding. Case study qualitative data were collected through semi-structured interviews supplemented with observations. Fourteen students aged 14-15 were interviewed in autumn 2006 and again in summer 2007. Five teachers were interviewed. Inner-city secondary schools may constitute risky and insecure environments, and thereby act as structural forces in shaping how students form peer groups and respond to feelings of insecurity. Cannabis use--and identities constructed in relation to this--appeared to play a key role in how students manage insecurity. Black and dual-heritage students formed large, 'safe' ethno-centric school social networks and smoking 'weed' appeared to be an important source of bonding and identity. For some students, a vicious circle may exist whereby the process of 'fitting in' exacerbates difficult and conflicting relationships with teachers and parents, entrenches disengagement from education and leads to further cannabis use. There also appeared to be a diffusion of this 'safe' identity construction beyond these disengaged students. Cannabis and other drug use may also be an important safety strategy and source of bonding for pro-education students who need to be seen 'getting high' as well as 'aiming high'. While some students constructed 'safe' and 'sweet' identities others were constrained by their position and resources at school. Inner-city schools may both reflect and reproduce existing patterns of drug use. The concept of risk hierarchies may be important when designing and evaluating school-based drug-prevention strategies.
NASA Technical Reports Server (NTRS)
Alfaro, Victor O.; Casey, Nancy J.
2005-01-01
SQL-RAMS (where "SQL" signifies Structured Query Language and "RAMS" signifies Rocketdyne Automated Management System) is a successor to the legacy version of RAMS -- a computer program used to manage all work, nonconformance, corrective action, and configuration management on rocket engines and ground support equipment at Stennis Space Center. The legacy version resided in the File-Maker Pro software system and was constructed in modules that could act as standalone programs. There was little or no integration among modules. Because of limitations on file-management capabilities in FileMaker Pro, and because of difficulty of integration of FileMaker Pro with other software systems for exchange of data using such industry standards as SQL, the legacy version of RAMS proved to be limited, and working to circumvent its limitations too time-consuming. In contrast, SQL-RAMS is an integrated SQL-server-based program that supports all data-exchange software industry standards. Whereas in the legacy version, it was necessary to access individual modules to gain insight into a particular workstatus document, SQL-RAMS provides access through a single-screen presentation of core modules. In addition, SQL-RAMS enables rapid and efficient filtering of displayed statuses by predefined categories and test numbers. SQL-RAMS is rich in functionality and encompasses significant improvements over the legacy system. It provides users the ability to perform many tasks, which in the past required administrator intervention. Additionally, many of the design limitations have been corrected, allowing for a robust application that is user centric.
NASA Technical Reports Server (NTRS)
Alfaro, Victor O.; Casey, Nancy J.
2005-01-01
SQL-RAMS (where "SQL" signifies Structured Query Language and "RAMS" signifies Rocketdyne Automated Management System) is a successor to the legacy version of RAMS a computer program used to manage all work, nonconformance, corrective action, and configuration management on rocket engines and ground support equipment at Stennis Space Center. The legacy version resided in the FileMaker Pro software system and was constructed in modules that could act as stand-alone programs. There was little or no integration among modules. Because of limitations on file-management capabilities in FileMaker Pro, and because of difficulty of integration of FileMaker Pro with other software systems for exchange of data using such industry standards as SQL, the legacy version of RAMS proved to be limited, and working to circumvent its limitations too time-consuming. In contrast, SQL-RAMS is an integrated SQL-server-based program that supports all data-exchange software industry standards. Whereas in the legacy version, it was necessary to access individual modules to gain insight to a particular work-status documents, SQL-RAMS provides access through a single-screen presentation of core modules. In addition, SQL-RAMS enable rapid and efficient filtering of displayed statuses by predefined categories and test numbers. SQL-RAMS is rich in functionality and encompasses significant improvements over the legacy system. It provides users the ability to perform many tasks which in the past required administrator intervention. Additionally many of the design limitations have been corrected allowing for a robust application that is user centric.
Service user involvement for mental health system strengthening in India: a qualitative study.
Samudre, Sandesh; Shidhaye, Rahul; Ahuja, Shalini; Nanda, Sharmishtha; Khan, Azaz; Evans-Lacko, Sara; Hanlon, Charlotte
2016-07-28
There is a wide recognition that involvement of service users and their caregivers in health system policy and planning processes can strengthen health systems; however, most evidence and experience has come from high-income countries. This study aimed to explore baseline experiences, barriers and facilitators to service user-caregiver involvement in the emerging mental health system in India, and stakeholders' perspectives on how greater involvement could be achieved. A qualitative study was conducted in Sehore district of Madhya Pradesh, India. In-depth interviews (n = 27) and a focus group discussion were conducted among service users, caregivers and their representatives at district, state and national levels and policy makers, service providers and mental health researchers. The topic guide explored the baseline situation in India, barriers and facilitators to service user and caregiver involvement in the following aspects of mental health systems: policy-making and planning, service development, monitoring and quality control, as well as research. Framework analysis was employed. Respondents spoke of the limited involvement of service users and caregivers in the current Indian mental health system. The major reported barriers to this involvement were (1) unmet treatment and economic needs arising from low access to mental health services coupled with the high burden of illness, (2) pervasive stigmatising attitudes operating at the level of service user, caregiver, community, healthcare provider and healthcare administrators, and (3) entrenched power differentials between service providers and service users. Respondents prioritised greater involvement of service users in the planning of their own individual-level mental health care before considering involvement at the mental health system level. A stepwise progression was endorsed, starting from needs assessment, through empowerment and organization of service users and caregivers, leading finally to meaningful involvement. Societal and system level barriers need to be addressed in order to facilitate the involvement of service users and caregivers to strengthen the Indian mental health system. Shifting from a largely 'provider-centric' to a more 'user-centric' model of mental health care may be a fundamental first step to sustainable user involvement at the system level.
Yang, Shuai; Zhang, Xinlei; Diao, Lihong; Guo, Feifei; Wang, Dan; Liu, Zhongyang; Li, Honglei; Zheng, Junjie; Pan, Jingshan; Nice, Edouard C; Li, Dong; He, Fuchu
2015-09-04
The Chromosome-centric Human Proteome Project (C-HPP) aims to catalog genome-encoded proteins using a chromosome-by-chromosome strategy. As the C-HPP proceeds, the increasing requirement for data-intensive analysis of the MS/MS data poses a challenge to the proteomic community, especially small laboratories lacking computational infrastructure. To address this challenge, we have updated the previous CAPER browser into a higher version, CAPER 3.0, which is a scalable cloud-based system for data-intensive analysis of C-HPP data sets. CAPER 3.0 uses cloud computing technology to facilitate MS/MS-based peptide identification. In particular, it can use both public and private cloud, facilitating the analysis of C-HPP data sets. CAPER 3.0 provides a graphical user interface (GUI) to help users transfer data, configure jobs, track progress, and visualize the results comprehensively. These features enable users without programming expertise to easily conduct data-intensive analysis using CAPER 3.0. Here, we illustrate the usage of CAPER 3.0 with four specific mass spectral data-intensive problems: detecting novel peptides, identifying single amino acid variants (SAVs) derived from known missense mutations, identifying sample-specific SAVs, and identifying exon-skipping events. CAPER 3.0 is available at http://prodigy.bprc.ac.cn/caper3.
N-CET: Network-Centric Exploitation and Tracking
2009-10-01
DATES COVERED (From - To) October 2008 – August 2009 4 . TITLE AND SUBTITLE N-CET: NETWORK – CENTRIC EXPLOITATION AND TRACKING 5a. CONTRACT NUMBER...At the core of N-CET are information management services that decouple data producers and consumers , allowing reconfiguration to suit mission needs...Shown around the head-node are different pieces of hardware including the Sony PlayStation R©3 (PS3) nodes used for computationally demanding tasks
Harrison, John; Booth, Nick
2003-01-01
Recent work in the emerging field of network or digital identity suggests a new approach to the design of informatics systems, in which the individual becomes the guardian of their own personal data, and is assisted in controlling access to it by an infrastructure that is aware of roles, such as 'doctor', and relationships, such as 'doctor-patient'.For these purposes, an 'identity' is defined as the history of a relationship between two entities, and thus encompasses not only name and address but also data that would usually be regarded as part of an electronic patient or health record. This paper presents a description of how such a true person-centric architecture might work, and shows how it can be seen as an evolution of current plans in the NHS for a national patient data spine. One application, the electronic transmission of prescriptions, is described in detail. Other applications, both within and without the healthcare field, are described in outline. The implementation of such a person-centric system requires a modest degree of technical innovation, but significant change in organisational and business models. It is suggested that there is a need for one or more not-for-profit trusts, each with a remit to act as host for an individual's digital identity, and as the individual's true agent. Service providers - such as healthcare organisations - will pay the trust for provision of authentication, and for the storage and transmission of a patient's data; the trust in turn will pay implementation partners, such as smart card issuers and providers of communication channels, acting on behalf of the individual.
Analyzing Digital Library Initiatives: 5S Theory Perspective
ERIC Educational Resources Information Center
Isah, Abdulmumin; Mutshewa, Athulang; Serema, Batlang; Kenosi, Lekoko
2015-01-01
This article traces the historical development of Digital Libraries (DLs), examines some DL initiatives in developed and developing countries and uses 5S Theory as a lens for analyzing the focused DLs. The analysis shows that present-day systems, in both developed and developing nations, are essentially content and user centric, with low level…
A Skyline Plugin for Pathway-Centric Data Browsing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degan, Michael G.; Ryadinskiy, Lillian; Fujimoto, Grant M.
For targeted proteomics to be broadly adopted in biological laboratories as a routine experimental protocol, wet-bench biologists must be able to approach SRM assay design in the same way they approach biological experimental design. Most often, biological hypotheses are envisioned in a set of protein interactions, networks and pathways. We present a plugin for the popular Skyline tool that presents public mass spectrometry data in a pathway-centric view to assist users in browsing available data and determining how to design quantitative experiments. Selected proteins and their underlying mass spectra are imported to Skyline for further assay design (transition selection). Themore » same plugin can be used for hypothesis-drive DIA data analysis, again utilizing the pathway view to help narrow down the set of proteins which will be investigated. The plugin is backed by the PNNL Biodiversity Library, a corpus of 3 million peptides from >100 organisms, and the draft human proteome. Users can upload personal data to the plugin to use the pathway navigation prior to importing their own data into Skyline.« less
A Skyline Plugin for Pathway-Centric Data Browsing
NASA Astrophysics Data System (ADS)
Degan, Michael G.; Ryadinskiy, Lillian; Fujimoto, Grant M.; Wilkins, Christopher S.; Lichti, Cheryl F.; Payne, Samuel H.
2016-11-01
For targeted proteomics to be broadly adopted in biological laboratories as a routine experimental protocol, wet-bench biologists must be able to approach selected reaction monitoring (SRM) and parallel reaction monitoring (PRM) assay design in the same way they approach biological experimental design. Most often, biological hypotheses are envisioned in a set of protein interactions, networks, and pathways. We present a plugin for the popular Skyline tool that presents public mass spectrometry data in a pathway-centric view to assist users in browsing available data and determining how to design quantitative experiments. Selected proteins and their underlying mass spectra are imported to Skyline for further assay design (transition selection). The same plugin can be used for hypothesis-driven data-independent acquisition (DIA) data analysis, again utilizing the pathway view to help narrow down the set of proteins that will be investigated. The plugin is backed by the Pacific Northwest National Laboratory (PNNL) Biodiversity Library, a corpus of 3 million peptides from >100 organisms, and the draft human proteome. Users can upload personal data to the plugin to use the pathway navigation prior to importing their own data into Skyline.
Moving On/Keeping Pace: Youth's Literate Identities and Multimodal Digital Texts
ERIC Educational Resources Information Center
Alvermann, Donna E.
2011-01-01
"We're not in Kansas anymore, Toto"--a statement Dorothy made to her dog, Toto, in "The Wizard of Oz"--sums up reasonably well the point the author wants to make in this article. That is, as literacy educators no longer constrained (or protected) by older, more familiar 20th-century print-centric modes of communicating, educators may at times feel…
Net-Centric Sensors and Data Sources (N-CSDS) GEODSS Sidecar
NASA Astrophysics Data System (ADS)
Richmond, D.
2012-09-01
Vast amounts of Space Situational Sensor data is collected each day on closed, legacy systems. Massachusetts Institute of Technology Lincoln Laboratory (MIT/LL) developed a Net-Centric approach to expose this data under the Extended Space Sensors Architecture (ESSA) Advanced Concept Technology Demonstration (ACTD). The Net-Centric Sensors and Data Sources (N-CSDS) Ground-based Electro Optical Deep Space Surveillance (GEODSS) Sidecar is the next generation that moves the ESSA ACTD engineering tools to an operational baseline. The N-CSDS GEODSS sidecar high level architecture will be presented, highlighting the features that supports deployment at multiple diverse sensor sites. Other key items that will be covered include: 1) The Web Browser interface to perform searches of historical data 2) The capabilities of the deployed Web Services and example service request/responses 3) Example data and potential user applications will be highlighted 4) Specifics regarding the process to gain access to the N-CSDS GEODSS sensor data in near real time 5) Current status and future deployment plans (Including plans for deployment to the Maui GEODSS Site)
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Balasubramaniam, S.; Kavitha, V.
2015-01-01
Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826
Geometric data perturbation-based personal health record transactions in cloud computing.
Balasubramaniam, S; Kavitha, V
2015-01-01
Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.
A vision of network-centric military communications
NASA Astrophysics Data System (ADS)
Conklin, Ross, Jr.; Burbank, Jack; Nichols, Robert, Jr.
2005-05-01
This paper presents a vision for a future capability-based military communications system that considers user requirements. Historically, the military has developed and fielded many specialized communications systems. While these systems solved immediate communications problems, they were not designed to operate with other systems. As information has become more important to the execution of war, the "stove-pipe" nature of the communications systems deployed by the military is no longer acceptable. Realizing this, the military has begun the transformation of communications to a network-centric communications paradigm. However, the specialized communications systems were developed in response to the widely varying environments related to military communications. These environments, and the necessity for effective communications within these environments, do not disappear under the network-centric paradigm. In fact, network-centric communications allows for one message to cross many of these environments by transiting multiple networks. The military would also like one communications approach that is capable of working well in multiple environments. This paper presents preliminary work on the creation of a framework that allows for a reconfigurable device that is capable of adapting to the physical and network environments. The framework returns to the Open Systems Interconnect (OSI) architecture with the addition of a standardized intra-layer control interface for control information exchange, a standardized data interface and a proposed device architecture based on the software radio.
User-centric design of a personal assistance robot (FRASIER) for active aging.
Padir, Taşkin; Skorinko, Jeanine; Dimitrov, Velin
2015-01-01
We present our preliminary results from the design process for developing the Worcester Polytechnic Institute's personal assistance robot, FRASIER, as an intelligent service robot for enabling active aging. The robot capabilities include vision-based object detection, tracking the user and help with carrying heavy items such as grocery bags or cafeteria trays. This work-in-progress report outlines our motivation and approach to developing the next generation of service robots for the elderly. Our main contribution in this paper is the development of a set of specifications based on the adopted user-centered design process, and realization of the prototype system designed to meet these specifications.
Demiris, George; Afrin, Lawrence B; Speedie, Stuart; Courtney, Karen L; Sondhi, Manu; Vimarlund, Vivian; Lovis, Christian; Goossen, William; Lynch, Cecil
2008-01-01
Advances in information technology (IT) enable a fundamental redesign of health care processes based on the use and integration of electronic communication at all levels. New communication technologies can support a transition from institution centric to patient-centric applications. This white paper defines key principles and challenges for designers, policy makers, and evaluators of patient-centered technologies for disease management and prevention. It reviews current and emerging trends; highlights challenges related to design, evaluation, reimbursement and usability; and reaches conclusions for next steps that will advance the domain.
Demiris, George; Afrin, Lawrence B.; Speedie, Stuart; Courtney, Karen L.; Sondhi, Manu; Vimarlund, Vivian; Lovis, Christian; Goossen, William; Lynch, Cecil
2008-01-01
Advances in information technology (IT) enable a fundamental redesign of health care processes based on the use and integration of electronic communication at all levels. New communication technologies can support a transition from institution centric to patient-centric applications. This white paper defines key principles and challenges for designers, policy makers, and evaluators of patient-centered technologies for disease management and prevention. It reviews current and emerging trends; highlights challenges related to design, evaluation, reimbursement and usability; and reaches conclusions for next steps that will advance the domain. PMID:17947617
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coram, Jamie L.; Morrow, James D.; Perkins, David Nikolaus
2015-09-01
This document describes the PANTHER R&D Application, a proof-of-concept user interface application developed under the PANTHER Grand Challenge LDRD. The purpose of the application is to explore interaction models for graph analytics, drive algorithmic improvements from an end-user point of view, and support demonstration of PANTHER technologies to potential customers. The R&D Application implements a graph-centric interaction model that exposes analysts to the algorithms contained within the GeoGraphy graph analytics library. Users define geospatial-temporal semantic graph queries by constructing search templates based on nodes, edges, and the constraints among them. Users then analyze the results of the queries using bothmore » geo-spatial and temporal visualizations. Development of this application has made user experience an explicit driver for project and algorithmic level decisions that will affect how analysts one day make use of PANTHER technologies.« less
ERIC Educational Resources Information Center
Nelson, Eric Derrand
2011-01-01
This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…
Electronic Personal Health Record Use Among Nurses in the Nursing Informatics Community.
Gartrell, Kyungsook; Trinkoff, Alison M; Storr, Carla L; Wilson, Marisa L
2015-07-01
An electronic personal health record is a patient-centric tool that enables patients to securely access, manage, and share their health information with healthcare providers. It is presumed the nursing informatics community would be early adopters of electronic personal health record, yet no studies have been identified that examine the personal adoption of electronic personal health record's for their own healthcare. For this study, we sampled nurse members of the American Medical Informatics Association and the Healthcare Information and Management Systems Society with 183 responding. Multiple logistic regression analysis was used to identify those factors associated with electronic personal health record use. Overall, 72% were electronic personal health record users. Users tended to be older (aged >50 years), be more highly educated (72% master's or doctoral degrees), and hold positions as clinical informatics specialists or chief nursing informatics officers. Those whose healthcare providers used electronic health records were significantly more likely to use electronic personal health records (odds ratio, 5.99; 95% confidence interval, 1.40-25.61). Electronic personal health record users were significantly less concerned about privacy of health information online than nonusers (odds ratio, 0.32; 95% confidence interval, 0.14-0.70) adjusted for ethnicity, race, and practice region. Informatics nurses, with their patient-centered view of technology, are in prime position to influence development of electronic personal health records. Our findings can inform policy efforts to encourage informatics and other professional nursing groups to become leaders and users of electronic personal health record; such use could help them endorse and engage patients to use electronic personal health records. Having champions with expertise in and enthusiasm for the new technology can promote the adoptionof electronic personal health records among healthcare providers as well as their patients.
Keogh, B; Callaghan, P; Higgins, A
2015-11-01
What is known on the subject? The time of discharge from a mental health hospital can be challenging for mental health service users, with high rates of readmission in the immediate months following discharge. Although some research exists that explores service users' perspectives of being discharged, little evidence exists that explores the processes influencing or used by service users' to adapt to the transition from in-patient acute mental health service. What this papers adds to existing knowledge? The findings of this grounded theory study demonstrates the strategies service users used to managed their own, as well as their social audiences, preconceived expectations arising from their new identity as 'psychiatric patients' following their discharge from hospital. While there is a move to develop recovery-orientated mental health services, key indicators of recovery-oriented practices were often absent from service users' experiences of service provision. What are the implications for practice? Nurses and other mental health professionals need to recognize their contribution to the architecture of stigma that transcends the physical structures of hospital or ward and are entrenched within attitudes, interactions and practices. The findings of this study can provide guidance to those working with service users and help them to understand the complexities of their experiences when using mental health services, which go far beyond the management of their symptoms. Following a period of hospitalization, the transition to home can result in increased vulnerability and a source of stress for mental health service users. Readmission rates have been suggested as one indicator of the success of the transition from hospital to community care. Despite knowledge of some of the factors that impact on service users following discharge, no coherent model or theoretical framework could be located in the literature, which explains or aides an in-depth understanding of the transition from hospital to community for service users. The aim of this study was to develop a grounded theory that explored service users' experiences of going home from hospital. This qualitative study used grounded theory, and a total of 35 interviews were conducted with 31 service users. The core category was 'Managing Preconceived Expectations', which had seven subcategories, describes how the participants were negatively perceived by themselves and others following their admission and discharge from hospital. This theory presents the strategies that the participants used to manage this new identity. This theory demonstrates that although there has been a move to adopt recovery-orientated services, key indicators of recovery were often absent for service users being admitted and subsequently discharged. © 2015 John Wiley & Sons Ltd.
Online Identities and Social Networking
NASA Astrophysics Data System (ADS)
Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien
Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.
A Prototype for Content-Rich Decision-Making Support in NOAA using Data as an Asset
NASA Astrophysics Data System (ADS)
Austin, M.; Peng, G.
2015-12-01
Data Producers and Data Providers do not always collaborate to ensure that the data meets the needs of a broad range of user communities. User needs are not always considered in the beginning of the data production and delivery phases. Often data experts are required to explain or create custom output so that the data can be used by decision makers. Lack of documentation and quality information can result in poor user acceptance or data misinterpretation. This presentation will describe how new content integration tools have been created by NOAA's National Environmental Satellite, Data, and Information Service (NESDIS) to improve quality throughout the data management lifecycle. The prototype integrates contents into a decision-making support tool from NOAA's Observing System Integrated Assessment (NOSIA) Value Tree, NOAA's Data Catalog/Digital Object Identifier (DOI) projects (collection-level metadata) and Data/Stewardship Maturity Matrices (Data and Stewardship Quality Rating Information). The National Centers for Environmental Information's (NCEI) Global Historical Climatology Network-Monthly (GHCN) dataset is used as a case study to formulate/develop the prototype tool and demonstrate its power with the content-centric approach in addition to completeness of metadata elements. This demonstrates the benefits of the prototype tool in both bottom roll-up and top roll-down fashion. The prototype tool delivers a standards based methodology that allows users to determine the quality and value of data that is fit for purpose. It encourages data producers and data providers/stewards to consider users' needs prior to data creation and dissemination resulting in user driven data requirements increasing return on investment.
Bucur, Anca; van Leeuwen, Jasper; Chen, Njin-Zu; Claerhout, Brecht; de Schepper, Kristof; Perez-Rey, David; Paraiso-Medina, Sergio; Alonso-Calvo, Raul; Mehta, Keyur; Krykwinski, Cyril
2016-01-01
This paper describes a new Cohort Selection application implemented to support streamlining the definition phase of multi-centric clinical research in oncology. Our approach aims at both ease of use and precision in defining the selection filters expressing the characteristics of the desired population. The application leverages our standards-based Semantic Interoperability Solution and a Groovy DSL to provide high expressiveness in the definition of filters and flexibility in their composition into complex selection graphs including splits and merges. Widely-adopted ontologies such as SNOMED-CT are used to represent the semantics of the data and to express concepts in the application filters, facilitating data sharing and collaboration on joint research questions in large communities of clinical users. The application supports patient data exploration and efficient collaboration in multi-site, heterogeneous and distributed data environments. PMID:27570644
Using Automated Blogging for Creation and Delivery of Topic-Centric News
ERIC Educational Resources Information Center
Crouse, David A.
2013-01-01
Every day, news relevant to Extension clientele is posted to the Internet from a variety of sources such as the popular press, scientific journals, and government agency press releases. In order to stay current with the information being published, an end-user must be following all of the possible sources of information. That task can be…
ERIC Educational Resources Information Center
Baird, Derek E.; Fisher, Mercedes
2006-01-01
Raised in the "always on" world of interactive media, the Internet, and digital messaging technologies, today's student has different expectations and learning styles than previous generations. This net-centric generation values their ability to use the Web to create a self-paced, customized, on-demand learning path that includes multiple forms of…
CILogon: An Integrated Identity and Access Management Platform for Science
NASA Astrophysics Data System (ADS)
Basney, J.
2016-12-01
When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid, SeedMe, and XSEDE. The "CILogon 2.0" platform, launched in 2016, adds support for virtual organization (VO) membership management, identity linking, international collaborations, and standard integration protocols, through integration with the Internet2 COmanage collaboration software.
Model-centric approaches for the development of health information systems.
Tuomainen, Mika; Mykkänen, Juha; Luostarinen, Heli; Pöyhölä, Assi; Paakkanen, Esa
2007-01-01
Modeling is used increasingly in healthcare to increase shared knowledge, to improve the processes, and to document the requirements of the solutions related to health information systems (HIS). There are numerous modeling approaches which aim to support these aims, but a careful assessment of their strengths, weaknesses and deficiencies is needed. In this paper, we compare three model-centric approaches in the context of HIS development: the Model-Driven Architecture, Business Process Modeling with BPMN and BPEL and the HL7 Development Framework. The comparison reveals that all these approaches are viable candidates for the development of HIS. However, they have distinct strengths and abstraction levels, they require local and project-specific adaptation and offer varying levels of automation. In addition, illustration of the solutions to the end users must be improved.
Revocable identity-based proxy re-signature against signing key exposure.
Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen
2018-01-01
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.
Revocable identity-based proxy re-signature against signing key exposure
Ma, Tingchun; Wang, Jinli; Wang, Caifen
2018-01-01
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125
Alam, Zaid; Peddinti, Gopal
2017-01-01
Abstract The advent of polypharmacology paradigm in drug discovery calls for novel chemoinformatic tools for analyzing compounds’ multi-targeting activities. Such tools should provide an intuitive representation of the chemical space through capturing and visualizing underlying patterns of compound similarities linked to their polypharmacological effects. Most of the existing compound-centric chemoinformatics tools lack interactive options and user interfaces that are critical for the real-time needs of chemical biologists carrying out compound screening experiments. Toward that end, we introduce C-SPADE, an open-source exploratory web-tool for interactive analysis and visualization of drug profiling assays (biochemical, cell-based or cell-free) using compound-centric similarity clustering. C-SPADE allows the users to visually map the chemical diversity of a screening panel, explore investigational compounds in terms of their similarity to the screening panel, perform polypharmacological analyses and guide drug-target interaction predictions. C-SPADE requires only the raw drug profiling data as input, and it automatically retrieves the structural information and constructs the compound clusters in real-time, thereby reducing the time required for manual analysis in drug development or repurposing applications. The web-tool provides a customizable visual workspace that can either be downloaded as figure or Newick tree file or shared as a hyperlink with other users. C-SPADE is freely available at http://cspade.fimm.fi/. PMID:28472495
The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas
NASA Astrophysics Data System (ADS)
Compañó, Ramón; Lusoli, Wainer
Regulators in Europe and elsewhere are paying great attention to identity, privacy and trust in online and converging environments. Appropriate regulation of identity in a ubiquitous information environment is seen as one of the major drivers of the future Internet economy. Regulation of personal identity data has come to the fore including mapping conducted on digital personhood by the OECD; work on human rights and profiling by the Council of Europe andmajor studies by the European Commission with regard to self-regulation in the privacy market, electronic identity technical interoperability and enhanced safety for young people. These domains overlap onto an increasingly complex model of regulation of individuals' identity management, online and offline. This chapter argues that policy makers struggle to deal with issues concerning electronic identity, due to the apparently irrational and unpredictable behavior of users when engaging in online interactions involving identity management. Building on empirical survey evidence from four EU countries, we examine the first aspect in detail - citizens' management of identity in a digital environment. We build on data from a large scale (n = 5,265) online survey of attitudes to electronic identity among young Europeans (France, Germany, Spain, UK) conducted in August 2008. The survey asked questions about perceptions and acceptance of risks, general motivations, attitudes and behaviors concerning electronic identity. Four behavioral paradoxes are identified in the analysis: a privacy paradox (to date well known), but also a control paradox, a responsibility paradox and an awareness paradox. The chapter then examines the paradoxes in relation of three main policy dilemmas framing the debate on digital identity. The paper concludes by arguing for an expanded identity debate spanning policy circles and the engineering community.
2005-06-01
virtualisation of distributed computing and data resources such as processing, network bandwidth, and storage capacity, to create a single system...and Simulation (M&S) will be integrated into this heterogeneous SOA. M&S functionality will be available in the form of operational M&S services. One...documents defining net centric warfare, the use of M&S functionality is a common theme. Alberts and Hayes give a good overview on net centric operations
2003-07-01
Centric Architecture Office ( NCAO ) should develop an RF communications/network management technology roadmap. The roadmap should serve two purposes: a...Centric Architecture Office ( NCAO ) chartered with integrating diverse DoD efforts to provide technical alternatives to the current form of radio...American people as a cornerstone of DoD’s leadership of the public trust in this area. The NCAO should be consolidated from ongoing NII, JTRS JPO and DDR
Creep and cracking of concrete hinges: insight from centric and eccentric compression experiments.
Schlappal, Thomas; Schweigler, Michael; Gmainer, Susanne; Peyerl, Martin; Pichler, Bernhard
2017-01-01
Existing design guidelines for concrete hinges consider bending-induced tensile cracking, but the structural behavior is oversimplified to be time-independent. This is the motivation to study creep and bending-induced tensile cracking of initially monolithic concrete hinges systematically. Material tests on plain concrete specimens and structural tests on marginally reinforced concrete hinges are performed. The experiments characterize material and structural creep under centric compression as well as bending-induced tensile cracking and the interaction between creep and cracking of concrete hinges. As for the latter two aims, three nominally identical concrete hinges are subjected to short-term and to longer-term eccentric compression tests. Obtained material and structural creep functions referring to centric compression are found to be very similar. The structural creep activity under eccentric compression is significantly larger because of the interaction between creep and cracking, i.e. bending-induced cracks progressively open and propagate under sustained eccentric loading. As for concrete hinges in frame-like integral bridge construction, it is concluded (i) that realistic simulation of variable loads requires consideration of the here-studied time-dependent behavior and (ii) that permanent compressive normal forces shall be limited by 45% of the ultimate load carrying capacity, in order to avoid damage of concrete hinges under sustained loading.
A complications-based clinical staging of obesity to guide treatment modality and intensity
Daniel, Sunil; Soleymani, Taraneh; Garvey, William T.
2014-01-01
Purpose of review The current medical model for obesity management is BMI-centric because BMI is the predominant measure used to gauge disease severity, as well as indications for various treatment modalities. Recent advancements in therapy and understanding of the relationship between BMI and obesity-related complications call for a re-examination of this approach. Recent findings Advancements in treatment, including the recent approval of two new weight loss medications in the USA, have enabled development of new medical models for management of obesity. On the basis of accumulating data demonstrating the benefits of weight loss regarding multiple obesity-related complications (e.g., diabetes prevention, type 2 diabetes mellitus, cardiovascular disease risk, nonalcoholic steatohepatitis, sleep apnea), a complications-centric model is proposed that employs weight loss as a tool to treat and prevent obesity comorbidities. This model assures that the aggressiveness of therapy is commensurate with disease severity, and that therapy is directed at those obese patients who will benefit most from weight loss therapy. The treatment algorithm is comprehensive in addressing complications and quantitative when possible in the staging of risk or disease severity. Summary A complications-centric approach to obesity management identifies patients who will benefit most from weight loss, and optimizes patient outcomes, benefit/risk ratio, and the cost–effectiveness of interventions. PMID:23974764
Overview of Human-Centric Space Situational Awareness Science and Technology
2012-09-01
AGI), the developers of Satellite Tool Kit ( STK ), has provided demonstrations of innovative SSA visualization concepts that take advantage of the...needs inherent with SSA. RH has conducted CTAs and developed work-centered human-computer interfaces, visualizations , and collaboration technologies...all end users. RH’s Battlespace Visualization Branch researches methods to exploit the visual channel primarily to improve decision making and
2016-01-22
basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its neighbors. If a response is...to a destination by using the set of ex- changed hello messages between users of the network. With suciently high frequency, hello messages are suc
Managing identity impacts associated with disclosure of HIV status: a qualitative investigation
Frye, Victoria; Fortin, Princess; MacKenzie, Sonja; Purcell, David; Edwards, Lorece V.; Mitchell, Shannon Gwin; Valverde, Eduardo; Garfein, R.; Metsch, Lisa; Latka, Mary H
2011-01-01
Disclosure of HIV status to potential and current sex partners by HIV-positive people (HIVPP) is a complex issue that has received a significant amount of attention. Research has found that disclosure depends upon the evaluation by HIVPP of potential benefits and risks, especially of the risks stemming from the profound social stigma of HIV and AIDS. Drawing on concepts from Goffman’s classic stigma theory and Anderson’s more recently developed cultural-identity theory of drug abuse, we analyzed data from in-depth, post-intervention qualitative interviews with 116 heterosexually active, HIV-positive injection drug users enrolled in a randomized trial of a behavioral intervention to prevent HIV transmission. We explored how disclosure experiences lead to “identity impacts” defined as: (1) identity challenges (i.e. interactions that challenge an individual’s self-concept as a “normal” or non-deviant individual); and (2) identity transformations (i.e. processes whereby an individual comes to embrace a new identity and reject behaviors and values of an old one, resulting in the conscious adoption of a social and/or public identity as an HIV-positive individual). Participants engaged in several strategies to manage the identity impacts associated with disclosure. Implications of these findings for research and prevention programming are discussed. PMID:20024764
Majeed, Abdul; Ullah, Farman; Lee, Sungchang
2017-05-08
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.
Majeed, Abdul; Ullah, Farman; Lee, Sungchang
2017-01-01
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298
OpenID Connect as a security service in cloud-based medical imaging systems.
Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter
2016-04-01
The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.
Platform for efficient switching between multiple devices in the intensive care unit.
De Backere, F; Vanhove, T; Dejonghe, E; Feys, M; Herinckx, T; Vankelecom, J; Decruyenaere, J; De Turck, F
2015-01-01
This article is part of the Focus Theme of METHODS of Information in Medicine on "Managing Interoperability and Complexity in Health Systems". Handheld computers, such as tablets and smartphones, are becoming more and more accessible in the clinical care setting and in Intensive Care Units (ICUs). By making the most useful and appropriate data available on multiple devices and facilitate the switching between those devices, staff members can efficiently integrate them in their workflow, allowing for faster and more accurate decisions. This paper addresses the design of a platform for the efficient switching between multiple devices in the ICU. The key functionalities of the platform are the integration of the platform into the workflow of the medical staff and providing tailored and dynamic information at the point of care. The platform is designed based on a 3-tier architecture with a focus on extensibility, scalability and an optimal user experience. After identification to a device using Near Field Communication (NFC), the appropriate medical information will be shown on the selected device. The visualization of the data is adapted to the type of the device. A web-centric approach was used to enable extensibility and portability. A prototype of the platform was thoroughly evaluated. The scalability, performance and user experience were evaluated. Performance tests show that the response time of the system scales linearly with the amount of data. Measurements with up to 20 devices have shown no performance loss due to the concurrent use of multiple devices. The platform provides a scalable and responsive solution to enable the efficient switching between multiple devices. Due to the web-centric approach new devices can easily be integrated. The performance and scalability of the platform have been evaluated and it was shown that the response time and scalability of the platform was within an acceptable range.
Globus Identity, Access, and Data Management: Platform Services for Collaborative Science
NASA Astrophysics Data System (ADS)
Ananthakrishnan, R.; Foster, I.; Wagner, R.
2016-12-01
Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.
Kosta, Eleni; Pitkänen, Olli; Niemelä, Marketta; Kaasinen, Eija
2010-06-01
Ambient Intelligence provides the potential for vast and varied applications, bringing with it both promise and peril. The development of Ambient Intelligence applications poses a number of ethical and legal concerns. Mobile devices are increasingly evolving into tools to orientate in and interact with the environment, thus introducing a user-centric approach to Ambient Intelligence. The MINAmI (Micro-Nano integrated platform for transverse Ambient Intelligence applications) FP6 research project aims at creating core technologies for mobile device based Ambient Intelligence services. In this paper we assess five scenarios that demonstrate forthcoming MINAmI-based applications focusing on healthcare, assistive technology, homecare, and everyday life in general. A legal and ethical analysis of the scenarios is conducted, which reveals various conflicting interests. The paper concludes with some thoughts on drafting ethical guidelines for Ambient Intelligence applications.
Mobile user identity sensing using the motion sensor
NASA Astrophysics Data System (ADS)
Zhao, Xi; Feng, Tao; Xu, Lei; Shi, Weidong
2014-05-01
Employing mobile sensor data to recognize user behavioral activities has been well studied in recent years. However, to adopt the data as a biometric modality has rarely been explored. Existing methods either used the data to recognize gait, which is considered as a distinguished identity feature; or segmented a specific kind of motion for user recognition, such as phone picking-up motion. Since the identity and the motion gesture jointly affect motion data, to fix the gesture (walking or phone picking-up) definitively simplifies the identity sensing problem. However, it meanwhile introduces the complexity from gesture detection or requirement on a higher sample rate from motion sensor readings, which may draw the battery fast and affect the usability of the phone. In general, it is still under investigation that motion based user authentication in a large scale satisfies the accuracy requirement as a stand-alone biometrics modality. In this paper, we propose a novel approach to use the motion sensor readings for user identity sensing. Instead of decoupling the user identity from a gesture, we reasonably assume users have their own distinguishing phone usage habits and extract the identity from fuzzy activity patterns, represented by a combination of body movements whose signals in chains span in relative low frequency spectrum and hand movements whose signals span in relative high frequency spectrum. Then Bayesian Rules are applied to analyze the dependency of different frequency components in the signals. During testing, a posterior probability of user identity given the observed chains can be computed for authentication. Tested on an accelerometer dataset with 347 users, our approach has demonstrated the promising results.
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
BT's adoption of customer centric design.
Chamberlain, Mark; Esquivel, Jacqueline; Miller, Fiona; Patmore, Jeff
2015-01-01
Between 2005 and 2010 BT underwent a major transformation from a company with a special section devoted to 'older and disabled consumers' to a company with an inclusive design strategy. The mainstreaming of these issues responded to a demand for better, more user-friendly communications products and growing awareness of the importance of previously marginalised consumer groups. It also took place alongside the development and publication of BS7000-6, a guide to inclusive design management. Based on several product design case studies, this paper reflects on how and why this transformation was seen as necessary for future success, and how the transformation was achieved. The evolution of BT's approach has continued since, but this paper looks back in time, and documents the transformation up to 2010 and reflects the state of the company in 2010 rather than at the time of publication. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
User-Defined Data Distributions in High-Level Programming Languages
NASA Technical Reports Server (NTRS)
Diaconescu, Roxana E.; Zima, Hans P.
2006-01-01
One of the characteristic features of today s high performance computing systems is a physically distributed memory. Efficient management of locality is essential for meeting key performance requirements for these architectures. The standard technique for dealing with this issue has involved the extension of traditional sequential programming languages with explicit message passing, in the context of a processor-centric view of parallel computation. This has resulted in complex and error-prone assembly-style codes in which algorithms and communication are inextricably interwoven. This paper presents a high-level approach to the design and implementation of data distributions. Our work is motivated by the need to improve the current parallel programming methodology by introducing a paradigm supporting the development of efficient and reusable parallel code. This approach is currently being implemented in the context of a new programming language called Chapel, which is designed in the HPCS project Cascade.
Post, Andrew; Oeur, Anna; Walsh, Evan; Hoshizaki, Blaine; Gilchrist, Michael D
2014-01-01
American football reports high incidences of head injuries, in particular, concussion. Research has described concussion as primarily a rotation dominant injury affecting the diffuse areas of brain tissue. Current standards do not measure how helmets manage rotational acceleration or how acceleration loading curves influence brain deformation from an impact and thus are missing important information in terms of how concussions occur. The purpose of this study was to investigate a proposed three-dimensional impact protocol for use in evaluating football helmets. The dynamic responses resulting from centric and non-centric impact conditions were examined to ascertain the influence they have on brain deformations in different functional regions of the brain that are linked to concussive symptoms. A centric and non-centric protocol was used to impact an American football helmet; the resulting dynamic response data was used in conjunction with a three-dimensional finite element analysis of the human brain to calculate brain tissue deformation. The direction of impact created unique loading conditions, resulting in peaks in different regions of the brain associated with concussive symptoms. The linear and rotational accelerations were not predictive of the brain deformation metrics used in this study. In conclusion, the test protocol used in this study revealed that impact conditions influences the region of loading in functional regions of brain tissue that are associated with the symptoms of concussion. The protocol also demonstrated that using brain deformation metrics may be more appropriate when evaluating risk of concussion than using dynamic response data alone.
Dynamic User Interfaces for Service Oriented Architectures in Healthcare.
Schweitzer, Marco; Hoerbst, Alexander
2016-01-01
Electronic Health Records (EHRs) play a crucial role in healthcare today. Considering a data-centric view, EHRs are very advanced as they provide and share healthcare data in a cross-institutional and patient-centered way adhering to high syntactic and semantic interoperability. However, the EHR functionalities available for the end users are rare and hence often limited to basic document query functions. Future EHR use necessitates the ability to let the users define their needed data according to a certain situation and how this data should be processed. Workflow and semantic modelling approaches as well as Web services provide means to fulfil such a goal. This thesis develops concepts for dynamic interfaces between EHR end users and a service oriented eHealth infrastructure, which allow the users to design their flexible EHR needs, modeled in a dynamic and formal way. These are used to discover, compose and execute the right Semantic Web services.
Xu Chen; Berry, Damon; Stephens, Gaye
2015-01-01
Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih
2016-11-01
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.
A Network Centric Warfare (NCW) Compliance Process for Australian Defence
2006-08-01
discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements
Multi-model-based interactive authoring environment for creating shareable medical knowledge.
Ali, Taqdir; Hussain, Maqbool; Ali Khan, Wajahat; Afzal, Muhammad; Hussain, Jamil; Ali, Rahman; Hassan, Waseem; Jamshed, Arif; Kang, Byeong Ho; Lee, Sungyoung
2017-10-01
Technologically integrated healthcare environments can be realized if physicians are encouraged to use smart systems for the creation and sharing of knowledge used in clinical decision support systems (CDSS). While CDSSs are heading toward smart environments, they lack support for abstraction of technology-oriented knowledge from physicians. Therefore, abstraction in the form of a user-friendly and flexible authoring environment is required in order for physicians to create shareable and interoperable knowledge for CDSS workflows. Our proposed system provides a user-friendly authoring environment to create Arden Syntax MLM (Medical Logic Module) as shareable knowledge rules for intelligent decision-making by CDSS. Existing systems are not physician friendly and lack interoperability and shareability of knowledge. In this paper, we proposed Intelligent-Knowledge Authoring Tool (I-KAT), a knowledge authoring environment that overcomes the above mentioned limitations. Shareability is achieved by creating a knowledge base from MLMs using Arden Syntax. Interoperability is enhanced using standard data models and terminologies. However, creation of shareable and interoperable knowledge using Arden Syntax without abstraction increases complexity, which ultimately makes it difficult for physicians to use the authoring environment. Therefore, physician friendliness is provided by abstraction at the application layer to reduce complexity. This abstraction is regulated by mappings created between legacy system concepts, which are modeled as domain clinical model (DCM) and decision support standards such as virtual medical record (vMR) and Systematized Nomenclature of Medicine - Clinical Terms (SNOMED CT). We represent these mappings with a semantic reconciliation model (SRM). The objective of the study is the creation of shareable and interoperable knowledge using a user-friendly and flexible I-KAT. Therefore we evaluated our system using completeness and user satisfaction criteria, which we assessed through the system- and user-centric evaluation processes. For system-centric evaluation, we compared the implementation of clinical information modelling system requirements in our proposed system and in existing systems. The results suggested that 82.05% of the requirements were fully supported, 7.69% were partially supported, and 10.25% were not supported by our system. In the existing systems, 35.89% of requirements were fully supported, 28.20% were partially supported, and 35.89% were not supported. For user-centric evaluation, the assessment criterion was 'ease of use'. Our proposed system showed 15 times better results with respect to MLM creation time than the existing systems. Moreover, on average, the participants made only one error in MLM creation using our proposed system, but 13 errors per MLM using the existing systems. We provide a user-friendly authoring environment for creation of shareable and interoperable knowledge for CDSS to overcome knowledge acquisition complexity. The authoring environment uses state-of-the-art decision support-related clinical standards with increased ease of use. Copyright © 2017 Elsevier B.V. All rights reserved.
Myneni, Sahiti; Patel, Vimla L.; Bova, G. Steven; Wang, Jian; Ackerman, Christopher F.; Berlinicke, Cynthia A.; Chen, Steve H.; Lindvall, Mikael; Zack, Donald J.
2016-01-01
This paper describes a distributed collaborative effort between industry and academia to systematize data management in an academic biomedical laboratory. Heterogeneous and voluminous nature of research data created in biomedical laboratories make information management difficult and research unproductive. One such collaborative effort was evaluated over a period of four years using data collection methods including ethnographic observations, semi-structured interviews, web-based surveys, progress reports, conference call summaries, and face-to-face group discussions. Data were analyzed using qualitative methods of data analysis to 1) characterize specific problems faced by biomedical researchers with traditional information management practices, 2) identify intervention areas to introduce a new research information management system called Labmatrix, and finally to 3) evaluate and delineate important general collaboration (intervention) characteristics that can optimize outcomes of an implementation process in biomedical laboratories. Results emphasize the importance of end user perseverance, human-centric interoperability evaluation, and demonstration of return on investment of effort and time of laboratory members and industry personnel for success of implementation process. In addition, there is an intrinsic learning component associated with the implementation process of an information management system. Technology transfer experience in a complex environment such as the biomedical laboratory can be eased with use of information systems that support human and cognitive interoperability. Such informatics features can also contribute to successful collaboration and hopefully to scientific productivity. PMID:26652980
AllAboard: Visual Exploration of Cellphone Mobility Data to Optimise Public Transport.
Di Lorenzo, G; Sbodio, M; Calabrese, F; Berlingerio, M; Pinelli, F; Nair, R
2016-02-01
The deep penetration of mobile phones offers cities the ability to opportunistically monitor citizens' mobility and use data-driven insights to better plan and manage services. With large scale data on mobility patterns, operators can move away from the costly, mostly survey based, transportation planning processes, to a more data-centric view, that places the instrumented user at the center of development. In this framework, using mobile phone data to perform transit analysis and optimization represents a new frontier with significant societal impact, especially in developing countries. In this paper we present AllAboard, an intelligent tool that analyses cellphone data to help city authorities in visually exploring urban mobility and optimizing public transport. This is performed within a self contained tool, as opposed to the current solutions which rely on a combination of several distinct tools for analysis, reporting, optimisation and planning. An interactive user interface allows transit operators to visually explore the travel demand in both space and time, correlate it with the transit network, and evaluate the quality of service that a transit network provides to the citizens at very fine grain. Operators can visually test scenarios for transit network improvements, and compare the expected impact on the travellers' experience. The system has been tested using real telecommunication data for the city of Abidjan, Ivory Coast, and evaluated from a data mining, optimisation and user prospective.
MEDLINE SDI services: how do they compare?*
Shultz, Mary; De Groote, Sandra L.
2003-01-01
Introduction: Selective dissemination of information (SDI) services regularly alert users to new information on their chosen topics. This type of service can increase a user's ability to keep current and may have a positive impact on efficiency and productivity. Currently, there are many venues available where users can establish, store, and automatically run MEDLINE searches. Purpose: To describe, evaluate, and compare SDI services for MEDLINE. Resources: The following SDI services were selected for this study: PubMed Cubby, BioMail, JADE, PubCrawler, OVID, and ScienceDirect. Methodology: Identical searches were established in four of the six selected SDI services and were run on a weekly basis over a period of two months. Eight search strategies were used in each system to test performance under various search conditions. The PubMed Cubby system was used as the baseline against which the other systems were compared. Other aspects were evaluated in all six services and include ease of use, frequency of results, ability to use MeSH, ability to access and edit existing search strategies, and ability to download to a bibliographic management program. Results: Not all MEDLINE SDI services retrieve identical results, even when identical search strategies are used. This study also showed that the services vary in terms of features and functions offered. PMID:14566377
CAD Services: an Industry Standard Interface for Mechanical CAD Interoperability
NASA Technical Reports Server (NTRS)
Claus, Russell; Weitzer, Ilan
2002-01-01
Most organizations seek to design and develop new products in increasingly shorter time periods. At the same time, increased performance demands require a team-based multidisciplinary design process that may span several organizations. One approach to meet these demands is to use 'Geometry Centric' design. In this approach, design engineers team their efforts through one united representation of the design that is usually captured in a CAD system. Standards-based interfaces are critical to provide uniform, simple, distributed services that enable the 'Geometry Centric' design approach. This paper describes an industry-wide effort, under the Object Management Group's (OMG) Manufacturing Domain Task Force, to define interfaces that enable the interoperability of CAD, Computer Aided Manufacturing (CAM), and Computer Aided Engineering (CAE) tools. This critical link to enable 'Geometry Centric' design is called: Cad Services V1.0. This paper discusses the features of this standard and proposed application.
Update - Concept of Operations for Integrated Model-Centric Engineering at JPL
NASA Technical Reports Server (NTRS)
Bayer, Todd J.; Bennett, Matthew; Delp, Christopher L.; Dvorak, Daniel; Jenkins, Steven J.; Mandutianu, Sanda
2011-01-01
The increasingly ambitious requirements levied on JPL's space science missions, and the development pace of such missions, challenge our current engineering practices. All the engineering disciplines face this growth in complexity to some degree, but the challenges are greatest in systems engineering where numerous competing interests must be reconciled and where complex system level interactions must be identified and managed. Undesired system-level interactions are increasingly a major risk factor that cannot be reliably exposed by testing, and natural-language single-viewpoint specifications areinadequate to capture and expose system level interactions and characteristics. Systems engineering practices must improve to meet these challenges, and the most promising approach today is the movement toward a more integrated and model-centric approach to mission conception, design, implementation and operations. This approach elevates engineering models to a principal role in systems engineering, gradually replacing traditional document centric engineering practices.
NASA Astrophysics Data System (ADS)
Xu, Boyi; Xu, Li Da; Fei, Xiang; Jiang, Lihong; Cai, Hongming; Wang, Shuai
2017-08-01
Facing the rapidly changing business environments, implementation of flexible business process is crucial, but difficult especially in data-intensive application areas. This study aims to provide scalable and easily accessible information resources to leverage business process management. In this article, with a resource-oriented approach, enterprise data resources are represented as data-centric Web services, grouped on-demand of business requirement and configured dynamically to adapt to changing business processes. First, a configurable architecture CIRPA involving information resource pool is proposed to act as a scalable and dynamic platform to virtualise enterprise information resources as data-centric Web services. By exposing data-centric resources as REST services in larger granularities, tenant-isolated information resources could be accessed in business process execution. Second, dynamic information resource pool is designed to fulfil configurable and on-demand data accessing in business process execution. CIRPA also isolates transaction data from business process while supporting diverse business processes composition. Finally, a case study of using our method in logistics application shows that CIRPA provides an enhanced performance both in static service encapsulation and dynamic service execution in cloud computing environment.
Exploring a Net Centric Architecture Using the Net Warrior Airborne Early Warning and Control Node
2007-12-01
implemented in different languages. Customisation Interfaces for customising components. User-friendly customisation tools will use these interfaces...Sun Enterprise Java Beans. Customisation Customisation in the context of components is defined in [Heineman & Councill 2001, p. 42] as ‘…the ability...of a consumer to adapt a component prior to its installation or use’. Customisation can be facilitated through the use of specialised interfaces
Capabilities in Context: Evaluating the Net-Centric Enterprise
2009-03-01
with an intuitive keyword search using the enterprise’s federated search capability. Service accessibility. Testers will ensure that local service has...search using the enterprise’s federated search capability. Data accessibility. Testers will ensure that Feder- ated Search results provide active link...user may request access to the data, and be available within ‘‘2 clicks’’ from the active link provided by Federated Search . Data understandability
Anthro-Centric Multisensory Interface for Vision Augmentation/Substitution
2013-02-01
for human perception of the visual environment. Figure 1: (left) Photograph of the Argus™ I and II Retinal Prosthesis System epiretinal...scleralband (a);the visualprocessing unit (b);spectacle m ounted m iniature cam era (c). Figure 3. C olour photo of A rgus II epiretinal prosthesis ...items in the environment. Alternatively, we have also implemented a touch screen mechanism that allows the user to feel the pixels under his or her
Data Serving Climate Simulation Science at the NASA Center for Climate Simulation
NASA Technical Reports Server (NTRS)
Salmon, Ellen M.
2011-01-01
The NASA Center for Climate Simulation (NCCS) provides high performance computational resources, a multi-petabyte archive, and data services in support of climate simulation research and other NASA-sponsored science. This talk describes the NCCS's data-centric architecture and processing, which are evolving in anticipation of researchers' growing requirements for higher resolution simulations and increased data sharing among NCCS users and the external science community.
SCPortalen: human and mouse single-cell centric database
Noguchi, Shuhei; Böttcher, Michael; Hasegawa, Akira; Kouno, Tsukasa; Kato, Sachi; Tada, Yuhki; Ura, Hiroki; Abe, Kuniya; Shin, Jay W; Plessy, Charles; Carninci, Piero
2018-01-01
Abstract Published single-cell datasets are rich resources for investigators who want to address questions not originally asked by the creators of the datasets. The single-cell datasets might be obtained by different protocols and diverse analysis strategies. The main challenge in utilizing such single-cell data is how we can make the various large-scale datasets to be comparable and reusable in a different context. To challenge this issue, we developed the single-cell centric database ‘SCPortalen’ (http://single-cell.clst.riken.jp/). The current version of the database covers human and mouse single-cell transcriptomics datasets that are publicly available from the INSDC sites. The original metadata was manually curated and single-cell samples were annotated with standard ontology terms. Following that, common quality assessment procedures were conducted to check the quality of the raw sequence. Furthermore, primary data processing of the raw data followed by advanced analyses and interpretation have been performed from scratch using our pipeline. In addition to the transcriptomics data, SCPortalen provides access to single-cell image files whenever available. The target users of SCPortalen are all researchers interested in specific cell types or population heterogeneity. Through the web interface of SCPortalen users are easily able to search, explore and download the single-cell datasets of their interests. PMID:29045713
DiAs User Interface: A Patient-Centric Interface for Mobile Artificial Pancreas Systems
Keith-Hynes, Patrick; Guerlain, Stephanie; Mize, Benton; Hughes-Karvetski, Colleen; Khan, Momin; McElwee-Malloy, Molly; Kovatchev, Boris P.
2013-01-01
Background Recent in-hospital studies of artificial pancreas (AP) systems have shown promising results in improving glycemic control in patients with type 1 diabetes mellitus. The next logical step in AP development is to conduct transitional outpatient clinical trials with a mobile system that is controlled by the patient. In this article, we present the user interface (UI) of the Diabetes Assistant (DiAs), an experimental smartphone-based mobile AP system, and describe the reactions of a round of focus groups to the UI. This work is an initial inquiry involving a relatively small number of potential users, many of whom had never seen an AP system before, and the results should be understood in that light. Methods We began by considering how the UI of an AP system could be designed to make use of the familiar touch-based graphical UI of a consumer smartphone. After developing a working prototype UI, we enlisted a human factors specialist to perform a heuristic expert analysis. Next we conducted a formative evaluation of the UI through a series of three focus groups with N = 13 potential end users as participants. The UI was modified based upon the results of these studies, and the resulting DiAs system was used in transitional outpatient AP studies of adults in the United States and Europe. Results The DiAs UI was modified based on focus group feedback from potential users. The DiAs was subsequently used in JDRF- and AP@Home-sponsored transitional outpatient AP studies in the United States and Europe by 40 subjects for 2400 h with no adverse events. Conclusions Adult patients with type 1 diabetes mellitus are able to control an AP system successfully using a patient-centric UI on a commercial smartphone in a transitional outpatient environment. PMID:24351168
Smart Homes for All: Collaborating Services in a for-All Architecture for Domotics
NASA Astrophysics Data System (ADS)
Catarci, Tiziana; Cincotti, Febo; de Leoni, Massimiliano; Mecella, Massimo; Santucci, Giuseppe
Nowadays, control equipments such as automobiles, home appliances, communication, control and office machines, offer their functionalities in the form of services. Such service pervasivity is particularly evident in immersive realities, i.e., scenarios in which invisible embedded systems need to continuously interact with human users, in order to provide continuous sensed information and to react to service requests from the users themselves. The sm4all project, which will be presented in this paper, is investigating an innovative middleware platform for collaborating smart embedded services in immersive and person-centric environments, through the use of composability and semantic techniques.
A cloud-based X73 ubiquitous mobile healthcare system: design and implementation.
Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji
2014-01-01
Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed "big data" processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems.
2006-04-01
and Scalability, (2) Sensors and Platforms, (3) Distributed Computing and Processing , (4) Information Management, (5) Fusion and Resource Management...use of the deployed system. 3.3 Distributed Computing and Processing Session The Distributed Computing and Processing Session consisted of three
Globus: Service and Platform for Research Data Lifecycle Management
NASA Astrophysics Data System (ADS)
Ananthakrishnan, R.; Foster, I.
2017-12-01
Globus offers a range of data management capabilities to the community as hosted services, encompassing data transfer and sharing, user identity and authorization, and data publication. Globus capabilities are accessible via both a web browser and REST APIs. Web access allows researchers to use Globus capabilities through a software-as-a-service model; and the REST APIs address the needs of developers of research services, who can now use Globus as a platform, outsourcing complex user and data management tasks to Globus services. In this presentation, we review Globus capabilities and outline how it is being applied as a platform for scientific services, and highlight work done to link computational analysis flows to the underlying data through an interactive Jupyter notebook environment to promote immediate data usability, reusability of these flows by other researchers, and future analysis extensibility.
Flitter, Marc A; Riesenmy, Kelly Rouse; van Stralen, Daved
2012-01-01
To offer a theoretical explanation for observed physician resistance and rejection of high reliability patient safety initiatives. A grounded theoretical qualitative approach, utilizing the organizational theory of sensemaking, provided the foundation for inductive and deductive reasoning employed to analyze medical staff rejection of two successfully performing high reliability programs at separate hospitals. Physician behaviors resistant to patient-centric high reliability processes were traced to provider-centric physician sensemaking. Research, conducted with the advantage that prospective studies have over the limitations of this retrospective investigation, is needed to evaluate the potential for overcoming physician resistance to innovation implementation, employing strategies based upon these findings and sensemaking theory in general. If hospitals are to emulate high reliability industries that do successfully manage environments of extreme hazard, physicians must be fully integrated into the complex teams required to accomplish this goal. Reforming health care, through high reliability organizing, with its attendant continuous focus on patient-centric processes, offers a distinct alternative to efforts directed primarily at reforming health care insurance. It is by changing how health care is provided that true cost efficiencies can be achieved. Technology and the insights of organizational science present the opportunity of replacing the current emphasis on privileged information with collective tools capable of providing quality and safety in health care. The fictions that have sustained a provider-centric health care system have been challenged. The benefits of patient-centric care should be obtainable.
MycoCosm, an Integrated Fungal Genomics Resource
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shabalov, Igor; Grigoriev, Igor
2012-03-16
MycoCosm is a web-based interactive fungal genomics resource, which was first released in March 2010, in response to an urgent call from the fungal community for integration of all fungal genomes and analytical tools in one place (Pan-fungal data resources meeting, Feb 21-22, 2010, Alexandria, VA). MycoCosm integrates genomics data and analysis tools to navigate through over 100 fungal genomes sequenced at JGI and elsewhere. This resource allows users to explore fungal genomes in the context of both genome-centric analysis and comparative genomics, and promotes user community participation in data submission, annotation and analysis. MycoCosm has over 4500 unique visitors/monthmore » or 35000+ visitors/year as well as hundreds of registered users contributing their data and expertise to this resource. Its scalable architecture allows significant expansion of the data expected from JGI Fungal Genomics Program, its users, and integration with external resources used by fungal community.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-19
... the Office of Management and Budget (OMB). You may submit comments by the following methods: Email... required to have electronic Internet access to register in the Delphi eInvoicing system. Grantees will be.... The identities of system users must be verified prior to receiving access to the Delphi eInvoicing...
NASA Astrophysics Data System (ADS)
Medini, Khaled
2018-01-01
The increase of individualised customer demands and tough competition in the manufacturing sector gave rise to more customer-centric operations management such as products and services (mass) customisation. Mass customisation (MC), which inherits the 'economy of scale' from mass production (MP), aims to meet specific customer demands with near MP efficiency. Such an overarching concept has multiple impacts on operations management. This requires highly qualified and multi-skilled engineers who are well prepared for managing MC. Therefore, this concept should be properly addressed by engineering education curricula which needs to keep up with the emerging business trends. This paper introduces a novel course about MC and variety in operations management which recalls several Experiential Learning (EL) practices consistently with the principle of an active learning. The paper aims to analyse to which extent EL can improve the efficiency of the teaching methods and the retention rate in the context of operations management. The proposed course is given to engineering students whose' perceptions are collected using semi-structured questionnaires and analysed quantitatively and qualitatively. The paper highlights the relevance (i) of teaching MC, and (ii) of active learning in engineering education, through the specific application in the domain of MC.
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
2007-04-01
and/or time de-confliction to insure safe separation of component forces. For example, in the Vietnam era, Air Force units were employed in the Hanoi...systems and people to exploit it. For example, Accenture (Accenture.com), a $15 billion global management consulting and technology services company ...information managers (called knowledge managers) to functional specialties, such as oil, gas, insurance , and pharmaceuticals. Information managers collect
The usability axiom of medical information systems.
Pantazi, Stefan V; Kushniruk, Andre; Moehr, Jochen R
2006-12-01
In this article we begin by connecting the concept of simplicity of user interfaces of information systems with that of usability, and the concept of complexity of the problem-solving in information systems with the concept of usefulness. We continue by stating "the usability axiom" of medical information technology: information systems must be, at the same time, usable and useful. We then try to show why, given existing technology, the axiom is a paradox and we continue with analysing and reformulating it several times, from more fundamental information processing perspectives. We underline the importance of the concept of representation and demonstrate the need for context-dependent representations. By means of thought experiments and examples, we advocate the need for context-dependent information processing and argue for the relevance of algorithmic information theory and case-based reasoning in this context. Further, we introduce the notion of concept spaces and offer a pragmatic perspective on context-dependent representations. We conclude that the efficient management of concept spaces may help with the solution to the medical information technology paradox. Finally, we propose a view of informatics centred on the concepts of context-dependent information processing and management of concept spaces that aligns well with existing knowledge centric definitions of informatics in general and medical informatics in particular. In effect, our view extends M. Musen's proposal and proposes a definition of Medical Informatics as context-dependent medical information processing. The axiom that medical information systems must be, at the same time, useful and usable, is a paradox and its investigation by means of examples and thought experiments leads to the recognition of the crucial importance of context-dependent information processing. On the premise that context-dependent information processing equates to knowledge processing, this view defines Medical Informatics as a context-dependent medical information processing which aligns well with existing knowledge centric definitions of our field.
REST based mobile applications
NASA Astrophysics Data System (ADS)
Rambow, Mark; Preuss, Thomas; Berdux, Jörg; Conrad, Marc
2008-02-01
Simplicity is the major advantage of REST based webservices. Whereas SOAP is widespread in complex, security sensitive business-to-business aplications, REST is widely used for mashups and end-user centric applicatons. In that context we give an overview of REST and compare it to SOAP. Furthermore we apply the GeoDrawing application as an example for REST based mobile applications and emphasize on pros and cons for the use of REST in mobile application scenarios.
2007-05-17
metadata formats, metadata repositories, enterprise portals and federated search engines that make data visible, available, and usable to users...and provides the metadata formats, metadata repositories, enterprise portals and federated search engines that make data visible, available, and...develop an enterprise- wide data sharing plan, establishment of mission area governance processes for CIOs, DISA development of federated search specifications
ECHO Services: Foundational Middleware for a Science Cyberinfrastructure
NASA Technical Reports Server (NTRS)
Burnett, Michael
2005-01-01
This viewgraph presentation describes ECHO, an interoperability middleware solution. It uses open, XML-based APIs, and supports net-centric architectures and solutions. ECHO has a set of interoperable registries for both data (metadata) and services, and provides user accounts and a common infrastructure for the registries. It is built upon a layered architecture with extensible infrastructure for supporting community unique protocols. It has been operational since November, 2002 and it available as open source.
Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare
2004-12-01
service providers (ISP), users now have multiple access points to enter the web whether at work, at home, or even at Starbucks . Besides having...benefits, they will advertise them to their peers outside organizational lines. The Battlefield Universal Gateway Equipment (BUG-E) is an example of...engagement that eBay institutionalized. They also expect to collect their commission for each sale . The “command intent” is clearly recognized by all
Anthro-Centric Multisensory Interface for Vision Augmentation/Substitution
2011-02-01
Alternatively, we have also implemented a touch screen mechanism that allows the user to feel the pixels under his or her fingertip via the tongue while...recognition with the optic nerve visual prosthesis . Artificial Organs, 27, 996 – 1004. Walcott, E. C., & Langdon, R. B. (2001). Short-term plasticity of...National Academy of Sciences, 102(4), 1181-1186. Weiland, J. D., Liu, W., & Humayun, M. S. (2005). Retinal prosthesis . Annual Review of Biomedical
An XML Data Model for Inverted Image Indexing
NASA Astrophysics Data System (ADS)
So, Simon W.; Leung, Clement H. C.; Tse, Philip K. C.
2003-01-01
The Internet world makes increasing use of XML-based technologies. In multimedia data indexing and retrieval, the MPEG-7 standard for Multimedia Description Scheme is specified using XML. The flexibility of XML allows users to define other markup semantics for special contexts, construct data-centric XML documents, exchange standardized data between computer systems, and present data in different applications. In this paper, the Inverted Image Indexing paradigm is presented and modeled using XML Schema.
DEVS Unified Process for Web-Centric Development and Testing of System of Systems
2008-05-20
gathering from the user. Further, methodologies have been developed to generate DEVS models from BPMN /BPEL-based and message-based requirement specifications...27] 3. BPMN /BPEL based system specifications: Business Process Modeling Notation ( BPMN ) [bpm] or Business Process Execution Language (BPEL) provide a...information is stored in .wsdl and .bpel files for BPEL but in proprietary format for BPMN . 4. DoDAF-based requirement specifications: Department of
2006-09-01
automated agents , such as chatbots to acts as a relay between chatrooms and blogs or other systems. In particular, chatbots could be used to monitor...bandwidth connections and legacy systems. Chatbot Integration The use of connected autonomous agents that monitor chatrooms to allow users access...of Cell Phone GPS Tracking. .............84 Figure 35. Example of a Chatbot Creating a Blog Entry
OpenID Connect as a security service in cloud-based medical imaging systems
Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter
2016-01-01
Abstract. The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as “Kerberos of cloud.” We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model. PMID:27340682
Hu, Yu-Chen
2018-01-01
The emergence of smart Internet of Things (IoT) devices has highly favored the realization of smart homes in a down-stream sector of a smart grid. The underlying objective of Demand Response (DR) schemes is to actively engage customers to modify their energy consumption on domestic appliances in response to pricing signals. Domestic appliance scheduling is widely accepted as an effective mechanism to manage domestic energy consumption intelligently. Besides, to residential customers for DR implementation, maintaining a balance between energy consumption cost and users’ comfort satisfaction is a challenge. Hence, in this paper, a constrained Particle Swarm Optimization (PSO)-based residential consumer-centric load-scheduling method is proposed. The method can be further featured with edge computing. In contrast with cloud computing, edge computing—a method of optimizing cloud computing technologies by driving computing capabilities at the IoT edge of the Internet as one of the emerging trends in engineering technology—addresses bandwidth-intensive contents and latency-sensitive applications required among sensors and central data centers through data analytics at or near the source of data. A non-intrusive load-monitoring technique proposed previously is utilized to automatic determination of physical characteristics of power-intensive home appliances from users’ life patterns. The swarm intelligence, constrained PSO, is used to minimize the energy consumption cost while considering users’ comfort satisfaction for DR implementation. The residential consumer-centric load-scheduling method proposed in this paper is evaluated under real-time pricing with inclining block rates and is demonstrated in a case study. The experimentation reported in this paper shows the proposed residential consumer-centric load-scheduling method can re-shape loads by home appliances in response to DR signals. Moreover, a phenomenal reduction in peak power consumption is achieved by 13.97%. PMID:29702607
Breaking good: breaking ties with social groups may be good for recovery from substance misuse.
Dingle, Genevieve A; Stark, Claire; Cruwys, Tegan; Best, David
2015-06-01
According to the Social Identity Model of Identity Change, maintaining social identities and support over time is good for health and well-being, particularly during stressful transitions. However, in this study we explore the circumstances under which maintaining social identities - such as 'substance user' - may be harmful to health, and when a successful transition constitutes identity change, rather than maintenance. This prospective study examined social identities of 132 adults entering a drug and alcohol therapeutic community (TC) at admission, three fortnightly intervals and exit, as well as a representative subsample of 60 participants at follow-up. Repeated measures ANOVA results showed that user identity decreased significantly over time, such that 76% of the sample decreased in user identity strength over the first month in the TC. At the same time, recovery identity ratings increased significantly over time, with 64% of the sample staying the same or increasing their recovery identity ratings over the first month. Identity change, indexed by the change in the difference score between user identity and recovery identity over the treatment period, accounted for 34% of the variance in drinking quantity, 41% of the variance in drinking frequency, 5% of the variance in other drug use frequency, and 49% of the variance in life satisfaction at follow-up, after accounting for initial substance abuse severity and social identity ratings at entry to the TC. The findings indicate that moving from a substance using identity towards a recovery identity constitutes an important step in substance abuse treatment. © 2014 The British Psychological Society.
Design in Practice: Scenarios for Improving Management Education
ERIC Educational Resources Information Center
Schlenker, Lee; Chantelot, Sébastien
2014-01-01
Despite the increasing attention given to design in business, Design Thinking has had little impact on the quality of business school education. Building upon the foundations of long-standing critiques of management education and the potential for student-centric learning, the authors propose that the use of Design in Practice can significantly…
Myneni, Sahiti; Patel, Vimla L; Bova, G Steven; Wang, Jian; Ackerman, Christopher F; Berlinicke, Cynthia A; Chen, Steve H; Lindvall, Mikael; Zack, Donald J
2016-04-01
This paper describes a distributed collaborative effort between industry and academia to systematize data management in an academic biomedical laboratory. Heterogeneous and voluminous nature of research data created in biomedical laboratories make information management difficult and research unproductive. One such collaborative effort was evaluated over a period of four years using data collection methods including ethnographic observations, semi-structured interviews, web-based surveys, progress reports, conference call summaries, and face-to-face group discussions. Data were analyzed using qualitative methods of data analysis to (1) characterize specific problems faced by biomedical researchers with traditional information management practices, (2) identify intervention areas to introduce a new research information management system called Labmatrix, and finally to (3) evaluate and delineate important general collaboration (intervention) characteristics that can optimize outcomes of an implementation process in biomedical laboratories. Results emphasize the importance of end user perseverance, human-centric interoperability evaluation, and demonstration of return on investment of effort and time of laboratory members and industry personnel for success of implementation process. In addition, there is an intrinsic learning component associated with the implementation process of an information management system. Technology transfer experience in a complex environment such as the biomedical laboratory can be eased with use of information systems that support human and cognitive interoperability. Such informatics features can also contribute to successful collaboration and hopefully to scientific productivity. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Distributed network management in the flat structured mobile communities
NASA Astrophysics Data System (ADS)
Balandina, Elena
2005-10-01
Delivering proper management into the flat structured mobile communities is crucial for improving users experience and increase applications diversity in mobile networks. The available P2P applications do application-centric management, but it cannot replace network-wide management, especially when a number of different applications are used simultaneously in the network. The network-wide management is the key element required for a smooth transition from standalone P2P applications to the self-organizing mobile communities that maintain various services with quality and security guaranties. The classical centralized network management solutions are not applicable in the flat structured mobile communities due to the decentralized nature and high mobility of the underlying networks. Also the basic network management tasks have to be revised taking into account specialties of the flat structured mobile communities. The network performance management becomes more dependent on the current nodes' context, which also requires extension of the configuration management functionality. The fault management has to take into account high mobility of the network nodes. The performance and accounting managements are mainly targeted in maintain an efficient and fair access to the resources within the community, however they also allow unbalanced resource use of the nodes that explicitly permit it, e.g. as a voluntary donation to the community or due to the profession (commercial) reasons. The security management must implement the new trust models, which are based on the community feedback, professional authorization, and a mix of both. For fulfilling these and another specialties of the flat structured mobile communities, a new network management solution is demanded. The paper presents a distributed network management solution for flat structured mobile communities. Also the paper points out possible network management roles for the different parties (e.g. operators, service providing hubs/super nodes, etc.) involved in a service providing chain.
GammaKnife surgery: safety and the identity of users.
Dinka, David; Nyce, James M; Timpka, Toomas
2005-01-01
In this study we investigated safety-related usability issues of an advanced medical technology, a radiosurgery system. We were interested in which criteria are important for users when a system's usability and safety is to be improved. The data collection was based on interviews and observations at three different sites where the Leksell GammaKnife is used. The analysis was qualitative. The main finding was that the user's identity or professional background has a significant impact both on how he or she views his or her role in the clinical setting, and on how he or she defines what improvements are necessary and general safety issues. In fact, the opinion even of users experienced in safety-related problems was highly influenced by how they related to the technology and its development. None of the users actually considered Leksell GammaKnife as lacking in safety, instead, their assessment was directed towards potential future system improvements. Our findings suggest that the importance of user identity or professional background cannot be neglected during the development of advanced technology. They also suggest that the user feedback should always be related to user background and identity in order to understand how important different issues are for particular users.
Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.
Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin
2017-11-01
Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.
Stenberg, Nicola; Furness, Penny J
2017-03-01
The outcomes of self-management interventions are commonly assessed using quantitative measurement tools, and few studies ask people with long-term conditions to explain, in their own words, what aspects of the intervention they valued. In this Grounded Theory study, a Health Trainers service in the north of England was evaluated based on interviews with eight service-users. Open, focused, and theoretical coding led to the development of a preliminary model explaining participants' experiences and perceived impact of the service. The model reflects the findings that living well with a long-term condition encompassed social connectedness, changed identities, acceptance, and self-care. Health trainers performed four related roles that were perceived to contribute to these outcomes: conceptualizer, connector, coach, and champion. The evaluation contributes a grounded theoretical understanding of a personalized self-management intervention that emphasizes the benefits of a holistic approach to enable cognitive, behavioral, emotional, and social adjustments.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
2004-12-01
Tan Tock Seng Hospital (TTSH) to Singapore General...critical information, the Alert Manager of other hospitals will use the event defined in the Event Manager at Tan Tock Seng Hospital to automatically...events defined at Tan Tock Seng hospital can be monitored by the Alert Manager operated at the immigration department to ensure that the
Rus, Holly M; Cameron, Linda D
2016-10-01
Social media provides unprecedented opportunities for enhancing health communication and health care, including self-management of chronic conditions such as diabetes. Creating messages that engage users is critical for enhancing message impact and dissemination. This study analyzed health communications within ten diabetes-related Facebook pages to identify message features predictive of user engagement. The Common-Sense Model of Illness Self-Regulation and established health communication techniques guided content analyses of 500 Facebook posts. Each post was coded for message features predicted to engage users and numbers of likes, shares, and comments during the week following posting. Multi-level, negative binomial regressions revealed that specific features predicted different forms of engagement. Imagery emerged as a strong predictor; messages with images had higher rates of liking and sharing relative to messages without images. Diabetes consequence information and positive identity predicted higher sharing while negative affect, social support, and crowdsourcing predicted higher commenting. Negative affect, crowdsourcing, and use of external links predicted lower sharing while positive identity predicted lower commenting. The presence of imagery weakened or reversed the positive relationships of several message features with engagement. Diabetes control information and negative affect predicted more likes in text-only messages, but fewer likes when these messages included illustrative imagery. Similar patterns of imagery's attenuating effects emerged for the positive relationships of consequence information, control information, and positive identity with shares and for positive relationships of negative affect and social support with comments. These findings hold promise for guiding communication design in health-related social media.
Measuring engagement effectiveness in social media
NASA Astrophysics Data System (ADS)
Li, Lei; Sun, Tong; Peng, Wei; Li, Tao
2012-03-01
Social media is becoming increasingly prevalent with the advent of web 2.0 technologies. Popular social media websites, such as Twitter and Facebook, are attracting a gigantic number of online users to post and share information. An interesting phenomenon under this trend involves that more and more users share their experiences or issues with regard to a product, and then the product service agents use commercial social media listening and engagement tools (e.g. Radian6, Sysomos, etc.) to response to users' complaints or issues and help them tackle their problems. This is often called customer care in social media or social customer relationship management (CRM). However, all these existing commercial social media tools only provide an aggregated level of trends, patterns and sentiment analysis based on the keyword-centric brand relevant data, which have little insights for answering one of the key questions in social CRM system: how effective is our social customer care engagement? In this paper, we focus on addressing the problem of how to measure the effectiveness of engagement for service agents in customer care. Traditional CRM effectiveness measurements are defined under the scenario of the call center, where the effectiveness is mostly based on the duration time per call and/or number of answered calls per day. Different from customer care in a call center, we can obtain detailed conversations between agents and customers in social media, and therefore the effectiveness can be measured by analyzing the content of conversations and the sentiment of customers.
A Cloud-Based X73 Ubiquitous Mobile Healthcare System: Design and Implementation
Ji, Zhanlin; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji
2014-01-01
Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed “big data” processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems. PMID:24737958
Integration of robotic resources into FORCEnet
NASA Astrophysics Data System (ADS)
Nguyen, Chinh; Carroll, Daniel; Nguyen, Hoa
2006-05-01
The Networked Intelligence, Surveillance, and Reconnaissance (NISR) project integrates robotic resources into Composeable FORCEnet to control and exploit unmanned systems over extremely long distances. The foundations are built upon FORCEnet-the U.S. Navy's process to define C4ISR for net-centric operations-and the Navy Unmanned Systems Common Control Roadmap to develop technologies and standards for interoperability, data sharing, publish-and-subscribe methodology, and software reuse. The paper defines the goals and boundaries for NISR with focus on the system architecture, including the design tradeoffs necessary for unmanned systems in a net-centric model. Special attention is given to two specific scenarios demonstrating the integration of unmanned ground and water surface vehicles into the open-architecture web-based command-and-control information-management system of Composeable FORCEnet. Planned spiral development for NISR will improve collaborative control, expand robotic sensor capabilities, address multiple domains including underwater and aerial platforms, and extend distributive communications infrastructure for battlespace optimization for unmanned systems in net-centric operations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
How reliable are ligand-centric methods for Target Fishing?
NASA Astrophysics Data System (ADS)
Peon, Antonio; Dang, Cuong; Ballester, Pedro
2016-04-01
Computational methods for Target Fishing (TF), also known as Target Prediction or Polypharmacology Prediction, can be used to discover new targets for small-molecule drugs. This may result in repositioning the drug in a new indication or improving our current understanding of its efficacy and side effects. While there is a substantial body of research on TF methods, there is still a need to improve their validation, which is often limited to a small part of the available targets and not easily interpretable by the user. Here we discuss how target-centric TF methods are inherently limited by the number of targets that can possibly predict (this number is by construction much larger in ligand-centric techniques). We also propose a new benchmark to validate TF methods, which is particularly suited to analyse how predictive performance varies with the query molecule. On average over approved drugs, we estimate that only five predicted targets will have to be tested to find two true targets with submicromolar potency (a strong variability in performance is however observed). In addition, we find that an approved drug has currently an average of eight known targets, which reinforces the notion that polypharmacology is a common and strong event. Furthermore, with the assistance of a control group of randomly-selected molecules, we show that the targets of approved drugs are generally harder to predict.
Toward a patient-centric medical information model: issues and challenges for US adoption.
Lorence, Daniel; Monatesti, Sabatini; Margenthaler, Robert; Hoadley, Ellen
2005-01-01
As the USA moves, incrementally, toward evidence-based medicine, there is growing awareness of the importance of innovation in information management. Mandates for change include improved use of resources, accelerated diffusion of knowledge and an advanced consumer role. Key among these requirements is the need for a fundamentally different patient information recording system. Within the challenges identified in the most recent national health information technology initiative, we propose a model for an electronic, patient-centric medical information infrastructure, highlighting a transportable, scalable and integrated resource. We identify resources available for technology transfer, promoting consumers as integral parts of the collaborative medical decision-making process.
The role of architecture and ontology for interoperability.
Blobel, Bernd; González, Carolina; Oemig, Frank; Lopéz, Diego; Nykänen, Pirkko; Ruotsalainen, Pekka
2010-01-01
Turning from organization-centric to process-controlled or even to personalized approaches, advanced healthcare settings have to meet special interoperability challenges. eHealth and pHealth solutions must assure interoperability between actors cooperating to achieve common business objectives. Hereby, the interoperability chain also includes individually tailored technical systems, but also sensors and actuators. For enabling corresponding pervasive computing and even autonomic computing, individualized systems have to be based on an architecture framework covering many domains, scientifically managed by specialized disciplines using their specific ontologies in a formalized way. Therefore, interoperability has to advance from a communication protocol to an architecture-centric approach mastering ontology coordination challenges.
Anderson, Jane A; Godwin, Kyler M; Saleem, Jason J; Russell, Scott; Robinson, Joshua J; Kimmel, Barbara
2014-12-01
This article reports redesign strategies identified to create a Web-based user-interface for the Self-management TO Prevent (STOP) Stroke Tool. Members of a Stroke Quality Improvement Network (N = 12) viewed a visualization video of a proposed prototype and provided feedback on implementation barriers/facilitators. Stroke-care providers (N = 10) tested the Web-based prototype in think-aloud sessions of simulated clinic visits. Participants' dialogues were coded into themes. Access to comprehensive information and the automated features/systematized processes were the primary accessibility and usability facilitator themes. The need for training, time to complete the tool, and computer-centric care were identified as possible usability barriers. Patient accountability, reminders for best practice, goal-focused care, and communication/counseling themes indicate that the STOP Stroke Tool supports the paradigm of patient-centered care. The STOP Stroke Tool was found to prompt clinicians on secondary stroke-prevention clinical-practice guidelines, facilitate comprehensive documentation of evidence-based care, and support clinicians in providing patient-centered care through the shared decision-making process that occurred while using the action-planning/goal-setting feature of the tool. © The Author(s) 2013.
2007-04-01
industrial and commercial companies have been very successful at developing this type of organization and management structure, beginning with a... companies like large management consulting firms depends on being extremely proficient at this kind of knowledge and information management. The...technology services company , recognizes that their information base and experience is their most valued corporate asset and they treat it as such. They
NASA Astrophysics Data System (ADS)
Henriksson, Jakob; Bermudez, Luis; Satapathy, Goutam
2013-04-01
There is a large amount of sensor data generated today by various sensors, from in-situ buoys to mobile underwater gliders. Providing sensor data to the users through standardized services, language and data model is the promise of OGC's Sensor Web Enablement (SWE) initiative. As the amount of data grows it is becoming difficult for data providers, planners and managers to ensure reliability of data and services and to monitor critical data changes. Intelligent Automation Inc. (IAI) is developing a net-centric alerting capability to address these issues. The capability is built on Sensor Observation Services (SOSs), which is used to collect and monitor sensor data. The alerts can be configured at the service level and at the sensor data level. For example it can alert for irregular data delivery events or a geo-temporal statistic of sensor data crossing a preset threshold. The capability provides multiple delivery mechanisms and protocols, including traditional techniques such as email and RSS. With this capability decision makers can monitor their assets and data streams, correct failures or be alerted about a coming phenomena.
Design and implementation of PKI-based certification authority
NASA Astrophysics Data System (ADS)
Zheng, Ying; Bai, Qinghai; Zhao, Linna; Chun, Hua; Chen, Jing
2015-12-01
PKI achieves the management of public key by certificates. It combines the user's public key and his or her identification formation through a trusted third-party organization CA, in order to authenticate the user's identity on the Internet, thus ensuring the authenticity, integrity, confidentiality, and non- repudiation of the information transmitted on the Internet. CA is the most critical agency in the PKI system, mainly responsible for issuing and managing certificates. On the basis of the actual needs of an enterprise, in this paper the author designs and develops a small-sized PKI-based Certification Authority equipped with the functions of root CA initialization, certificate application, certificate issuance, certificate revocation, and the generation of certificate revocation list. The author also points out the problems that need to be mentioned in the design and development.
VeriML: A Dependently-Typed, User-Extensible and Language-Centric Approach to Proof Assistants
2013-01-01
the locally nameless approach [McKinna and Pollack, 1993]. The former two techniques replace all variables by numbers, whereas the locally nameless ...needs to be reasoned about together with shifting. This complicates both the statements and proofs of related lemmas. The locally nameless approach...the locally nameless approach, we separate free variables from bound variables and use deBruijn indices for bound variables (denoted as bi in Table 3.1
Anthro-Centric Multisensory Interface for Vision Augmentation/Substitution (ACMI-VAS)
2014-02-01
Argus™ I and II Retinal Prosthesis System epiretinal microelectrode arrays (Second Sight Medical Products, Inc, Sylmar, CA) recently approved for use in...Figure 3. C olour photo of A rgus II epiretinal prosthesis secured to the retina w ith a retinaltack. Figure 4. Subject using the A rgus II device perform...in the environment. Alternatively, we have also implemented a touch screen mechanism that allows the user to feel the pixels under his or her
Capturing Commander’s Intent in User Interfaces for Network-Centric Operations
2007-02-01
in support of the commander’s intent. There are many paths of varying risk that can lead to mission success (i.e. achieving...asset’s mission or the target’s status, with results and analysis linked for ease of reference. By selecting a block of time in the future or past...manner. The WIDE temporal display was recently evaluated in an operational scenario using simulated data with a variety of TACC execution
The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors
2011-09-01
weighted probability 75th pctl weighted probability 13. Carman. K. G. and Kooreman, P, “ Flu Shots, Mammogram, and the Perception of Probabilities,” 2010...sharing capabilities until users can tes- tify to the benefi ts. This creates a chicken and egg situa- tion, because the consumers of information fi...Bibliography 563 Campen, Alan D. Look Closely at Network-Centric Warfare. Signal, January 2004. Carman, Katherine G., and Peter Kooreman, Peter. Flu Shots
Jones, Benjamin M.; Arp, Christopher D.; Whitman, Matthew S.; Nigro, Debora A.; Nitze, Ingmar; Beaver, John; Gadeke, Anne; Zuck, Callie; Liljedahl, Anna K.; Daanen, Ronald; Torvinen, Eric; Fritz, Stacey; Grosse, Guido
2017-01-01
Lakes are dominant and diverse landscape features in the Arctic, but conventional land cover classification schemes typically map them as a single uniform class. Here, we present a detailed lake-centric geospatial database for an Arctic watershed in northern Alaska. We developed a GIS dataset consisting of 4362 lakes that provides information on lake morphometry, hydrologic connectivity, surface area dynamics, surrounding terrestrial ecotypes, and other important conditions describing Arctic lakes. Analyzing the geospatial database relative to fish and bird survey data shows relations to lake depth and hydrologic connectivity, which are being used to guide research and aid in the management of aquatic resources in the National Petroleum Reserve in Alaska. Further development of similar geospatial databases is needed to better understand and plan for the impacts of ongoing climate and land-use changes occurring across lake-rich landscapes in the Arctic.
A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment
Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae
2015-01-01
User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service. PMID:26393609
A Preliminary Data Model for Orbital Flight Dynamics in Shuttle Mission Control
NASA Technical Reports Server (NTRS)
ONeill, John; Shalin, Valerie L.
2000-01-01
The Orbital Flight Dynamics group in Shuttle Mission Control is investigating new user interfaces in a project called RIOTS [RIOTS 2000]. Traditionally, the individual functions of hardware and software guide the design of displays, which results in an aggregated, if not integrated interface. The human work system has then been designed and trained to navigate, operate and integrate the processors and displays. The aim of RIOTS is to reduce the cognitive demands of the flight controllers by redesigning the user interface to support the work of the flight controller. This document supports the RIOTS project by defining a preliminary data model for Orbital Flight Dynamics. Section 2 defines an information-centric perspective. An information-centric approach aims to reduce the cognitive workload of the flight controllers by reducing the need for manual integration of information across processors and displays. Section 3 describes the Orbital Flight Dynamics domain. Section 4 defines the preliminary data model for Orbital Flight Dynamics. Section 5 examines the implications of mapping the data model to Orbital Flight Dynamics current information systems. Two recurring patterns are identified in the Orbital Flight Dynamics work the iteration/rework cycle and the decision-making/information integration/mirroring role relationship. Section 6 identifies new requirements on Orbital Flight Dynamics work and makes recommendations based on changing the information environment, changing the implementation of the data model, and changing the two recurring patterns.
A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment.
Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae
2015-09-18
User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service.
Governing the ethical consumer: identity, choice and the primary care medical encounter.
McDonald, Ruth; Mead, Nicola; Cheraghi-Sohi, Sudeh; Bower, Peter; Whalley, Diane; Roland, Martin
2007-04-01
Government policy promoting consumerism in healthcare can be seen as offering up certain preferred identities to which its citizens are encouraged to aspire. Whilst many commentators reject the notion that health services users should be conceived of as consumers, this paper outlines the relevance of the concept to our understanding of the ways in which individuals manage their health and service use. The paper examines the identity work undertaken by individuals in relation to decisions about healthcare preferences and assesses the extent to which this is compatible with the identities promoted in Government policy. We suggest that in circumstances where individuals feel both a sense of personal entitlement and a desire to be supportive of the needs of other members of the community, 'doing' ethical consumer can be fraught with discomfort and anxiety. These anxieties are exacerbated in a context where citizenship is increasingly being defined in terms of consumer identities, and making good (health) choices might be seen as distinguishing the civilised from the marginalised.
NASA Astrophysics Data System (ADS)
Irving, D. H.; Rasheed, M.; Hillman, C.; O'Doherty, N.
2012-12-01
Oilfield management is moving to a more operational footing with near-realtime seismic and sensor monitoring governing drilling, fluid injection and hydrocarbon extraction workflows within safety, productivity and profitability constraints. To date, the geoscientific analytical architectures employed are configured for large volumes of data, computational power or analytical latency and compromises in system design must be made to achieve all three aspects. These challenges are encapsulated by the phrase 'Big Data' which has been employed for over a decade in the IT industry to describe the challenges presented by data sets that are too large, volatile and diverse for existing computational architectures and paradigms. We present a data-centric architecture developed to support a geoscientific and geotechnical workflow whereby: ●scientific insight is continuously applied to fresh data ●insights and derived information are incorporated into engineering and operational decisions ●data governance and provenance are routine within a broader data management framework Strategic decision support systems in large infrastructure projects such as oilfields are typically relational data environments; data modelling is pervasive across analytical functions. However, subsurface data and models are typically non-relational (i.e. file-based) in the form of large volumes of seismic imaging data or rapid streams of sensor feeds and are analysed and interpreted using niche applications. The key architectural challenge is to move data and insight from a non-relational to a relational, or structured, data environment for faster and more integrated analytics. We describe how a blend of MapReduce and relational database technologies can be applied in geoscientific decision support, and the strengths and weaknesses of each in such an analytical ecosystem. In addition we discuss hybrid technologies that use aspects of both and translational technologies for moving data and analytics across these platforms. Moving to a data-centric architecture requires data management methodologies to be overhauled by default and we show how end-to-end data provenancing and dependency management is implicit in such an environment and how it benefits system administration as well as the user community. Whilst the architectural experiences are drawn from the oil industry, we believe that they are more broadly applicable in academic and government settings where large volumes of data are added to incrementally and require revisiting with low analytical latency and we suggest application to earthquake monitoring and remote sensing networks.
gLExec: gluing grid computing to the Unix world
NASA Astrophysics Data System (ADS)
Groep, D.; Koeroo, O.; Venekamp, G.
2008-07-01
The majority of compute resources in todays scientific grids are based on Unix and Unix-like operating systems. In this world, user and user-group management are based around the concepts of a numeric 'user ID' and 'group ID' that are local to the resource. In contrast, grid concepts of user and group management are centered around globally assigned identifiers and VO membership, structures that are independent of any specific resource. At the fabric boundary, these 'grid identities' have to be translated to Unix user IDs. New job submission methodologies, such as job-execution web services, community-deployed local schedulers, and the late binding of user jobs in a grid-wide overlay network of 'pilot jobs', push this fabric boundary ever further down into the resource. gLExec, a light-weight (and thereby auditable) credential mapping and authorization system, addresses these issues. It can be run both on fabric boundary, as part of an execution web service, and on the worker node in a late-binding scenario. In this contribution we describe the rationale for gLExec, how it interacts with the site authorization and credential mapping frameworks such as LCAS, LCMAPS and GUMS, and how it can be used to improve site control and traceability in a pilot-job system.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-02
... reasonable policies and procedures that a user of consumer reports must employ when a user receives a notice... policies and procedures for users of consumer reports to enable a user to form a reasonable belief that it knows the identity of the person for whom it has obtained a consumer report, and reconcile the address...
NCBI GEO: archive for high-throughput functional genomic data.
Barrett, Tanya; Troup, Dennis B; Wilhite, Stephen E; Ledoux, Pierre; Rudnev, Dmitry; Evangelista, Carlos; Kim, Irene F; Soboleva, Alexandra; Tomashevsky, Maxim; Marshall, Kimberly A; Phillippy, Katherine H; Sherman, Patti M; Muertter, Rolf N; Edgar, Ron
2009-01-01
The Gene Expression Omnibus (GEO) at the National Center for Biotechnology Information (NCBI) is the largest public repository for high-throughput gene expression data. Additionally, GEO hosts other categories of high-throughput functional genomic data, including those that examine genome copy number variations, chromatin structure, methylation status and transcription factor binding. These data are generated by the research community using high-throughput technologies like microarrays and, more recently, next-generation sequencing. The database has a flexible infrastructure that can capture fully annotated raw and processed data, enabling compliance with major community-derived scientific reporting standards such as 'Minimum Information About a Microarray Experiment' (MIAME). In addition to serving as a centralized data storage hub, GEO offers many tools and features that allow users to effectively explore, analyze and download expression data from both gene-centric and experiment-centric perspectives. This article summarizes the GEO repository structure, content and operating procedures, as well as recently introduced data mining features. GEO is freely accessible at http://www.ncbi.nlm.nih.gov/geo/.
Social Networking Analysis: One of the First Steps in Net-Centric Operations
2005-01-01
came to form part of current management thought and is transforming the ways of thinking about social relationships in management and leadership in...about social relationships and leadership in government and commercial organizations. This paper will highlight how network analysis has become...relevant to management studies, how it is transforming how we study social relationships , how it can be used to understand how actors interact (especially
System approach to distributed sensor management
NASA Astrophysics Data System (ADS)
Mayott, Gregory; Miller, Gordon; Harrell, John; Hepp, Jared; Self, Mid
2010-04-01
Since 2003, the US Army's RDECOM CERDEC Night Vision Electronic Sensor Directorate (NVESD) has been developing a distributed Sensor Management System (SMS) that utilizes a framework which demonstrates application layer, net-centric sensor management. The core principles of the design support distributed and dynamic discovery of sensing devices and processes through a multi-layered implementation. This results in a sensor management layer that acts as a System with defined interfaces for which the characteristics, parameters, and behaviors can be described. Within the framework, the definition of a protocol is required to establish the rules for how distributed sensors should operate. The protocol defines the behaviors, capabilities, and message structures needed to operate within the functional design boundaries. The protocol definition addresses the requirements for a device (sensors or processes) to dynamically join or leave a sensor network, dynamically describe device control and data capabilities, and allow dynamic addressing of publish and subscribe functionality. The message structure is a multi-tiered definition that identifies standard, extended, and payload representations that are specifically designed to accommodate the need for standard representations of common functions, while supporting the need for feature-based functions that are typically vendor specific. The dynamic qualities of the protocol enable a User GUI application the flexibility of mapping widget-level controls to each device based on reported capabilities in real-time. The SMS approach is designed to accommodate scalability and flexibility within a defined architecture. The distributed sensor management framework and its application to a tactical sensor network will be described in this paper.
Patient acceptability of 3D printed medicines.
Goyanes, Alvaro; Scarpa, Mariagiovanna; Kamlow, Michael; Gaisford, Simon; Basit, Abdul W; Orlu, Mine
2017-09-15
Patient-centric medicine is a derivative term for personalised medicine, whereby the pharmaceutical product provides the best overall benefit by meeting the comprehensive needs of the individual; considering the end-user from the beginning of the formulation design process right through development to an end product is a must. One way in which to obtain personalised medicines, on-site and on-demand is by three-dimensional printing (3DP). The aim of this study was to investigate the influence of the shape, size and colour of different placebo 3D printed tablets (Printlets™) manufactured by fused deposition modelling (FDM) 3DP on end-user acceptability regarding picking and swallowing. Ten different printlet shapes were prepared by 3DP for an open-label, randomised, exploratory pilot study with 50 participants. Participant-reported outcome (PRO) and researcher reported outcome (RRO) were collected after picking and swallowing of selected printlet geometries including sphere, torus, disc, capsule and tilted diamond shapes. The torus printlet received the highest PRO cores for ease of swallowing and ease of picking. Printlets with a similar appearance to conventional formulations (capsule and disc shape) were also found to be easy to swallow and pick which demonstrates that familiarity is a critical acceptability attribute for end-users. RRO scores were in agreement with the PRO scores. The sphere was not perceived to be an appropriate way of administering an oral solid medicine. Smaller printlet sizes were found to be preferable; however it was found that the perception of size was driven by the type of shape. Printlet colour was also found to affect the perception of the end-user. Our study is the first to guide the pharmaceutical industry towards developing patient-centric medicine in different geometries via 3DP. Overall, the highest acceptability scores for torus printlets indicates that FDM 3DP is a promising fabrication technology towards increasing patient acceptability of solid oral medicines. Copyright © 2017 Elsevier B.V. All rights reserved.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Context-aware event detection smartphone application for first responders
NASA Astrophysics Data System (ADS)
Boddhu, Sanjay K.; Dave, Rakesh P.; McCartney, Matt; West, James A.; Williams, Robert L.
2013-05-01
The rise of social networking platforms like Twitter, Facebook, etc…, have provided seamless sharing of information (as chat, video and other media) among its user community on a global scale. Further, the proliferation of the smartphones and their connectivity networks has powered the ordinary individuals to share and acquire information regarding the events happening in his/her immediate vicinity in a real-time fashion. This human-centric sensed data being generated in "human-as-sensor" approach is tremendously valuable as it delivered mostly with apt annotations and ground truth that would be missing in traditional machine-centric sensors, besides high redundancy factor (same data thru multiple users). Further, when appropriately employed this real-time data can support in detecting localized events like fire, accidents, shooting, etc…, as they unfold and pin-point individuals being affected by those events. This spatiotemporal information, when made available for first responders in the event vicinity (or approaching it) can greatly assist them to make effective decisions to protect property and life in a timely fashion. In this vein, under SATE and YATE programs, the research team at AFRL Tec^Edge Discovery labs had demonstrated the feasibility of developing Smartphone applications, that can provide a augmented reality view of the appropriate detected events in a given geographical location (localized) and also provide an event search capability over a large geographic extent. In its current state, the application thru its backend connectivity utilizes a data (Text & Image) processing framework, which deals with data challenges like; identifying and aggregating important events, analyzing and correlating the events temporally and spatially and building a search enabled event database. Further, the smartphone application with its backend data processing workflow has been successfully field tested with live user generated feeds.
Identity Management Task Force Report 2008
2008-01-01
Telecommunication Grid ( GTG ) consists of the public- switched telecommunications network (PSTN), various forms of Internet protocol (IP) networks...to network providers) to a large community of nomadic users and access devices over a wide range of access technologies. The GTG is notional, and...DOC Dr. Myra Gray , DOD Greg Hall, DNI Celia Hanley, DOD Patrick Hannon, DNI James Hass, IC Linda Hill, SSA Bobby Jones, DOC Patrick Hannon
Securing the Global Airspace System Via Identity-Based Security
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2015-01-01
Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.
Gonçalves, Laura Lamas Martins; Campos, Rosana Teresa Onocko
2017-11-21
Numerous studies have highlighted the tendency to chronicity of treatments centered on the use of medications. This study was conducted in a large Brazilian city with users of Centers for Psychosocial Care (CAPS), with the aim of evaluating the effects of experimenting with the personal Guide for Autonomous Management of Medication (GAM) and the users' relationship to their treatments and participation. The instrument, created in Canada and translated and adapted to Brazil, was tested in intervention groups with users of CAPS with severe mental disorders and a history of political participation in the field of health. Focus groups and in-depth interviews were performed. The transcriptions were transformed into narratives, and four analytical categories were defined: subjects with radical experiences of suffering; experiences with medication; users' rights; and participation and political activism. In testing GAM, users expressed a tension between reproduction of illness-centered identity and the legitimate uniqueness of their personal experiences. They showed greater knowledge of the medications they were taking, began to recognize their own expertise in their use of medications, and some sought adjustments to their treatment. They reported the need for support in claiming their rights and strengthening their participation as mental health activists. In conclusion, the Brazilian version of the GAM guide has the potential to contribute to users' empowerment, thus allowing dialogue between the results in mental health care in Brazil and the international scenario.
Wang, Haonan; Bangerter, Neal K; Park, Daniel J; Adluru, Ganesh; Kholmovski, Eugene G; Xu, Jian; DiBella, Edward
2015-10-01
Highly undersampled three-dimensional (3D) saturation-recovery sequences are affected by k-space trajectory since the magnetization does not reach steady state during the acquisition and the slab excitation profile yields different flip angles in different slices. This study compares centric and reverse-centric 3D cardiac perfusion imaging. An undersampled (98 phase encodes) 3D ECG-gated saturation-recovery sequence that alternates centric and reverse-centric acquisitions each time frame was used to image phantoms and in vivo subjects. Flip angle variation across the slices was measured, and contrast with each trajectory was analyzed via Bloch simulation. Significant variations in flip angle were observed across slices, leading to larger signal variation across slices for the centric acquisition. In simulation, severe transient artifacts were observed when using the centric trajectory with higher flip angles, placing practical limits on the maximum flip angle used. The reverse-centric trajectory provided less contrast, but was more robust to flip angle variations. Both of the k-space trajectories can provide reasonable image quality. The centric trajectory can have higher CNR, but is more sensitive to flip angle variation. The reverse-centric trajectory is more robust to flip angle variation. © 2014 Wiley Periodicals, Inc.
Ramos, S Raquel
2017-11-01
Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.
National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents
NASA Astrophysics Data System (ADS)
Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.
2014-12-01
The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using interoperable and shareable standards, upload data and documents, and expose those data as a node in the NGDS or any larger data system through a CSW endpoint. The easy-to-use interface is supported by back-end software including Postgres, GeoServer, and custom CKAN extensions among others.
Uddin, Shahadat
2016-02-04
A patient-centric care network can be defined as a network among a group of healthcare professionals who provide treatments to common patients. Various multi-level attributes of the members of this network have substantial influence to its perceived level of performance. In order to assess the impact different multi-level attributes of patient-centric care networks on healthcare outcomes, this study first captured patient-centric care networks for 85 hospitals using health insurance claim dataset. From these networks, this study then constructed physician collaboration networks based on the concept of patient-sharing network among physicians. A multi-level regression model was then developed to explore the impact of different attributes that are organised at two levels on hospitalisation cost and hospital length of stay. For Level-1 model, the average visit per physician significantly predicted both hospitalisation cost and hospital length of stay. The number of different physicians significantly predicted only the hospitalisation cost, which has significantly been moderated by age, gender and Comorbidity score of patients. All Level-1 findings showed significance variance across physician collaboration networks having different community structure and density. These findings could be utilised as a reflective measure by healthcare decision makers. Moreover, healthcare managers could consider them in developing effective healthcare environments.
Location-Based Critical Infrastructure Interdependency (LBCII)
2010-04-01
Effective disaster management reduces devastation and cost . This section describes the processes of disaster management, including the elements of CEM...it has reasonable probability, based on the tectonic geology and the history of the region. The case highlights the usability of network- centric...of earthquake risk assessment in Cartago, Costa Rica . International Institute for Geo-Information Science and Earth Observation (ITC): Enschede
20th Annual Systems Engineering Conference. Volume 1, Monday-Tuesday
2017-10-26
Environment will follow Mr. Thompson’s presentation with a presentation focusing on how ESOH Risk Management is an integral part of the RIO Management...office successes and failures in implementing the DoDI 5000.02 acquisition ESOH policy. HUMAN SYSTEMS INTEGRATION (HSI) Track Chair: Matthew...practices, process improvements, applications and approaches to program integration . INTEROPERABILITY/NET - CENTRIC OPERATIONS Track Chairs
Understanding and Managing Causality of Change in Socio-Technical Systems II
2011-01-25
SUBJECT TERMS Cognition , Human Effectiveness, Information Science 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18...at large taking into account the cognitive interaction between humans and technology. 8 Hussein Abbass Professor Abbass leads the...Network Centric Operations Future Air Traffic Management Systems Cognitive Engineering including Human-Computer Integration In all of the
Case Study of Online Banking in India: User Behaviors and Design Guidelines
NASA Astrophysics Data System (ADS)
Iyengar, Jhumkee; Belvalkar, Manisha
This paper documents online banking trends, behaviors and expectations of Indian consumers and banks. It is based on excerpts of a large industry case study of users from 4 leading banks. While banks view online banking essentially as a technology solution, it is a relatively new area for Indian consumers and not yet self-supporting. Being a savings based culture still, Indian consumers are cautious about their financial assets. They are also relatively recent entrants to internet based services. Design of these systems must therefore be based on an understanding of these users' outlook and priorities through task centric, security assured and service oriented solutions minus the technological challenges. Design lessons suggest viewing online banking not just as a convenience alone anymore but beyond it, to provide service, simplicity and security. This will create satisfied online banking customers and therefore profitability for the bank.
Rossos, P G; St-Cyr, O; Purdy, B; Toenjes, C; Masino, C; Chmelnitsky, D
2015-01-01
Despite decades of international experience with the use of information and communication technologies in healthcare delivery, widespread telehealth adoption remains limited and progress slow. Escalating health system challenges related to access, cost and quality currently coincide with rapid advancement of affordable and reliable internet based communication technologies creating unprecedented opportunities and incentives for telehealth. In this paper, we will describe how Human Factors Engineering (HFE) and user-centric elements have been incorporated into the establishment of telehealth within a large academic medical center to increase acceptance and sustainability. Through examples and lessons learned we wish to increase awareness of HFE and its importance in the successful implementation, innovation and growth of telehealth programs.
Schopf, Jennifer M.; Nitzberg, Bill
2002-01-01
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A distributed infrastructure capable of sophisticated computational functions can bring many benefits to scientific work, but poses many challenges, both technical and socio-political. Technical challenges include having basic software tools, higher-level services, functioning and pervasive security, and standards, while socio-political issues include building a user community, adding incentives for sites to be part of a user-centric environment, and educating funding sources about the needs of this community. This paper details the areasmore » relating to Grid research that we feel still need to be addressed to fully leverage the advantages of the Grid.« less
SAKURA-viewer: intelligent order history viewer based on two-viewpoint architecture.
Toyoda, Shuichi; Niki, Noboru; Nishitani, Hiromu
2007-03-01
We propose a new intelligent order history viewer applied to consolidating and visualizing data. SAKURA-viewer is a highly effective tool, as: 1) it visualizes both the semantic viewpoint and the temporal viewpoint of patient records simultaneously; 2) it promotes awareness of contextual information among the daily data; and 3) it implements patient-centric data entry methods. This viewer contributes to decrease the user's workload in an order entry system. This viewer is now incorporated into an order entry system being run on an experimental basis. We describe the evaluation of this system using results of a user satisfaction survey, analysis of information consolidation within the database, and analysis of the frequency of use of data entry methods.
Toward Usable Interactive Analytics: Coupling Cognition and Computation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Endert, Alexander; North, Chris; Chang, Remco
Interactive analytics provide users a myriad of computational means to aid in extracting meaningful information from large and complex datasets. Much prior work focuses either on advancing the capabilities of machine-centric approaches by the data mining and machine learning communities, or human-driven methods by the visualization and CHI communities. However, these methods do not yet support a true human-machine symbiotic relationship where users and machines work together collaboratively and adapt to each other to advance an interactive analytic process. In this paper we discuss some of the inherent issues, outlining what we believe are the steps toward usable interactive analyticsmore » that will ultimately increase the effectiveness for both humans and computers to produce insights.« less
Rational Density Functional Selection Using Game Theory.
McAnanama-Brereton, Suzanne; Waller, Mark P
2018-01-22
Theoretical chemistry has a paradox of choice due to the availability of a myriad of density functionals and basis sets. Traditionally, a particular density functional is chosen on the basis of the level of user expertise (i.e., subjective experiences). Herein we circumvent the user-centric selection procedure by describing a novel approach for objectively selecting a particular functional for a given application. We achieve this by employing game theory to identify optimal functional/basis set combinations. A three-player (accuracy, complexity, and similarity) game is devised, through which Nash equilibrium solutions can be obtained. This approach has the advantage that results can be systematically improved by enlarging the underlying knowledge base, and the deterministic selection procedure mathematically justifies the density functional and basis set selections.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
BrainSnail: A dynamic information display system for the Sciences
Telefont, Martin; Asaithambi, Asai
2009-01-01
Scientific reference management has become crucial in rapidly expanding fields of biology. Many of the reference management systems currently employed are reference centric and not object/process focused. BrainSnail is a reference management/knowledge representation application that tries to bridge disconnect between subject and reference in the fields of neuropharmacology, neuroanatomy and neurophysiology. BrainSnail has been developed with considering both individual researcher and research group efforts. PMID:19293992
NASA Astrophysics Data System (ADS)
Martone, R. G.; Erickson, A.; Mach, M.; Hale, T.; McGregor, A.; Prahler, E. E.; Foley, M.; Caldwell, M.; Hartge, E. H.
2016-02-01
Ocean and coastal practitioners work within existing financial constraints, jurisdictions, and legislative authorities to manage coastal and marine resources while seeking to promote and maintain a healthy and productive coastal economy. Fulfilling this mandate necessitates incorporation of best available science, including ecosystem-based management (EBM) into coastal and ocean management decisions. To do this, many agencies seek ways to apply lessons from ecological theory into their decision processes. However, making direct connections between science and management can be challenging, in part because there is no process for linking ecological principles (e.g., maintaining species diversity, habitat diversity, connectivity and populations of key species) with available data. Here we explore how incorporating emerging data and methods into resource management at a local scale can improve the overall health of our coastal and marine ecosystems. We introduce a new web-based interface, EcoPrinciples Connect, that links marine managers to scientific and geospatial information through the lens of these ecological principles, ultimately helping managers become more efficient, more consistent, and advance the integration of EBM. The EcoPrinciples Connect tool grew directly out of needs identified in response to a Center for Ocean Solutions reference guide, Incorporating Ecological Principles into California Ocean and Coastal Management: Examples from Practice. Here we illustrate how we have worked to translate the information in this guide into a co-developed, user-centric tool for agency staff. Specifically, we present a pilot project where we match publicly available data to the ecological principles for the California San Francisco Bay Conservation and Development Commission. We will share early lessons learned from pilot development and highlight opportunities for future transferability to an expanded group of practitioners.
NASA Astrophysics Data System (ADS)
Martone, R. G.; Erickson, A.; Mach, M.; Hale, T.; McGregor, A.; Prahler, E. E.; Foley, M.; Caldwell, M.; Hartge, E. H.
2016-12-01
Ocean and coastal practitioners work within existing financial constraints, jurisdictions, and legislative authorities to manage coastal and marine resources while seeking to promote and maintain a healthy and productive coastal economy. Fulfilling this mandate necessitates incorporation of best available science, including ecosystem-based management (EBM) into coastal and ocean management decisions. To do this, many agencies seek ways to apply lessons from ecological theory into their decision processes. However, making direct connections between science and management can be challenging, in part because there is no process for linking ecological principles (e.g., maintaining species diversity, habitat diversity, connectivity and populations of key species) with available data. Here we explore how incorporating emerging data and methods into resource management at a local scale can improve the overall health of our coastal and marine ecosystems. We introduce a new web-based interface, EcoPrinciples Connect, that links marine managers to scientific and geospatial information through the lens of these ecological principles, ultimately helping managers become more efficient, more consistent, and advance the integration of EBM. The EcoPrinciples Connect tool grew directly out of needs identified in response to a Center for Ocean Solutions reference guide, Incorporating Ecological Principles into California Ocean and Coastal Management: Examples from Practice. Here we illustrate how we have worked to translate the information in this guide into a co-developed, user-centric tool for agency staff. Specifically, we present a pilot project where we match publicly available data to the ecological principles for the California San Francisco Bay Conservation and Development Commission. We will share early lessons learned from pilot development and highlight opportunities for future transferability to an expanded group of practitioners.
Stieger, Stefan; Burger, Christoph; Bohn, Manuel; Voracek, Martin
2013-09-01
Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addiction scores, and personality. We found Facebook quitters to be significantly more cautious about their privacy, having higher Internet addiction scores, and being more conscientious than Facebook users. The main self-stated reason for committing virtual identity suicide was privacy concerns (48 percent). Although the adequacy of privacy in online communication has been questioned, privacy is still an important issue in online social communications.
Data distribution service-based interoperability framework for smart grid testbed infrastructure
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
2016-03-02
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
Requirements Management for Net-Centric Enterprises. Phase 1
2011-04-28
These include Business Process Modeling Notation ( BPMN ) (White and Miers 2008) and Business Process Execution Language (BPEL) (Sarang, Juric et al...UML: Modeling, Analysis, Design, Morgan Kaufmann/The OMG Press. White, S. A. and D. Miers (2008). BPMN Modeling and Reference Guide, Future
cMapper: gene-centric connectivity mapper for EBI-RDF platform.
Shoaib, Muhammad; Ansari, Adnan Ahmad; Ahn, Sung-Min
2017-01-15
In this era of biological big data, data integration has become a common task and a challenge for biologists. The Resource Description Framework (RDF) was developed to enable interoperability of heterogeneous datasets. The EBI-RDF platform enables an efficient data integration of six independent biological databases using RDF technologies and shared ontologies. However, to take advantage of this platform, biologists need to be familiar with RDF technologies and SPARQL query language. To overcome this practical limitation of the EBI-RDF platform, we developed cMapper, a web-based tool that enables biologists to search the EBI-RDF databases in a gene-centric manner without a thorough knowledge of RDF and SPARQL. cMapper allows biologists to search data entities in the EBI-RDF platform that are connected to genes or small molecules of interest in multiple biological contexts. The input to cMapper consists of a set of genes or small molecules, and the output are data entities in six independent EBI-RDF databases connected with the given genes or small molecules in the user's query. cMapper provides output to users in the form of a graph in which nodes represent data entities and the edges represent connections between data entities and inputted set of genes or small molecules. Furthermore, users can apply filters based on database, taxonomy, organ and pathways in order to focus on a core connectivity graph of their interest. Data entities from multiple databases are differentiated based on background colors. cMapper also enables users to investigate shared connections between genes or small molecules of interest. Users can view the output graph on a web browser or download it in either GraphML or JSON formats. cMapper is available as a web application with an integrated MySQL database. The web application was developed using Java and deployed on Tomcat server. We developed the user interface using HTML5, JQuery and the Cytoscape Graph API. cMapper can be accessed at http://cmapper.ewostech.net Readers can download the development manual from the website http://cmapper.ewostech.net/docs/cMapperDocumentation.pdf. Source Code is available at https://github.com/muhammadshoaib/cmapperContact:smahn@gachon.ac.krSupplementary information: Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
From
ERIC Educational Resources Information Center
Bechar-Israeli, Haya
1995-01-01
Examines nicknames of Internet Relay Chat (IRC) users, whose identities are condensed into a single line which states their nicknames, the electronic address, and a slogan or the users' real names. Demonstrates that although people play games with their nicknames, the nicknames they choose are an inherent part of their Net identity and their…
Piszczek, Matthew M; Pichler, Shaun; Turel, Ofir; Greenhaus, Jeffrey
2016-01-01
Management and organization research has traditionally focused on employees' work role and the interface between their work and family roles. We suggest that persons assume a third role in modern society that is relevant to work and organizations, namely the Information and Communication Technology User (ICTU) role. Based on role theory and boundary theory, we develop propositions about the characteristics of this role, as well as how ICTU role characteristics are related to boundary spanning activity, inter-role spillover with the work role, and work role performance. To this end, we first conceptualize the ICTU role and its associations with work and family roles. We then apply identity theory and boundary management theory to advance our understanding of how the ICTU role is related to criteria that are important to individuals and to organizations, namely self-selection into certain types of work roles and positive and negative inter-role spillover. The implications of this role for theory, research, and practice in management and organizations are discussed.
Integrated Hydrographical Basin Management. Study Case - Crasna River Basin
NASA Astrophysics Data System (ADS)
Visescu, Mircea; Beilicci, Erika; Beilicci, Robert
2017-10-01
Hydrographical basins are important from hydrological, economic and ecological points of view. They receive and channel the runoff from rainfall and snowmelt which, when adequate managed, can provide fresh water necessary for water supply, irrigation, food industry, animal husbandry, hydrotechnical arrangements and recreation. Hydrographical basin planning and management follows the efficient use of available water resources in order to satisfy environmental, economic and social necessities and constraints. This can be facilitated by a decision support system that links hydrological, meteorological, engineering, water quality, agriculture, environmental, and other information in an integrated framework. In the last few decades different modelling tools for resolving problems regarding water quantity and quality were developed, respectively water resources management. Watershed models have been developed to the understanding of water cycle and pollution dynamics, and used to evaluate the impacts of hydrotechnical arrangements and land use management options on water quantity, quality, mitigation measures and possible global changes. Models have been used for planning monitoring network and to develop plans for intervention in case of hydrological disasters: floods, flash floods, drought and pollution. MIKE HYDRO Basin is a multi-purpose, map-centric decision support tool for integrated hydrographical basin analysis, planning and management. MIKE HYDRO Basin is designed for analyzing water sharing issues at international, national and local hydrographical basin level. MIKE HYDRO Basin uses a simplified mathematical representation of the hydrographical basin including the configuration of river and reservoir systems, catchment hydrology and existing and potential water user schemes with their various demands including a rigorous irrigation scheme module. This paper analyzes the importance and principles of integrated hydrographical basin management and develop a case study for Crasna river basin, with the use of MIKE HYDRO Basin advanced hydroinformatic tool for integrated hydrographical basin analysis, planning and management.
2009-09-01
this information supports the decison - making process as it is applied to the management of risk. 2. Operational Risk Operational risk is the threat... reasonability . However, to make a software system fault tolerant, the system needs to recognize and fix a system state condition. To detect a fault, a fault...Tracking ..........................................51 C. DECISION- MAKING PROCESS................................................................51 1. Risk
Massive Multiplayer Online Gaming: A Research Framework for Military Training and Education
2005-03-01
those required by a military transforming itself to operating under the concept of network centric warfare. The technologies and practice...learning. Simulations are popular in other business situations and management processes. Data files, video clips, and flowcharts might help learners...on nature of these environments is another key motivator. According to Randy Hinrich, Microsoft Research Group Research Manager for Learning
Dinh, Thanh; Kim, Younghan
2016-06-02
Nowadays, in big cities, parking management is a critical issue from both the driver's side and the city government's side. From the driver's side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government's side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver's side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably.
Dinh, Thanh; Kim, Younghan
2016-01-01
Nowadays, in big cities, parking management is a critical issue from both the driver’s side and the city government’s side. From the driver’s side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government’s side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver’s side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably. PMID:27271620
Body identification, biometrics and medicine: ethical and social considerations.
Mordini, Emilio; Ottolini, Corinna
2007-01-01
Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny.
CAD-centric Computation Management System for a Virtual TBM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ramakanth Munipalli; K.Y. Szema; P.Y. Huang
HyPerComp Inc. in research collaboration with TEXCEL has set out to build a Virtual Test Blanket Module (VTBM) computational system to address the need in contemporary fusion research for simulating the integrated behavior of the blanket, divertor and plasma facing components in a fusion environment. Physical phenomena to be considered in a VTBM will include fluid flow, heat transfer, mass transfer, neutronics, structural mechanics and electromagnetics. We seek to integrate well established (third-party) simulation software in various disciplines mentioned above. The integrated modeling process will enable user groups to interoperate using a common modeling platform at various stages of themore » analysis. Since CAD is at the core of the simulation (as opposed to computational meshes which are different for each problem,) VTBM will have a well developed CAD interface, governing CAD model editing, cleanup, parameter extraction, model deformation (based on simulation,) CAD-based data interpolation. In Phase-I, we built the CAD-hub of the proposed VTBM and demonstrated its use in modeling a liquid breeder blanket module with coupled MHD and structural mechanics using HIMAG and ANSYS. A complete graphical user interface of the VTBM was created, which will form the foundation of any future development. Conservative data interpolation via CAD (as opposed to mesh-based transfer), the regeneration of CAD models based upon computed deflections, are among the other highlights of phase-I activity.« less
Hybrid scheduling mechanisms for Next-generation Passive Optical Networks based on network coding
NASA Astrophysics Data System (ADS)
Zhao, Jijun; Bai, Wei; Liu, Xin; Feng, Nan; Maier, Martin
2014-10-01
Network coding (NC) integrated into Passive Optical Networks (PONs) is regarded as a promising solution to achieve higher throughput and energy efficiency. To efficiently support multimedia traffic under this new transmission mode, novel NC-based hybrid scheduling mechanisms for Next-generation PONs (NG-PONs) including energy management, time slot management, resource allocation, and Quality-of-Service (QoS) scheduling are proposed in this paper. First, we design an energy-saving scheme that is based on Bidirectional Centric Scheduling (BCS) to reduce the energy consumption of both the Optical Line Terminal (OLT) and Optical Network Units (ONUs). Next, we propose an intra-ONU scheduling and an inter-ONU scheduling scheme, which takes NC into account to support service differentiation and QoS assurance. The presented simulation results show that BCS achieves higher energy efficiency under low traffic loads, clearly outperforming the alternative NC-based Upstream Centric Scheduling (UCS) scheme. Furthermore, BCS is shown to provide better QoS assurance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schulz, Douglas A.
2007-10-08
A biometric system suitable for validating user identity using only mouse movements and no specialized equipment is presented. Mouse curves (mouse movements with little or no pause between them) are individually classied and used to develop classication histograms, which are representative of an individual's typical mouse use. These classication histograms can then be compared to validate identity. This classication approach is suitable for providing continuous identity validation during an entire user session.
Health Games: A Key Component for the Evolution of Wellness Programs.
Lenihan, David
2012-06-01
Healthcare cost growth has been a major concern for both governments and employers. Considerable efforts have been made to "bend the trend" or find ways to control costs. At the highest levels, this has been the move from indemnity care models to managed care and then to consumer-directed health models using Healthcare Reimbursement Accounts and Healthcare Spending Accounts in plan designs. Accompanying this move in plan design has been an effort to get the consumer/patient/employee more engaged and responsible for his or her health expenditures, health decision-making, and activities. Consumers have gone through the phases of health being doctor-centric (indemnity care model), to health plan-centric (managed care models), to consumer-centric (consumer-directed health models). There is currently a need to incorporate wellness into the equation. Simply put, wellness is intended to keep people out of the health system by reducing the risk factors that would put them into the system in the first place. This includes things like smoking cessation, exercise, weight management, nutrition, and other factors over which individuals have a significant level of control over, as well as condition management such as medication adherence, and condition monitoring (such as glucose monitoring for diabetics). Wellness will become increasingly more common for major buyers, initially large self-funded employers and then health plans that will offer it as a part of their overall Plan Design and Administration services. Wellness initiatives will also be offered by Federal and State governments and will include programs for the elderly and at-risk populations as well as for the general population. The measure of success of wellness programs to actually "bend the trend" will be engagement. How large a piece of the population can be captured and retained will be the critical metric for success…and metrics require real data and will be used by the entire healthcare value-chain to measure efficacy and efficiency of "wellness spending."
Community Identity and User Engagement in a Multi-Community Landscape.
Zhang, Justine; Hamilton, William L; Danescu-Niculescu-Mizil, Cristian; Jurafsky, Dan; Leskovec, Jure
2017-05-01
A community's identity defines and shapes its internal dynamics. Our current understanding of this interplay is mostly limited to glimpses gathered from isolated studies of individual communities. In this work we provide a systematic exploration of the nature of this relation across a wide variety of online communities. To this end we introduce a quantitative, language-based typology reflecting two key aspects of a community's identity: how distinctive , and how temporally dynamic it is. By mapping almost 300 Reddit communities into the landscape induced by this typology, we reveal regularities in how patterns of user engagement vary with the characteristics of a community. Our results suggest that the way new and existing users engage with a community depends strongly and systematically on the nature of the collective identity it fosters, in ways that are highly consequential to community maintainers. For example, communities with distinctive and highly dynamic identities are more likely to retain their users. However, such niche communities also exhibit much larger acculturation gaps between existing users and newcomers, which potentially hinder the integration of the latter. More generally, our methodology reveals differences in how various social phenomena manifest across communities, and shows that structuring the multi-community landscape can lead to a better understanding of the systematic nature of this diversity.
Leong, T Y; Kaiser, K; Miksch, S
2007-01-01
Guideline-based clinical decision support is an emerging paradigm to help reduce error, lower cost, and improve quality in evidence-based medicine. The free and open source (FOS) approach is a promising alternative for delivering cost-effective information technology (IT) solutions in health care. In this paper, we survey the current FOS enabling technologies for patient-centric, guideline-based care, and discuss the current trends and future directions of their role in clinical decision support. We searched PubMed, major biomedical informatics websites, and the web in general for papers and links related to FOS health care IT systems. We also relied on our background and knowledge for specific subtopics. We focused on the functionalities of guideline modeling tools, and briefly examined the supporting technologies for terminology, data exchange and electronic health record (EHR) standards. To effectively support patient-centric, guideline-based care, the computerized guidelines and protocols need to be integrated with existing clinical information systems or EHRs. Technologies that enable such integration should be accessible, interoperable, and scalable. A plethora of FOS tools and techniques for supporting different knowledge management and quality assurance tasks involved are available. Many challenges, however, remain in their implementation. There are active and growing trends of deploying FOS enabling technologies for integrating clinical guidelines, protocols, and pathways into the main care processes. The continuing development and maturation of such technologies are likely to make increasingly significant contributions to patient-centric, guideline-based clinical decision support.
Potential Space Applications for Body-Centric Wireless and E-Textile Antennas
NASA Technical Reports Server (NTRS)
Kennedy, Timothy F.; Fink, Patrick W.; Chu, Andrew W.; Studor, George F.
2007-01-01
Space environment benefits of body-centric wireless communications are numerous, particularly in the context of long duration Lunar and Martian outposts that are in planning stages at several space agencies around the world. Since crew time for such missions is a scarce commodity, seamless integration of body-centric wireless from various sources is paramount. Sources include traditional data, such as audio, video, tracking, and biotelemetry. Newer data sources include positioning, orientation, and status of handheld tools and devices, as well as management and status of on-body inventories. In addition to offering lighter weight and flexibility, performance benefits of e-textile antennas are anticipated due to advantageous use of the body s surface area. In creating e-textile antennas and RF devices, researchers are faced with the challenge of transferring conventional and novel designs to textiles. Lack of impedance control, limited conductivity, and the inability to automatically create intricate designs are examples of limitations frequently attributed to e-textiles. Reliable interfaces between e-textiles and conventional hardware also represent significant challenges. Addressing these limitations is critical to the continued development and acceptance of fabric-based circuits for body-centric wireless applications. Here we present several examples of e-textile antennas and RF devices, created using a NASA-developed process, that overcome several of these limitations. The design and performance of an equiangular spiral, miniaturized spiral-loaded slot antenna, and a hybrid coupler are considered, with the e-textile devices showing comparable performance to like designs using conventional materials.
A document centric metadata registration tool constructing earth environmental data infrastructure
NASA Astrophysics Data System (ADS)
Ichino, M.; Kinutani, H.; Ono, M.; Shimizu, T.; Yoshikawa, M.; Masuda, K.; Fukuda, K.; Kawamoto, H.
2009-12-01
DIAS (Data Integration and Analysis System) is one of GEOSS activities in Japan. It is also a leading part of the GEOSS task with the same name defined in GEOSS Ten Year Implementation Plan. The main mission of DIAS is to construct data infrastructure that can effectively integrate earth environmental data such as observation data, numerical model outputs, and socio-economic data provided from the fields of climate, water cycle, ecosystem, ocean, biodiversity and agriculture. Some of DIAS's data products are available at the following web site of http://www.jamstec.go.jp/e/medid/dias. Most of earth environmental data commonly have spatial and temporal attributes such as the covering geographic scope or the created date. The metadata standards including these common attributes are published by the geographic information technical committee (TC211) in ISO (the International Organization for Standardization) as specifications of ISO 19115:2003 and 19139:2007. Accordingly, DIAS metadata is developed with basing on ISO/TC211 metadata standards. From the viewpoint of data users, metadata is useful not only for data retrieval and analysis but also for interoperability and information sharing among experts, beginners and nonprofessionals. On the other hand, from the viewpoint of data providers, two problems were pointed out after discussions. One is that data providers prefer to minimize another tasks and spending time for creating metadata. Another is that data providers want to manage and publish documents to explain their data sets more comprehensively. Because of solving these problems, we have been developing a document centric metadata registration tool. The features of our tool are that the generated documents are available instantly and there is no extra cost for data providers to generate metadata. Also, this tool is developed as a Web application. So, this tool does not demand any software for data providers if they have a web-browser. The interface of the tool provides the section titles of the documents and by filling out the content of each section, the documents for the data sets are automatically published in PDF and HTML format. Furthermore, the metadata XML file which is compliant with ISO19115 and ISO19139 is created at the same moment. The generated metadata are managed in the metadata database of the DIAS project, and will be used in various ISO19139 compliant metadata management tools, such as GeoNetwork.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702
Testing an online, dynamic consent portal for large population biobank research.
Thiel, Daniel B; Platt, Jodyn; Platt, Tevah; King, Susan B; Fisher, Nicole; Shelton, Robert; Kardia, Sharon L R
2015-01-01
Michigan's BioTrust for Health, a public health research biobank comprised of residual dried bloodspot (DBS) cards from newborn screening contains over 4 million samples collected without written consent. Participant-centric initiatives are IT tools that hold great promise to address the consent challenges in biobank research. Working with Private Access Inc., a pioneer in patient-centric web solutions, we created and pilot tested a dynamic informed consent simulation, paired with an educational website, focusing on consent for research utilizing DBSs in Michigan's BioTrust for Health. Out of 187 pilot testers recruited in 2 groups, 137 completed the consent simulation and exit survey. Over 50% indicated their willingness to set up an account if the simulation went live and to recommend it to others. Participants raised concerns about the process of identity verification and appeared to have little experience with sharing health information online. Applying online, dynamic approaches to address the consent challenges raised by biobanks with legacy sample collections should be explored, given the positive reaction to our pilot test and the strong preference for active consent. Balancing security and privacy with accessibility and ease of use will continue to be a challenge. © 2014 S. Karger AG, Basel.
A novel web-enabled healthcare solution on health vault system.
Liao, Lingxia; Chen, Min; Rodrigues, Joel J P C; Lai, Xiaorong; Vuong, Son
2012-06-01
Complicated Electronic Medical Records (EMR) systems have created problems in systems regarding an easy implementation and interoperability for a Web-enabled Healthcare Solution, which is normally provided by an independent healthcare giver with limited IT knowledge and interests. An EMR system with well-designed and user-friendly interface, such as Microsoft HealthVault System used as the back-end platform of a Web-enabled healthcare application will be an approach to deal with these problems. This paper analyzes the patient oriented Web-enabled healthcare service application as the new trend to delivery healthcare from hospital/clinic-centric to patient-centric, the current e-healthcare applications, and the main backend EMR systems. Then, we present a novel web-enabled healthcare solution based on Microsoft HealthVault EMR system to meet customers' needs, such as, low total cost, easily development and maintenance, and good interoperability. A sample system is given to show how the solution can be fulfilled, evaluated, and validated. We expect that this paper will provide a deep understanding of the available EMR systems, leading to insights for new solutions and approaches driven to next generation EMR systems.
Web-based health care agents; the case of reminders and todos, too (R2Do2).
Silverman, B G; Andonyadis, C; Morales, A
1998-11-01
This paper describes efforts to develop and field an agent-based, healthcare middleware framework that securely connects practice rule sets to patient records to anticipate health todo items and to remind and alert users about these items over the web. Reminders and todos, too (R2Do2) is an example of merging data- and document-centric architectures, and of integrating agents into patient-provider collaboration environments. A test of this capability verifies that R2Do2 is progressing toward its two goals: (1) an open standards framework for middleware in the healthcare field; and (2) an implementation of the 'principle of optimality' to derive the best possible health plans for each user. This paper concludes with lessons learned to date.
RT-25: Requirements Management for Net-Centric Enterprises. Phase 1
2011-04-28
software systems. These include Business Process Modeling Notation ( BPMN ) (White and Miers 2008) and Business Process Execution Language (BPEL) (Sarang...Engineering with SysML/UML: Modeling, Analysis, Design, Morgan Kaufmann/The OMG Press. White, S. A. and D. Miers (2008). BPMN Modeling and Reference
Kirby, Sue E; Dennis, Sarah M; Bazeley, Pat; Harris, Mark F
2013-01-01
Understanding the factors that activate people to self-manage chronic disease is important in improving uptake levels. If the many frequent hospital users who present with acute exacerbations of chronic disease were to self-manage at home, some hospital admissions would be avoided. Patient interview and demographic, psychological, clinical and service utilisation data were compared for two groups of patients with chronic disease: those attending self-management services and those who managed by using hospital services. Data were analysed to see whether there were differences that might explain the two different approaches to managing their conditions. The two groups were similar in terms of comorbidity, age, sex, home services, home support and educational level. Self-managing patients were activated by their clinician, accepted their disease, changed their identity, confronted emotions and learnt the skills to self-manage and avoid hospital. Patients who frequently used hospital services to manage their chronic disease were often in denial about their chronic disease, hung on to their identity and expressed little emotional response. However, they reported a stronger sense of coherence and rated their health more highly than self-managing patients. This study shed light on the process of patient activation for self-management. A better understanding of the process of patient activation would encourage clinicians who come into contact with frequently readmitted chronic disease patients to be more proactive in supporting self-management.
Keeping the doctor in the loop: Ayurvedic pharmaceuticals in Kerala.
Kudlu, Chithprabha
2016-12-01
Ethnographic inquiry into Ayurvedic commodification in Kerala revealed the prevalence of a distinct regional pharmaceutical market dominated by physician-manufacturers, oriented towards supplying classical medicines to Ayurvedic doctors. This stands in sharp contrast to mainstream Ayurveda that is observed to have undergone biomedicalization and pharmaceuticalization. This paper argues that Kerala's classical-medicine-centric pharmaceutical market constitutes an alternative modernity because it provided Kerala Ayurveda with a different route to modernization impervious to the biomedical regime, as well as endowing it with the institutional power to safeguard its regional identity. Although physician-entrepreneurs are its key architects, it is sustained by value regimes shaped by a unique regional medico-cultural milieu. Even when industrially produced, classical medicines remain embedded within Ayurveda's socio-technical network; unlike proprietary drugs sold as individual product-identities through non-Ayurvedic channels, they travel together as a pharmacopeia, distributed through exclusive doctor-mediated agencies. This clinic-centric distribution format is best conceptualized as an open-source business model as it made low-margin generics viable by packaging them with therapies and services. Besides ensuring better access and affordability, it provided resistance to pharmaceuticalization and intellectual property concentration. By keeping the doctor in the loop, it prevented medicines from degenerating into de-contextualized commodities; the service component of Ayurveda therein preserved went on become the unique selling point in the health-tourism market. The tourism-inspired proliferation of Brand Kerala eventually triggered a paradigm shift in mainstream Ayurveda - shifting focus from 'pharmaceuticals' to 'services' and from 'illness' to 'wellness'. Furthermore, interacting with hybrid Ayurvedas in transnational markets, Kerala Ayurveda co-produces new alterities countervailing the structurally dominant biomedical paradigm.
NASA Astrophysics Data System (ADS)
Boyes, G. A.; Ellul, C.; Irwin, D.
2017-10-01
The use of 3D information models within collaborative working environments and the practice of Building Information Modelling (BIM) are becoming more commonplace within infrastructure projects. Currently used predominantly during the design and construction phase, the use of BIM is capable in theory of providing the information at handover that will satisfy the Asset Information Requirements (AIRs) of the future Infrastructure Manager (IM). One particular challenge is establishing a link between existing construction-centric information and the asset-centric information needed for future operations. Crossrail, a project to build a new high-frequency railway underneath London, is handling many such challenges as they prepare to handover their digital information to the future operator, in particular the need to provide a two-way link between a federated 3D CAD model and an object-relational Asset Information Management System (AIMS). This paper focusses on the potential for improved Asset Management (AM) by integrating BIM and GIS systems and practices, and makes a preliminary report on how 3D spatial queries can be used to establish a two-way relational link between two information systems (3D geometry and asset lists), as well as the challenges being overcome to transform the data to be suitable for AM.
Dixon, Brian E; Kaneshiro, Kellie
2012-01-01
Human immunodeficiency virus and acquired immunodeficiency syndrome (HIV/AIDS) remains a significant international public health challenge. The Statewide HIV/AIDS Information Network (SHINE) Project was created to improve HIV/AIDS health information use and access for health care professionals, patients, and affected communities in Indiana. Our objective was to assess the information-seeking behaviors of health care professionals and consumers who seek information on the testing, treatment, and management of HIV/AIDS and the usability of the SHINE Project's resources in meeting end user needs. The feedback was designed to help SHINE Project members improve and expand the SHINE Project's online resources. A convenience sample of health care professionals and consumers participated in a usability study. Participants were asked to complete typical HIV/AIDS information-seeking tasks using the SHINE Project website. Feedback was provided in the form of standardized questionnaire and usability "think-aloud" responses. Thirteen participants took part in the usability study. Clinicians generally reported the site to be "very good," while consumers generally found it to be "good." Health care professionals commented that they lack access to comprehensive resources for treating patients with HIV/AIDS. They requested new electronic resources that could be integrated in clinical practice and existing information technology infrastructures. Consumers found the SHINE website and its collected information resources overwhelming and difficult to navigate. They requested simpler, multimedia-content rich resources to deliver information on HIV/AIDS testing, treatment, and disease management. Accessibility, usability, and user education remain important challenges that public health and information specialists must address when developing and deploying interventions intended to empower consumers and support coordinated, patient-centric care.
WebDB Component Builder - Lessons Learned
DOE Office of Scientific and Technical Information (OSTI.GOV)
Macedo, C.
2000-02-15
Oracle WebDB is the easiest way to produce web enabled lightweight and enterprise-centric applications. This concept from Oracle has tantalized our taste for simplistic web development by using a purely web based tool that lives nowhere else but in the database. The use of online wizards, templates, and query builders, which produces PL/SQL behind the curtains, can be used straight ''out of the box'' by both novice and seasoned developers. The topic of this presentation will introduce lessons learned by developing and deploying applications built using the WebDB Component Builder in conjunction with custom PL/SQL code to empower a hybridmore » application. There are two kinds of WebDB components: those that display data to end users via reporting, and those that let end users update data in the database via entry forms. The presentation will also discuss various methods within the Component Builder to enhance the applications pushed to the desktop. The demonstrated example is an application entitled HOME (Helping Other's More Effectively) that was built to manage a yearly United Way Campaign effort. Our task was to build an end to end application which could manage approximately 900 non-profit agencies, an average of 4,100 individual contributions, and $1.2 million dollars. Using WebDB, the shell of the application was put together in a matter of a few weeks. However, we did encounter some hurdles that WebDB, in it's stage of infancy (v2.0), could not solve for us directly. Together with custom PL/SQL, WebDB's Component Builder became a powerful tool that enabled us to produce a very flexible hybrid application.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... group research project. Membership in this group research project remains open, and Network Centric... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC...
2015-11-11
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
2015-09-07
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
2003-01-01
dependencies, and conceptual independencies. Taken together, the three views provide a framework to ensure interoperability, regardless of system... products for COP users . It enables a shared situational awareness that significantly improves the ability of commanders at all levels to quickly make... Review , March-April 1998. 5 Eric K. Shinseki, General , U.S. Army. “ The Army Transformation: A Historic Opportunity,” 2001- 02 Army Green Book
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bethel, E. Wes; Greenwald, Martin; Kleese van Dam, Kerstin
Scientific user facilities—particle accelerators, telescopes, colliders, supercomputers, light sources, sequencing facilities, and more—operated by the U.S. Department of Energy (DOE) Office of Science (SC) generate ever increasing volumes of data at unprecedented rates from experiments, observations, and simulations. At the same time there is a growing community of experimentalists that require real-time data analysis feedback, to enable them to steer their complex experimental instruments to optimized scientific outcomes and new discoveries. Recent efforts in DOE-SC have focused on articulating the data-centric challenges and opportunities facing these science communities. Key challenges include difficulties coping with data size, rate, and complexity inmore » the context of both real-time and post-experiment data analysis and interpretation. Solutions will require algorithmic and mathematical advances, as well as hardware and software infrastructures that adequately support data-intensive scientific workloads. This paper presents the summary findings of a workshop held by DOE-SC in September 2015, convened to identify the major challenges and the research that is needed to meet those challenges.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bethel, E. Wes; Greenwald, Martin; Kleese van Dam, Kersten
Scientific user facilities---particle accelerators, telescopes, colliders, supercomputers, light sources, sequencing facilities, and more---operated by the U.S. Department of Energy (DOE) Office of Science (SC) generate ever increasing volumes of data at unprecedented rates from experiments, observations, and simulations. At the same time there is a growing community of experimentalists that require real-time data analysis feedback, to enable them to steer their complex experimental instruments to optimized scientific outcomes and new discoveries. Recent efforts in DOE-SC have focused on articulating the data-centric challenges and opportunities facing these science communities. Key challenges include difficulties coping with data size, rate, and complexity inmore » the context of both real-time and post-experiment data analysis and interpretation. Solutions will require algorithmic and mathematical advances, as well as hardware and software infrastructures that adequately support data-intensive scientific workloads. This paper presents the summary findings of a workshop held by DOE-SC in September 2015, convened to identify the major challenges and the research that is needed to meet those challenges.« less
Image-guided endobronchial ultrasound
NASA Astrophysics Data System (ADS)
Higgins, William E.; Zang, Xiaonan; Cheirsilp, Ronnarit; Byrnes, Patrick; Kuhlengel, Trevor; Bascom, Rebecca; Toth, Jennifer
2016-03-01
Endobronchial ultrasound (EBUS) is now recommended as a standard procedure for in vivo verification of extraluminal diagnostic sites during cancer-staging bronchoscopy. Yet, physicians vary considerably in their skills at using EBUS effectively. Regarding existing bronchoscopy guidance systems, studies have shown their effectiveness in the lung-cancer management process. With such a system, a patient's X-ray computed tomography (CT) scan is used to plan a procedure to regions of interest (ROIs). This plan is then used during follow-on guided bronchoscopy. Recent clinical guidelines for lung cancer, however, also dictate using positron emission tomography (PET) imaging for identifying suspicious ROIs and aiding in the cancer-staging process. While researchers have attempted to use guided bronchoscopy systems in tandem with PET imaging and EBUS, no true EBUS-centric guidance system exists. We now propose a full multimodal image-based methodology for guiding EBUS. The complete methodology involves two components: 1) a procedure planning protocol that gives bronchoscope movements appropriate for live EBUS positioning; and 2) a guidance strategy and associated system graphical user interface (GUI) designed for image-guided EBUS. We present results demonstrating the operation of the system.
ICAROUS - Integrated Configurable Algorithms for Reliable Operations Of Unmanned Systems
NASA Technical Reports Server (NTRS)
Consiglio, María; Muñoz, César; Hagen, George; Narkawicz, Anthony; Balachandran, Swee
2016-01-01
NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations. This paper describes a new capability referred to as ICAROUS (Integrated Configurable Algorithms for Reliable Operations of Unmanned Systems), which is being developed under the UTM project. ICAROUS is a software architecture comprised of highly assured algorithms for building safety-centric, autonomous, unmanned aircraft applications. Central to the development of the ICAROUS algorithms is the use of well-established formal methods to guarantee higher levels of safety assurance by monitoring and bounding the behavior of autonomous systems. The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and contingency control functions. ICAROUS also provides a highly configurable user interface that enables the modular integration of mission-specific software components.
ICAROUS: Integrated Configurable Architecture for Unmanned Systems
NASA Technical Reports Server (NTRS)
Consiglio, Maria C.
2016-01-01
NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations. This video describes a new capability referred to as ICAROUS (Integrated Configurable Algorithms for Reliable Operations of Unmanned Systems), which is being developed under the auspices of the UTM project. ICAROUS is a software architecture comprised of highly assured algorithms for building safety-centric, autonomous, unmanned aircraft applications. Central to the development of the ICAROUS algorithms is the use of well-established formal methods to guarantee higher levels of safety assurance by monitoring and bounding the behavior of autonomous systems. The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and autonomous detect and avoid functions. ICAROUS also provides a highly configurable user interface that enables the modular integration of mission-specific software components.
TargetVue: Visual Analysis of Anomalous User Behaviors in Online Communication Systems.
Cao, Nan; Shi, Conglei; Lin, Sabrina; Lu, Jie; Lin, Yu-Ru; Lin, Ching-Yung
2016-01-01
Users with anomalous behaviors in online communication systems (e.g. email and social medial platforms) are potential threats to society. Automated anomaly detection based on advanced machine learning techniques has been developed to combat this issue; challenges remain, though, due to the difficulty of obtaining proper ground truth for model training and evaluation. Therefore, substantial human judgment on the automated analysis results is often required to better adjust the performance of anomaly detection. Unfortunately, techniques that allow users to understand the analysis results more efficiently, to make a confident judgment about anomalies, and to explore data in their context, are still lacking. In this paper, we propose a novel visual analysis system, TargetVue, which detects anomalous users via an unsupervised learning model and visualizes the behaviors of suspicious users in behavior-rich context through novel visualization designs and multiple coordinated contextual views. Particularly, TargetVue incorporates three new ego-centric glyphs to visually summarize a user's behaviors which effectively present the user's communication activities, features, and social interactions. An efficient layout method is proposed to place these glyphs on a triangle grid, which captures similarities among users and facilitates comparisons of behaviors of different users. We demonstrate the power of TargetVue through its application in a social bot detection challenge using Twitter data, a case study based on email records, and an interview with expert users. Our evaluation shows that TargetVue is beneficial to the detection of users with anomalous communication behaviors.
NASA Astrophysics Data System (ADS)
Bilal, Muhammad; Asfand-e-Yar, Mockford, Steve; Khan, Wasiq; Awan, Irfan
2012-11-01
Mobile technology is among the fastest growing technologies in today's world with low cost and highly effective benefits. Most important and entertaining areas in mobile technology development and usage are location based services, user friendly networked applications and gaming applications. However, concern towards network operator service provision and improvement has been very low. The portable applications available for a range of mobile operating systems which help improve the network operator services are desirable by the mobile operators. This paper proposes a state of the art mobile application Tracesaver, which provides a great achievement over the barriers in gathering device and network related information, for network operators to improve their network service provision. Tracesaver is available for a broad range of mobile devices with different mobile operating systems and computational capabilities. The availability of Tracesaver in market has proliferated over the last year since it was published. The survey and results show that Tracesaver is being used by millions of mobile users and provides novel ways of network service improvement with its highly user friendly interface.
Identity-Based Authentication for Cloud Computing
NASA Astrophysics Data System (ADS)
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
ERIC Educational Resources Information Center
Andergassen, Monika; Mödritscher, Felix; Neumann, Gustaf
2014-01-01
Learner-centric research on factors influencing learning results has focused, among other things, on student characteristics, demographic data, and usage patterns in learning management systems (LMSs). This paper complements the existing research by investigating potential correlations between learning results and LMS usage during exam…
Knowledge Management in Teacher Education Progress and Future Prospects
ERIC Educational Resources Information Center
Mohan, Radha
2005-01-01
This paper develops a practical guideline for intellectual capital measuring and reporting in the context of teacher education institutions. Intellectual capital is obviously the foundation for knowledge-centric organizations like teacher training colleges. According to Bertrand Russell: "The defense of the state in all civilized countries is…
Requirements Management for Net-Centric Enterprises. Phase 2
2011-12-31
BusinessWor ks X X X X X Talend Integration Suite – Enterprise Edition X X X X X X X Informatica Data Integration Product Suite...UNCLASSIFIED 83 TIBCO ActiveMatrix BusinessWor ks X NS Talend Integration Suite – Enterprise Edition X X X X X X NS Informatica Data
Griffiths, Scott; Murray, Stuart B; Krug, Isabel; McLean, Siân A
2018-03-01
Social media has been associated with body dissatisfaction and eating disorder symptoms among young women and adolescent girls. However, despite notable evidence of susceptibility to body image pressures, it remains unknown whether these associations generalize to sexual minority men. A nationwide sample of 2,733 sexual minority men completed an online survey advertised to Australian and New Zealand users of a popular dating app. Participants answered questions about how frequently they used 11 different social media platforms in addition to questions about their dating app use, body image, eating disorder symptoms, and anabolic steroids. Facebook, Youtube, Instagram, and Snapchat were the most frequently used social media platforms. A pattern of small-sized and positive associations emerged between social media use and body dissatisfaction, eating disorder symptoms, and thoughts about using anabolic steroids. Facebook, Instagram, and Snapchat evidenced the strongest associations. The associations of social media use with both muscularity dissatisfaction and eating disorder symptoms were stronger for image-centric social media platforms (e.g., Instagram) than nonimage-centric platforms (e.g., Wordpress); no differences were observed for body fat dissatisfaction, height dissatisfaction, or thoughts about using anabolic steroids. Previously documented associations of social media use with body dissatisfaction and related variables among women and girls appear to generalize to sexual minority men. Social media platforms that more centrally involve imagery may be of greater concern than nonimage-centric platforms. Additional research with sexual minority men is needed to elucidate the distinctions between adaptive and maladaptive social media use in the context of body dissatisfaction, eating disorders, and anabolic steroid use.
Exploring Identity Motives in Twitter Usage in Saudi Arabia and the UK.
Selim, Heyla A; Long, Karen M; Vignoles, Vivian L
2014-01-01
This study explores identity motives for using a microblogging site (Twitter) among Internet users in Saudi Arabia and the UK. The former boasts the world's highest per capita use of Twitter, which provides a forum in which users have more opportunity for self-expression than they do in the offline world, and is not subject to the heavy censorship which the Saudi government imposes on other Internet content [1]. Approximately 5000 tweets from the period April-May 2013 were coded and analyzed, using Motivated Identity Construction Theory as a conceptual framework [2]. This theory proposes six universal identity motives of meaning, belonging, continuity, distinctiveness, efficacy, and self-esteem. We consider these motives in turn, and examine their relative prominence in an online context. Support was found for all six universal motives, but the relative prominence of motives and the ways in which they were pursued appeared to depend on the affordances of both the OSN in question, Twitter and the cultural context in which the user was posting: Saudi users appeared to seek distinctiveness, whereas for British users, belonging was a more salient motive. Themes related to meaning, efficacy, and self-esteem were detected frequently, whereas themes related to continuity were less apparent.
Towards usable and interdisciplinary e-infrastructure (Invited)
NASA Astrophysics Data System (ADS)
de Roure, D.
2010-12-01
e-Science and cyberinfrastucture at their outset tended to focus on ‘big science’ and cross-organisational infrastructures, demonstrating complex engineering with the promise of high returns. It soon became evident that the key to researchers harnessing new technology for everyday use is a user-centric approach which empowers the user - both from a developer and an end user viewpoint. For example, this philosophy is demonstrated in workflow systems for systematic data processing and in the Web 2.0 approach as exemplified by the myExperiment social web site for sharing workflows, methods and ‘research objects’. Hence the most disruptive aspect of Cloud and virtualisation is perhaps that they make new computational resources and applications usable, creating a flourishing ecosystem for routine processing and innovation alike - and in this we must consider software sustainability. This talk will discuss the changing nature of e-Science digital ecosystem, focus on the e-infrastructure for cross-disciplinary work, and highlight issues in sustainable software development in this context.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Identity Federation and Its Importance for NASA's Future: The SharePoint Extranet Pilot
NASA Technical Reports Server (NTRS)
Baturin, Rebecca R.
2013-01-01
My project at Kennedy Space Center (KSC) during the spring 2013 Project Management and Systems Engineering Internship was to functionalJy test and deploy the SharePoint Extranet system and ensure successful completion of the project's various lifecycle milestones as described by NASA Procedural Requirement (NPR) 7 120.7. I worked alongside NASA Project Managers, Systems Integration Engineers, and Information Technology (IT) Professionals to pilot this collaboration capability between NASA and its External Partners. The use of identity federation allows NASA to leverage externally-issued credentials of other federal agencies and private aerospace and defense companies, versus the traditional process of granting and maintaining full NASA identities for these individuals. This is the first system of its kind at NASA and it will serve as a pilot for the Federal Government. Recognizing the novelty of this service, NASA's initial approach for deployment included a pilot period where nearby employees of Patrick Air Force Base would assist in testing and deployment. By utilizing a credential registration process, Air Force users mapped their Air Force-issued Common Access Cards (CAC) to a NASA identity for access to the External SharePoint. Once the Air Force stands up an Active Directory Federation Services (ADFS) instance within their Data Center and establishes a direct trust with NASA, true identity federation can be established. The next partner NASA is targeting for collaboration is Lockheed Martin (LMCO), since they collaborate frequently for the ORION Program. Through the use of Exostar as an identity hub, LMCO employees will be able to access NASA data on a need to know basis, with NASA ultimately managing access. In a time when every dollar and resource is being scrutinized, this capability is an exciting new way for NASA to continue its collaboration efforts in a cost and resource effective manner.
Usability Guidelines for Product Recommenders Based on Example Critiquing Research
NASA Astrophysics Data System (ADS)
Pu, Pearl; Faltings, Boi; Chen, Li; Zhang, Jiyong; Viappiani, Paolo
Over the past decade, our group has developed a suite of decision tools based on example critiquing to help users find their preferred products in e-commerce environments. In this chapter, we survey important usability research work relative to example critiquing and summarize the major results by deriving a set of usability guidelines. Our survey is focused on three key interaction activities between the user and the system: the initial preference elicitation process, the preference revision process, and the presentation of the systems recommendation results. To provide a basis for the derivation of the guidelines, we developed a multi-objective framework of three interacting criteria: accuracy, confidence, and effort (ACE). We use this framework to analyze our past work and provide a specific context for each guideline: when the system should maximize its ability to increase users' decision accuracy, when to increase user confidence, and when to minimize the interaction effort for the users. Due to the general nature of this multi-criteria model, the set of guidelines that we propose can be used to ease the usability engineering process of other recommender systems, especially those used in e-commerce environments. The ACE framework presented here is also the first in the field to evaluate the performance of preference-based recommenders from a user-centric point of view.
The Impact of Trauma on Drug Users' Identities
ERIC Educational Resources Information Center
Etherington, Kim
2007-01-01
This article addresses drug users' identity construction, and invites counsellors, psychotherapists, researchers and others who work with drug misusers to notice how cultural and societal discourses can shape drug misusers' stories, and the positions from which helpers listen and respond to them. By representing and analysing parts of two life…
2007-03-01
potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
Ross, Stephen E; Johnson, Kevin B; Siek, Katie A; Gordon, Jeffry S; Khan, Danish U; Haverhals, Leah M
2011-07-12
Adverse drug events are a major safety issue in ambulatory care. Improving medication self-management could reduce these adverse events. Researchers have developed medication applications for tethered personal health records (PHRs), but little has been reported about medication applications for interoperable PHRs. Our objective was to develop two complementary personal health applications on a common PHR platform: one to assist children with complex health needs (MyMediHealth), and one to assist older adults in care transitions (Colorado Care Tablet). The applications were developed using a user-centered design approach. The two applications shared a common PHR platform based on a service-oriented architecture. MyMediHealth employed Web and mobile phone user interfaces. Colorado Care Tablet employed a Web interface customized for a tablet PC. We created complementary medication management applications tailored to the needs of distinctly different user groups using common components. Challenges were addressed in multiple areas, including how to encode medication identities, how to incorporate knowledge bases for medication images and consumer health information, how to include supplementary dosing information, how to simplify user interfaces for older adults, and how to support mobile devices for children. These prototypes demonstrate the utility of abstracting PHR data and services (the PHR platform) from applications that can be tailored to meet the needs of diverse patients. Based on the challenges we faced, we provide recommendations on the structure of publicly available knowledge resources and the use of mobile messaging systems for PHR applications.
NASA Center for Climate Simulation (NCCS) Presentation
NASA Technical Reports Server (NTRS)
Webster, William P.
2012-01-01
The NASA Center for Climate Simulation (NCCS) offers integrated supercomputing, visualization, and data interaction technologies to enhance NASA's weather and climate prediction capabilities. It serves hundreds of users at NASA Goddard Space Flight Center, as well as other NASA centers, laboratories, and universities across the US. Over the past year, NCCS has continued expanding its data-centric computing environment to meet the increasingly data-intensive challenges of climate science. We doubled our Discover supercomputer's peak performance to more than 800 teraflops by adding 7,680 Intel Xeon Sandy Bridge processor-cores and most recently 240 Intel Xeon Phi Many Integrated Core (MIG) co-processors. A supercomputing-class analysis system named Dali gives users rapid access to their data on Discover and high-performance software including the Ultra-scale Visualization Climate Data Analysis Tools (UV-CDAT), with interfaces from user desktops and a 17- by 6-foot visualization wall. NCCS also is exploring highly efficient climate data services and management with a new MapReduce/Hadoop cluster while augmenting its data distribution to the science community. Using NCCS resources, NASA completed its modeling contributions to the Intergovernmental Panel on Climate Change (IPCG) Fifth Assessment Report this summer as part of the ongoing Coupled Modellntercomparison Project Phase 5 (CMIP5). Ensembles of simulations run on Discover reached back to the year 1000 to test model accuracy and projected climate change through the year 2300 based on four different scenarios of greenhouse gases, aerosols, and land use. The data resulting from several thousand IPCC/CMIP5 simulations, as well as a variety of other simulation, reanalysis, and observationdatasets, are available to scientists and decision makers through an enhanced NCCS Earth System Grid Federation Gateway. Worldwide downloads have totaled over 110 terabytes of data.
Knowledge-Centric Management of Business Rules in a Pharmacy
NASA Astrophysics Data System (ADS)
Puustjärvi, Juha; Puustjärvi, Leena
A business rule defines or constraints some aspect of the business. In healthcare sector many of the business rules are dictated by law or medical regulations, which are constantly changing. This is a challenge for the healthcare organizations. Although there is available several commercial business rule management systems the problem from pharmacies point of view is that these systems are overly geared towards the automation and manipulation of business rules, while the main need in pharmacies lies in easy retrieving of business rules within daily routines. Another problem is that business rule management systems are isolated in the sense that they have their own data stores that cannot be accessed by other information systems used in pharmacies. As a result, a pharmacist is burdened by accessing many systems inside a user task. In order to avoid this problem we have modeled business rules as well as their relationships to other relevant information by OWL (Web Ontology Language) such that the ontology is shared among the pharmacy's applications. In this way we can avoid the problems of isolated applications and replicated data. The ontology also encourages pharmacies business agility, i.e., the ability to react more rapidly to the changes required by the new business rules. The deployment of the ontology requires that stored business rules are annotated by appropriate metadata descriptions, which are presented by RDF/XML serialization format. However, neither the designer nor the pharmacists are burdened by RDF/XML format as there are sophisticated graphical editors that can be used.
Perceptions of Insulin Treatment Among African Americans With Uncontrolled Type 2 Diabetes.
Bockwoldt, Denise; Staffileno, Beth A; Coke, Lola; Quinn, Lauretta
2016-03-01
Little is known regarding perception of insulin treatment among midlife and older African American (AA) adults with type 2 diabetes, or how perception affects self-management behaviors. Using the Roy adaptation model, this qualitative descriptive study explored the perception of insulin treatment in midlife and older AAs living with uncontrolled type 2 diabetes. Three 1-hour focus groups were conducted with a total of 13 participants. Thematic analysis of transcribed audio recordings used the constant comparative method. Themes identified include (a) insulin as instigator of negative emotions, (b) adapting to a lifestyle with insulin, and (c) becoming an insulin user: a new identity. Adapting to insulin is a psychosocial process that commonly results in negative emotions, identity conflict, and new roles. Further research is needed to understand how AA adults perceive insulin treatment, understand the role of perception in self-management behaviors, and determine whether interventions to change perceptions may be effective in improving adaptation to diabetes. © The Author(s) 2014.
Piszczek, Matthew M.; Pichler, Shaun; Turel, Ofir; Greenhaus, Jeffrey
2016-01-01
Management and organization research has traditionally focused on employees’ work role and the interface between their work and family roles. We suggest that persons assume a third role in modern society that is relevant to work and organizations, namely the Information and Communication Technology User (ICTU) role. Based on role theory and boundary theory, we develop propositions about the characteristics of this role, as well as how ICTU role characteristics are related to boundary spanning activity, inter-role spillover with the work role, and work role performance. To this end, we first conceptualize the ICTU role and its associations with work and family roles. We then apply identity theory and boundary management theory to advance our understanding of how the ICTU role is related to criteria that are important to individuals and to organizations, namely self-selection into certain types of work roles and positive and negative inter-role spillover. The implications of this role for theory, research, and practice in management and organizations are discussed. PMID:28082936
Trajectory Based Behavior Analysis for User Verification
NASA Astrophysics Data System (ADS)
Pao, Hsing-Kuo; Lin, Hong-Yi; Chen, Kuan-Ta; Fadlil, Junaidillah
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden patterns embedded in the trajectories produced by account users. We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior in the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The method can also be applied for the task of recognition, predicting the trajectory type without pre-defined identity. Given a trajectory input, the results show that the proposed method can accurately verify the user identity, or suggest whom owns the trajectory if the input identity is not provided.
Specification Patent Management for Web Application Platform Ecosystem
NASA Astrophysics Data System (ADS)
Fukami, Yoshiaki; Isshiki, Masao; Takeda, Hideaki; Ohmukai, Ikki; Kokuryo, Jiro
Diversified usage of web applications has encouraged disintegration of web platform into management of identification and applications. Users make use of various kinds of data linked to their identity with multiple applications on certain social web platforms such as Facebook or MySpace. There has emerged competition among web application platforms. Platformers can design relationship with developers by controlling patent of their own specification and adopt open technologies developed external organizations. Platformers choose a way to open according to feature of the specification and their position. Patent management of specification come to be a key success factor to build competitive web application platforms. Each way to attract external developers such as standardization, open source has not discussed and analyzed all together.
Using color management in color document processing
NASA Astrophysics Data System (ADS)
Nehab, Smadar
1995-04-01
Color Management Systems have been used for several years in Desktop Publishing (DTP) environments. While this development hasn't matured yet, we are already experiencing the next generation of the color imaging revolution-Device Independent Color for the small office/home office (SOHO) environment. Though there are still open technical issues with device independent color matching, they are not the focal point of this paper. This paper discusses two new and crucial aspects in using color management in color document processing: the management of color objects and their associated color rendering methods; a proposal for a precedence order and handshaking protocol among the various software components involved in color document processing. As color peripherals become affordable to the SOHO market, color management also becomes a prerequisite for common document authoring applications such as word processors. The first color management solutions were oriented towards DTP environments whose requirements were largely different. For example, DTP documents are image-centric, as opposed to SOHO documents that are text and charts centric. To achieve optimal reproduction on low-cost SOHO peripherals, it is critical that different color rendering methods are used for the different document object types. The first challenge in using color management of color document processing is the association of rendering methods with object types. As a result of an evolutionary process, color matching solutions are now available as application software, as driver embedded software and as operating system extensions. Consequently, document processing faces a new challenge, the correct selection of the color matching solution while avoiding duplicate color corrections.
Globalization and its implications for forest health
Andrew Liebhold; Michael Wingfield
2014-01-01
Consideration of forest health is central to the sustainable management of forests. While many definitions of forest health have been proposed, the most widely adopted concept refers to the sustained functioning of desired forest ecosystem processes (Kolb et al., 1994). Legitimate complaints have been raised about the human-centric usage of the term "Forest Health...
Multi-Filter String Matching and Human-Centric Entity Matching for Information Extraction
ERIC Educational Resources Information Center
Sun, Chong
2012-01-01
More and more information is being generated in text documents, such as Web pages, emails and blogs. To effectively manage this unstructured information, one broadly used approach includes locating relevant content in documents, extracting structured information and integrating the extracted information for querying, mining or further analysis. In…
Controlling Curriculum Redesign with a Process Improvement Model
ERIC Educational Resources Information Center
Drinka, Dennis; Yen, Minnie Yi-Miin
2008-01-01
A portion of the curriculum for a Management Information Systems degree was redesigned to enhance the experiential learning of students by focusing it on a three-semester community-based system development project. The entire curriculum was then redesigned to have a project-centric focus with each course in the curriculum contributing to the…
Designing patient-centric applications for chronic disease management.
Tsalatsanis, Athanasios; Gil-Herrera, Eleazar; Yalcin, Ali; Djulbegovic, Benjamin; Barnes, Laura
2011-01-01
Chronic diseases such as diabetes and heart disease are the leading causes of disability and death in the developed world. Technological interventions such as mobile applications have the ability to facilitate and motivate patients in chronic disease management, but these types of interventions present considerable design challenges. The primary objective of this paper is to present the challenges arising from the design and implementation of software applications aiming to assist patients in chronic disease management. We also outline preliminary results regarding a self-management application currently under development targeting young adults suffering from type 1 diabetes.
Blobel, Bernd
2013-01-01
Based on the paradigm changes for health, health services and underlying technologies as well as the need for at best comprehensive and increasingly automated interoperability, the paper addresses the challenge of knowledge representation and management for medical decision support. After introducing related definitions, a system-theoretical, architecture-centric approach to decision support systems (DSSs) and appropriate ways for representing them using systems of ontologies is given. Finally, existing and emerging knowledge representation and management standards are presented. The paper focuses on the knowledge representation and management part of DSSs, excluding the reasoning part from consideration.
Constantinescu, L; Pradana, R; Kim, J; Gong, P; Fulham, Michael; Feng, D
2009-01-01
Rich Internet Applications (RIAs) are an emerging software platform that blurs the line between web service and native application, and is a powerful tool for handheld device deployment. By democratizing health data management and widening its availability, this software platform has the potential to revolutionize telemedicine, clinical practice, medical education and information distribution, particularly in rural areas, and to make patient-centric medical computing a reality. In this paper, we propose a telemedicine application that leverages the ability of a mobile RIA platform to transcode, organise and present textual and multimedia data, which are sourced from medical database software. We adopted a web-based approach to communicate, in real-time, with an established hospital information system via a custom RIA. The proposed solution allows communication between handheld devices and a hospital information system for media streaming with support for real-time encryption, on any RIA enabled platform. We demonstrate our prototype's ability to securely and rapidly access, without installation requirements, medical data ranging from simple textual records to multi-slice PET-CT images and maximum intensity (MIP) projections.
Constructing Glocal Identities through Multilingual Writing Practices on Flickr.com[R
ERIC Educational Resources Information Center
Lee, Carmen K. M.; Barton, David
2011-01-01
This article reports on a study of user-generated multilingual writing activities on the photo sharing site, Flickr.com[R]. It discusses how Flickr users deploy their multilingual resources when interacting with international audiences, the factors affecting their language choice, and how new multilingual identities are constructed. An exploratory…
ERIC Educational Resources Information Center
Adawu, Anthony; Martin-Beltran, Melinda
2012-01-01
Using sociocultural and poststructuralist theoretical lenses, this study examines the narrative construction of language-learner identity across time and space. We applied cross-narrative methodologies to analyze language-learning autobiographies and interview data from three English users who had recently transitioned to a U.S. context for…
A Queueing Approach to Optimal Resource Replication in Wireless Sensor Networks
2009-04-29
network (an energy- centric approach) or to ensure the proportion of query failures does not exceed a predetermined threshold (a failure- centric ...replication strategies in wireless sensor networks. The model can be used to minimize either the total transmission rate of the network (an energy- centric ...approach) or to ensure the proportion of query failures does not exceed a predetermined threshold (a failure- centric approach). The model explicitly
Applying User Centered Design to Research Work
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scholtz, Jean; Love, Oriana J.; Pike, William A.
The SuperIdentity (SID) research project is a collaboration between six universities in the UK (Bath, Dundee, Kent, Leicester, Oxford, and Southampton) and the Pacific Northwest National Laboratory (PNNL). SID offers an innovative and exciting new approach to the concept of identity. The assumption underlying our hypothesis is that while there may be many dimensions to an identity - some more stable than others - all should ultimately reference back to a single core identity or a 'SuperIdentity.' The obvious consequence is that identification is improved by the combination of measures. Our work at PNNL has focused on the developing usemore » cases to use in developing a model of identity and in developing visualizations for both researchers to explore the model and in the future for end users to use in determining various paths that may be possible to obtain various identity attributes from a set that is already known.« less
Department of Defense Command and Control Implementation Plan, Version 1.0
2009-10-01
needs • Be maintained by the C2 Capability Portfolio Manager ( CPM ) and updated every 2 years to address emerging C2 operational concepts, changing and...including sources managed by the C2 CPM as well as other CPMs (e.g., Net- Centric, Battlespace Awareness, and Logistics). C2 platforms and facilities with...incremental delivery of improved capabilities over time. Implementation planning is a C2 CPM -facilitated activity that involves identifying and
Weather-centric rangeland revegetation planning
Hardegree, Stuart P.; Abatzoglou, John T.; Brunson, Mark W.; Germino, Matthew; Hegewisch, Katherine C.; Moffet, Corey A.; Pilliod, David S.; Roundy, Bruce A.; Boehm, Alex R.; Meredith, Gwendwr R.
2018-01-01
Invasive annual weeds negatively impact ecosystem services and pose a major conservation threat on semiarid rangelands throughout the western United States. Rehabilitation of these rangelands is challenging due to interannual climate and subseasonal weather variability that impacts seed germination, seedling survival and establishment, annual weed dynamics, wildfire frequency, and soil stability. Rehabilitation and restoration outcomes could be improved by adopting a weather-centric approach that uses the full spectrum of available site-specific weather information from historical observations, seasonal climate forecasts, and climate-change projections. Climate data can be used retrospectively to interpret success or failure of past seedings by describing seasonal and longer-term patterns of environmental variability subsequent to planting. A more detailed evaluation of weather impacts on site conditions may yield more flexible adaptive-management strategies for rangeland restoration and rehabilitation, as well as provide estimates of transition probabilities between desirable and undesirable vegetation states. Skillful seasonal climate forecasts could greatly improve the cost efficiency of management treatments by limiting revegetation activities to time periods where forecasts suggest higher probabilities of successful seedling establishment. Climate-change projections are key to the application of current environmental models for development of mitigation and adaptation strategies and for management practices that require a multidecadal planning horizon. Adoption of new weather technology will require collaboration between land managers and revegetation specialists and modifications to the way we currently plan and conduct rangeland rehabilitation and restoration in the Intermountain West.
Goldblat, Ester; Most, Tova
2018-07-01
This study examined the relationships between cultural identity, severity of hearing loss (HL), and the use of a cochlear implant (CI). One hundred and forty-one adolescents and young adults divided into three groups (deaf with CI, deaf without CI, and hard-of-hearing (HH)) and 134 parents participated. Adolescents and young adults completed questionnaires on cultural identity (hearing, Deaf, marginal, bicultural-hearing, and bicultural-deaf) and communication proficiencies (hearing, spoken language, and sign language). Parents completed a speech quality questionnaire. Deaf participants without CI and those with CI differed in all identities except marginal identity. CI users and HH participants had similar identities except for a stronger bicultural-deaf identity among CI users. Three clusters of participants evolved: participants with a dominant bicultural-deaf identity, participants with a dominant bicultural-hearing identity and participants without a formed cultural identity. Adolescents and young adults who were proficient in one of the modes of communication developed well-established bicultural identities. Adolescents and young adults who were not proficient in one of the modes of communication did not develop a distinguished cultural identity. These results suggest that communication proficiencies are crucial for developing defined identities.
Corvol, A; Balard, F; Moutel, G; Somme, D
2014-01-01
Case management is a new professional field in France. It is addressed to elderly persons living in community whose situation is regarded as particularly complex. Case managers have to assess needs and coordinate necessary services. One common criteria of complexity is refusal of care. The objective of this study is to compare the words of users with those of case managers about refusal of care, in order to understand its meaning, professionals' attitudes and ethical challenges. Two researchers have cooperated on this qualitative research: the first one, anthropologist, interviewed 19 individuals, and 11 of their caregivers. The second one, geriatrician and researcher in medical ethics, lead four focus groups gathering a total of 18 case managers. Refusal of care often is the result of the will of preserving one's identity, compromised by illness. Individuals seek control on their life. Facing this behaviour, case managers try to secure the individual, by establishing a personal relationship that respects their choices, even if care has to be delayed. Refusal of care may sometimes disclose a desire to vanish, in front of which professionals meet their own limits. To recognise an elderly person that refuses care as a unique individual who can make choices secure his identity, and allow him to change. Copyright © 2013 Société nationale française de médecine interne (SNFMI). Published by Elsevier SAS. All rights reserved.
Enterprise Linked Data as Core Business Infrastructure
NASA Astrophysics Data System (ADS)
Harris, Steve; Ilube, Tom; Tuffield, Mischa
This chapter describes Garlik's motivation, interest, and experiences of using Linked Data technologies in its online services. It describes the methodologies and approaches that were taken in order to deploy online services to hundreds of thousands of users, and describes the trade-offs inherent in our choice of these technologies for our production systems. In order to help illustrate and aid the arguments for the adoption of SemanticWeb technologies this chapter will focus on two of our customer facing products, DataPatrol, a consumer-centric personal information protection product, and QDOS a Linked Data service that is used to measure peoples' online activity
ROME (Request Object Management Environment)
NASA Astrophysics Data System (ADS)
Kong, M.; Good, J. C.; Berriman, G. B.
2005-12-01
Most current astronomical archive services are based on an HTML/ CGI architecture where users submit HTML forms via a browser and CGI programs operating under a web server process the requests. Most services return an HTML result page with URL links to the result files or, for longer jobs, return a message indicating that email will be sent when the job is done. This paradigm has a few serious shortcomings. First, it is all too common for something to go wrong and for the user to never hear about the job again. Second, for long and complicated jobs there is often important intermediate information that would allow the user to adjust the processing. Finally, unless some sort of custom queueing mechanism is used, background jobs are started immediately upon receiving the CGI request. When there are many such requests the server machine can easily be overloaded and either slow to a crawl or crash. Request Object Management Environment (ROME) is a collection of middleware components being developed under the National Virtual Observatory Project to provide mechanism for managing long jobs such as computationally intensive statistical analysis requests or the generation of large scale mosaic images. Written as EJB objects within the open-source JBoss applications server, ROME receives processing requests via a servelet interface, stores them in a DBMS using JDBC, distributes the processing (via queuing mechanisms) across multiple machines and environments (including Grid resources), manages realtime messages from the processing modules, and ensures proper user notification. The request processing modules are identical in structure to standard CGI-programs -- though they can optionally implement status messaging -- and can be written in any language. ROME will persist these jobs across failures of processing modules, network outages, and even downtime of ROME and the DBMS, restarting them as necessary.
DE-FG02-04ER25606 Identity Federation and Policy Management Guide: Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Humphrey, Marty, A
The goal of this 3-year project was to facilitate a more productive dynamic matching between resource providers and resource consumers in Grid environments by explicitly specifying policies. There were broadly two problems being addressed by this project. First, there was a lack of an Open Grid Services Architecture (OGSA)-compliant mechanism for expressing, storing and retrieving user policies and Virtual Organization (VO) policies. Second, there was a lack of tools to resolve and enforce policies in the Open Services Grid Architecture. To address these problems, our overall approach in this project was to make all policies explicit (e.g., virtual organization policies,more » resource provider policies, resource consumer policies), thereby facilitating policy matching and policy negotiation. Policies defined on a per-user basis were created, held, and updated in MyPolMan, thereby providing a Grid user to centralize (where appropriate) and manage his/her policies. Organizationally, the corresponding service was VOPolMan, in which the policies of the Virtual Organization are expressed, managed, and dynamically consulted. Overall, we successfully defined, prototyped, and evaluated policy-based resource management and access control for OGSA-based Grids. This DOE project partially supported 17 peer-reviewed publications on a number of different topics: General security for Grids, credential management, Web services/OGSA/OGSI, policy-based grid authorization (for remote execution and for access to information), policy-directed Grid data movement/placement, policies for large-scale virtual organizations, and large-scale policy-aware grid architectures. In addition to supporting the PI, this project partially supported the training of 5 PhD students.« less
Murray, Stuart B.; Krug, Isabel; McLean, Siân A.
2018-01-01
Abstract Social media has been associated with body dissatisfaction and eating disorder symptoms among young women and adolescent girls. However, despite notable evidence of susceptibility to body image pressures, it remains unknown whether these associations generalize to sexual minority men. A nationwide sample of 2,733 sexual minority men completed an online survey advertised to Australian and New Zealand users of a popular dating app. Participants answered questions about how frequently they used 11 different social media platforms in addition to questions about their dating app use, body image, eating disorder symptoms, and anabolic steroids. Facebook, Youtube, Instagram, and Snapchat were the most frequently used social media platforms. A pattern of small-sized and positive associations emerged between social media use and body dissatisfaction, eating disorder symptoms, and thoughts about using anabolic steroids. Facebook, Instagram, and Snapchat evidenced the strongest associations. The associations of social media use with both muscularity dissatisfaction and eating disorder symptoms were stronger for image-centric social media platforms (e.g., Instagram) than nonimage-centric platforms (e.g., Wordpress); no differences were observed for body fat dissatisfaction, height dissatisfaction, or thoughts about using anabolic steroids. Previously documented associations of social media use with body dissatisfaction and related variables among women and girls appear to generalize to sexual minority men. Social media platforms that more centrally involve imagery may be of greater concern than nonimage-centric platforms. Additional research with sexual minority men is needed to elucidate the distinctions between adaptive and maladaptive social media use in the context of body dissatisfaction, eating disorders, and anabolic steroid use. PMID:29363993
Space Fence Ground-Based Radar System Increment 1 (Space Fence Inc 1)
2015-12-01
Net - Centric Data Strategy and Net-Centric Services Strategy, and the principles and rules identified in the DoD IEA, excepting tactical and...Centric Data Strategy and Net- Centric Services Strategy, and the principles and rules identified in the DoD IEA, excepting tactical and non-IP...Strategy, and the principles and rules identified in the DoD IEA, excepting tactical and non-IP communi- cations. Compliant with TBD Space Fence must
Le, Jimmy T.; Viswanathan, Shilpa; Tarver, Michelle E.; Eydelman, Malvina; Li, Tianjing
2017-01-01
IMPORTANCE Minimally invasive glaucoma surgical (MIGS) devices are one option for lowering intraocular pressure in patients with glaucoma. OBJECTIVE To examine how often existing clinical studies of MIGS devices registered on ClinicalTrials.gov measure patient-centric outcomes that patients value directly. DESIGN, SETTING, AND PARTICIPANTS We searched ClinicalTrials.gov, a registry of publicly and privately supported clinical studies, on February 20, 2015, for records of MIGS device studies involving patients with glaucoma. Two investigators independently abstracted study design and outcome details from eligible records. We classified outcomes as patient-centric or not patient-centric using a prespecified definition. MAIN OUTCOMES AND MEASURES Proportion of patient-centric and nonpatient-centric outcomes registered on ClinicalTrials.gov. RESULTS We identified 51 eligible studies specifying 127 outcomes. Reduction in intraocular pressure was the most frequent outcome specified (78/127; 61%) and a primary outcome in 41 studies. Patient-centric outcomes—such as adverse events (n = 19; 15%), topical medication use (n = 16; 13%), visual acuity (n = 4; 3%), and health-related quality of life (n = 1; 1%)—were less frequently specified (n = 40; 32%) and a primary outcome in only 12 studies. CONCLUSION AND RELEVANCE Patient-centric outcomes that provide insight into the relative desirability and acceptability of the benefits and risks of MIGS devices are not well represented in current clinical studies. PMID:27389667
GoFFish: A Sub-Graph Centric Framework for Large-Scale Graph Analytics1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simmhan, Yogesh; Kumbhare, Alok; Wickramaarachchi, Charith
2014-08-25
Large scale graph processing is a major research area for Big Data exploration. Vertex centric programming models like Pregel are gaining traction due to their simple abstraction that allows for scalable execution on distributed systems naturally. However, there are limitations to this approach which cause vertex centric algorithms to under-perform due to poor compute to communication overhead ratio and slow convergence of iterative superstep. In this paper we introduce GoFFish a scalable sub-graph centric framework co-designed with a distributed persistent graph storage for large scale graph analytics on commodity clusters. We introduce a sub-graph centric programming abstraction that combines themore » scalability of a vertex centric approach with the flexibility of shared memory sub-graph computation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation.« less
Performer-centric Interface Design.
ERIC Educational Resources Information Center
McGraw, Karen L.
1995-01-01
Describes performer-centric interface design and explains a model-based approach for conducting performer-centric analysis and design. Highlights include design methodology, including cognitive task analysis; creating task scenarios; creating the presentation model; creating storyboards; proof of concept screens; object models and icons;…
Re-conceiving building design quality: A review of building users in their social context.
Watson, Kelly J; Evans, James; Karvonen, Andrew; Whitley, Tim
2016-05-01
Considerable overlap exists between post-occupancy research evaluating building design quality and the concept of 'social value', popularised by its recent application to issues of the public realm. To outline this potential research agenda, the paper reviews design quality research on buildings in relation to users and their social context where the term 'social context' refers to building user group dynamics, a combination of organisational cultures, management strategies, and social norms and practices. The review is conducted across five key building types, namely housing, workplaces, healthcare, education, and the retail/service sector. Research commonalities and gaps are identified in order to build a more comprehensive picture of the design quality literature and its handling of users in their social context. The key findings concerning each building type are presented visually. It is concluded that the design quality field comprises a patchwork of relatively isolated studies of various building types, with significant potential for theoretical and empirical development through interdisciplinary collaboration. Users tend to be conceived as anonymous and autonomous individuals with little analysis of user identity or interaction. Further, the contextual impact of user group dynamics on the relationship between building design and building user is rarely addressed in the literature. Producing a more nuanced understanding of users in situ is proposed as an important area for future design quality research.
Re-conceiving building design quality: A review of building users in their social context
Evans, James; Karvonen, Andrew; Whitley, Tim
2014-01-01
Considerable overlap exists between post-occupancy research evaluating building design quality and the concept of ‘social value’, popularised by its recent application to issues of the public realm. To outline this potential research agenda, the paper reviews design quality research on buildings in relation to users and their social context where the term ‘social context’ refers to building user group dynamics, a combination of organisational cultures, management strategies, and social norms and practices. The review is conducted across five key building types, namely housing, workplaces, healthcare, education, and the retail/service sector. Research commonalities and gaps are identified in order to build a more comprehensive picture of the design quality literature and its handling of users in their social context. The key findings concerning each building type are presented visually. It is concluded that the design quality field comprises a patchwork of relatively isolated studies of various building types, with significant potential for theoretical and empirical development through interdisciplinary collaboration. Users tend to be conceived as anonymous and autonomous individuals with little analysis of user identity or interaction. Further, the contextual impact of user group dynamics on the relationship between building design and building user is rarely addressed in the literature. Producing a more nuanced understanding of users in situ is proposed as an important area for future design quality research. PMID:27110217
NASA Astrophysics Data System (ADS)
Panulla, Brian J.; More, Loretta D.; Shumaker, Wade R.; Jones, Michael D.; Hooper, Robert; Vernon, Jeffrey M.; Aungst, Stanley G.
2009-05-01
Rapid improvements in communications infrastructure and sophistication of commercial hand-held devices provide a major new source of information for assessing extreme situations such as environmental crises. In particular, ad hoc collections of humans can act as "soft sensors" to augment data collected by traditional sensors in a net-centric environment (in effect, "crowd-sourcing" observational data). A need exists to understand how to task such soft sensors, characterize their performance and fuse the data with traditional data sources. In order to quantitatively study such situations, as well as study distributed decision-making, we have developed an Extreme Events Laboratory (EEL) at The Pennsylvania State University. This facility provides a network-centric, collaborative situation assessment and decision-making capability by supporting experiments involving human observers, distributed decision making and cognition, and crisis management. The EEL spans the information chain from energy detection via sensors, human observations, signal and image processing, pattern recognition, statistical estimation, multi-sensor data fusion, visualization and analytics, and modeling and simulation. The EEL command center combines COTS and custom collaboration tools in innovative ways, providing capabilities such as geo-spatial visualization and dynamic mash-ups of multiple data sources. This paper describes the EEL and several on-going human-in-the-loop experiments aimed at understanding the new collective observation and analysis landscape.
Stegemann, Sven
2018-06-01
The advances in drug delivery technologies have enabled pharmaceutical scientists to deliver a drug through various administration routes and optimize the drug release and absorption. The wide range of drug delivery systems and dosage forms represent a toolbox of technology for the development of pharmaceutical drug products but might also be a source of medication errors and nonadherence. Patient centric drug product development is being suggested as an important factor to increase therapeutic outcomes. Areas covered: Patients have impaired health and potentially disabilities and they are not medical or pharmaceutical experts but are requested to manage complex therapeutic regimens. As such the application of technology should also serve to reduce complexity, build on patients' intuition and ease of use. Patients form distinct populations based on the targeted disease, disease cluster or age group with specific characteristics or therapeutic contexts. Expert opinion: Establishing a target product and patient profile is essential to guide drug product design development. Including the targeted patient populations in the process is a prerequisite to achieve patient-centric pharmaceutical drug product design. Addressing the needs early on in the product design process, will create more universal design, avoiding the necessity for multiple product presentations to cover the different patient populations.
Lindgren, Helena; Lundin-Olsson, Lillemor; Pohl, Petra; Sandlund, Marlene
2014-01-01
Five physiotherapists organised a user-centric design process of a knowledge-based support system for promoting exercise and preventing falls. The process integrated focus group studies with 17 older adults and prototyping. The transformation of informal medical and rehabilitation expertise and older adults' experiences into formal information and process models during the development was studied. As tool they used ACKTUS, a development platform for knowledge-based applications. The process became agile and incremental, partly due to the diversity of expectations and preferences among both older adults and physiotherapists, and the participatory approach to design and development. In addition, there was a need to develop the knowledge content alongside with the formal models and their presentations, which allowed the participants to test hands-on and evaluate the ideas, content and design. The resulting application is modular, extendable, flexible and adaptable to the individual end user. Moreover, the physiotherapists are able to modify the information and process models, and in this way further develop the application. The main constraint was found to be the lack of support for the initial phase of concept modelling, which lead to a redesigned user interface and functionality of ACKTUS.
Price, Morgan
2016-10-04
Many health system and health Information and Communication Technology (ICT) projects do not achieve their expected benefits. This paper presents an approach to exploring changes in the healthcare system to better understand the expected improvements and other changes by using a patient-centric modelling approach. Circle of care modeling (CCM) was designed to assist stakeholders in considering healthcare system changes using a patient centric approach. The CCM approach is described. It includes four steps, based on soft systems methodology: finding out, conceptual modelling, structured discussion, and describing potential improvements. There are four visualizations that are used though this process: patient-persona based rich pictures of care flows (as part of finding out), and three models: provider view, communication view, and information repository view (as part of conceptual modelling). Three case studies are presented where CCM was applied to different real-world healthcare problems: 1. Seeking improvements in continuity of care for end of life patients. 2. Exploring current practices for medication communication for ambulatory patients prior to an update of a jurisdictional drug information system. 3. Deciding how to improve attachment of patients to primary care. The cases illustrate how CCM helped stakeholders reason from a patient centered approach about gaps and improvements in care such as: data fragmentation (in 1), coordination efforts of medication management (in 2), and deciding to support a community health centre for unattached patients (in 3). The circle of care modelling approach has proved to be a useful tool in assisting stakeholders explore health system change in a patient centric approach. It is one way to instantiate the important principle of being patient centered into practice when considering health system changes.
French, Ilisha M; Hamilton, Lisa Dawn
2018-01-02
Pornography availability has increased in recent years, and while there is plenty of speculation about its effects, empirical investigation about how porn influences our lives has yielded mixed results. Additionally, few studies have addressed the effects of specific pornography characteristics. Past research has shown that male-centric pornography can be related to negative outcomes, while female-centric pornography is related to more positive outcomes, particularly in women. The present survey study examined the relationship between pornography characteristics (male- and female-centric) and the self-reported attitudes and sexual experiences of men and women. Participants in the full sample were 195 men and 310 women who completed an online questionnaire. Although effect sizes were small, women who reported viewing pornography with more female-centric features also reported more positive effects of pornography on sex life and perceptions of the other gender. While men were more likely than women to report negative effects relating to pornography use on these same measures, there were very few reported negative effects of pornography overall. These findings demonstrate a small association between the use of female-centric pornography and more positive outcomes, particularly for women.
An Analysis of the Effects of Net-Centric Operations Using Multi-Agent Adaptive Behavior
ERIC Educational Resources Information Center
Calderon-Meza, Guillermo
2011-01-01
The National Airspace System (NAS) is a resource managed in the public good. Equity in NAS access, and use for private, commercial and government purposes is coordinated by regulations and made possible by procedures, and technology. Researchers have documented scenarios in which the introduction of new concepts-of-operations and technologies has…
Guam's Department of Education Citizen's Centric Report. FY 2009, SY 2009-2010
ERIC Educational Resources Information Center
Guam Department of Education, 2010
2010-01-01
The Department of Education (DOE) is a single unified school district consisting of grades Kindergarten through 12. Its 27 elementary schools, 8 middle schools, 5 high schools, and an alternative school serve over 30,700 students. DOE is managed by the Guam Education Policy Board. Its policies are established by a combination of elected and…
Everyday life for users of electric wheelchairs - a qualitative interview study.
Blach Rossen, Camilla; Sørensen, Bodil; Würtz Jochumsen, Bente; Wind, Gitte
2012-09-01
The aim of this paper is to explore how users of electric wheelchairs experience their everyday life and how their electric wheelchairs influence their daily occupation. Occupation is defined as a personalized dynamic interaction between person, task and environment, and implies the value and meaning attached. Nine semi-structured interviews were conducted with experienced electric wheelchair users. ValMo was used as the theoretical framework for both interviewing and the analysis. The transcribed interviews were analysed using thematic analysis. Findings revealed key elements in electric wheelchair users' experience of how the use of a wheelchair influences everyday life and occupation. Four central themes emerged from the participants' experiences 1) The functionality of the wheelchair, 2) The wheelchair as an extension of the body, 3) The wheelchair and social life, and 4) The wheelchair and identity issues. The themes were interrelated and show how all levels of occupation were influenced both in a positive and negative way, and how it affected identity. It is essential that professionals working with electric wheelchair users are aware of how all levels of occupation and identity are influenced by using a wheelchair. This will assist professionals in supporting the users living an autonomous and meaningful life.
Coalition FORCEnet Implementation Analysis
2006-09-01
C2 grid, and Engagement grid. As a result, enabled Network- Centric warfare for Coalition Forces shows a significant increase in capabilities. Joint...209 14. SUBJECT TERMS FORCEnet, Coalition Forces, AUSCANNZUKUS, Network- Centric Warfare (NCW), Data Mining, EXTEND Modeling, Expeditionary...NETWORK- CENTRIC WARFARE AND FORCENET .....................................................................................................1 B
The Relationship between Cell Phone Use and Identity Theft
ERIC Educational Resources Information Center
Saunders, Lewis O.
2014-01-01
The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…
Sharif, Saeed Pahlevan; Khanekharab, Jasmine
2017-08-01
This study investigates the mediating role of identity confusion and materialism in the relationship between social networking site (SNS) excessive usage and online compulsive buying among young adults. A total of 501 SNS users aged 17 to 23 years (M = 19.68, SD = 1.65) completed an online survey questionnaire. A serial multiple mediator model was developed and hypotheses were tested using structural equation modeling. The results showed that excessive young adult SNS users had a higher tendency toward compulsive buying online. This was partly because they experienced higher identity confusion and developed higher levels of materialism. Targeted psychological interventions seeking to gradually increase identity clarity to buffer the detrimental effects of SNS usage and identity confusion in young adults are suggested.
Pervasive healthcare: paving the way for a pervasive, user-centered and preventive healthcare model.
Arnrich, B; Mayora, O; Bardram, J; Tröster, G
2010-01-01
The aging of the population creates pressure on the healthcare systems in various ways. A massive increase of chronic disease conditions and age-related illness are predicted as the dominant forces driving the future health care. The objective of this paper is to present future research demands in pervasive healthcare with the goal to meet the healthcare challenges by paving the way for a pervasive, user-centered and preventive healthcare model. This paper presents recent methodological approaches and proposes future research topics in three areas: i) pervasive, continuous and reliable long-term monitoring systems; ii) prevention through pervasive technology as a key element to maintain lifelong wellness; and iii) design and evaluation methods for ubiquitous, patient-centric technologies. Pervasive technology has been identified as a strong asset for achieving the vision of user-centered preventive healthcare. In order to make this vision a reality, new strategies for design, development and evaluation of technology have to find a common denominator and consequently interoperate. Moreover, the potential of pervasive healthcare technologies offers new opportunities beyond traditional disease treatment and may play a major role in prevention, e.g. motivate healthy behavior and disease prevention throughout all stages of life. In this sense, open challenges in future research have to be addressed such as the variability of health indicators between individuals and the manner in which relevant health indicators are provided to the users in order to maximize their motivation to mitigate or prevent unhealthy behaviors. Additionally, collecting evidence that pervasive technology improves health is seen as one of the toughest challenges. Promising approaches are recently introduced, such as "clinical proof-of-concept" and balanced observational studies. The paper concludes that pervasive healthcare will enable a paradigm shift from the established centralized healthcare model to a pervasive, user-centered and preventive overall lifestyle health management. In order to provide these new opportunities everywhere, anytime and to anyone, future research in the fields of pervasive sensing, pervasive prevention and evaluation of pervasive technology is inevitably needed.
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.
Wu, Hongchen; Wang, Xinjun
2016-01-01
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Examining Researcher Needs and Barriers for using Electronic Health Data for Translational Research
Stephens, Kari A.; Lee, E. Sally; Estiri, Hossein; Jung, Hyunggu
2015-01-01
To achieve the Learning Health Care System, we must harness electronic health data (EHD) by providing effective tools for researchers to access data efficiently. EHD is proliferating and researchers are relying on these data to pioneer discovery. Tools must be user-centric to ensure their utility. To this end, we conducted a qualitative study to assess researcher needs and barriers to using EHD. Researchers expressed the need to be confident about the data and have easy access, a clear process for exploration and access, and adequate resources, while barriers included difficulties in finding datasets, usability of the data, cumbersome processes, and lack of resources. These needs and barriers can inform the design process for innovating tools to increase utility of EHD. Understanding researcher needs is key to building effective user-centered EHD tools to support translational research. PMID:26306262
Theorizing Network-Centric Activity in Education
ERIC Educational Resources Information Center
HaLevi, Andrew
2011-01-01
Networks and network-centric activity are increasingly prevalent in schools and school districts. In addition to ubiquitous social network tools like Facebook and Twitter, educational leaders deal with a wide variety of network organizational forms that include professional development, advocacy, informational networks and network-centric reforms.…
Seahawk: moving beyond HTML in Web-based bioinformatics analysis.
Gordon, Paul M K; Sensen, Christoph W
2007-06-18
Traditional HTML interfaces for input to and output from Bioinformatics analysis on the Web are highly variable in style, content and data formats. Combining multiple analyses can therefore be an onerous task for biologists. Semantic Web Services allow automated discovery of conceptual links between remote data analysis servers. A shared data ontology and service discovery/execution framework is particularly attractive in Bioinformatics, where data and services are often both disparate and distributed. Instead of biologists copying, pasting and reformatting data between various Web sites, Semantic Web Service protocols such as MOBY-S hold out the promise of seamlessly integrating multi-step analysis. We have developed a program (Seahawk) that allows biologists to intuitively and seamlessly chain together Web Services using a data-centric, rather than the customary service-centric approach. The approach is illustrated with a ferredoxin mutation analysis. Seahawk concentrates on lowering entry barriers for biologists: no prior knowledge of the data ontology, or relevant services is required. In stark contrast to other MOBY-S clients, in Seahawk users simply load Web pages and text files they already work with. Underlying the familiar Web-browser interaction is an XML data engine based on extensible XSLT style sheets, regular expressions, and XPath statements which import existing user data into the MOBY-S format. As an easily accessible applet, Seahawk moves beyond standard Web browser interaction, providing mechanisms for the biologist to concentrate on the analytical task rather than on the technical details of data formats and Web forms. As the MOBY-S protocol nears a 1.0 specification, we expect more biologists to adopt these new semantic-oriented ways of doing Web-based analysis, which empower them to do more complicated, ad hoc analysis workflow creation without the assistance of a programmer.
Seahawk: moving beyond HTML in Web-based bioinformatics analysis
Gordon, Paul MK; Sensen, Christoph W
2007-01-01
Background Traditional HTML interfaces for input to and output from Bioinformatics analysis on the Web are highly variable in style, content and data formats. Combining multiple analyses can therfore be an onerous task for biologists. Semantic Web Services allow automated discovery of conceptual links between remote data analysis servers. A shared data ontology and service discovery/execution framework is particularly attractive in Bioinformatics, where data and services are often both disparate and distributed. Instead of biologists copying, pasting and reformatting data between various Web sites, Semantic Web Service protocols such as MOBY-S hold out the promise of seamlessly integrating multi-step analysis. Results We have developed a program (Seahawk) that allows biologists to intuitively and seamlessly chain together Web Services using a data-centric, rather than the customary service-centric approach. The approach is illustrated with a ferredoxin mutation analysis. Seahawk concentrates on lowering entry barriers for biologists: no prior knowledge of the data ontology, or relevant services is required. In stark contrast to other MOBY-S clients, in Seahawk users simply load Web pages and text files they already work with. Underlying the familiar Web-browser interaction is an XML data engine based on extensible XSLT style sheets, regular expressions, and XPath statements which import existing user data into the MOBY-S format. Conclusion As an easily accessible applet, Seahawk moves beyond standard Web browser interaction, providing mechanisms for the biologist to concentrate on the analytical task rather than on the technical details of data formats and Web forms. As the MOBY-S protocol nears a 1.0 specification, we expect more biologists to adopt these new semantic-oriented ways of doing Web-based analysis, which empower them to do more complicated, ad hoc analysis workflow creation without the assistance of a programmer. PMID:17577405
An Overview of Starfish: A Table-Centric Tool for Interactive Synthesis
NASA Technical Reports Server (NTRS)
Tsow, Alex
2008-01-01
Engineering is an interactive process that requires intelligent interaction at many levels. My thesis [1] advances an engineering discipline for high-level synthesis and architectural decomposition that integrates perspicuous representation, designer interaction, and mathematical rigor. Starfish, the software prototype for the design method, implements a table-centric transformation system for reorganizing control-dominated system expressions into high-level architectures. Based on the digital design derivation (DDD) system a designer-guided synthesis technique that applies correctness preserving transformations to synchronous data flow specifications expressed as co- recursive stream equations Starfish enhances user interaction and extends the reachable design space by incorporating four innovations: behavior tables, serialization tables, data refinement, and operator retiming. Behavior tables express systems of co-recursive stream equations as a table of guarded signal updates. Developers and users of the DDD system used manually constructed behavior tables to help them decide which transformations to apply and how to specify them. These design exercises produced several formally constructed hardware implementations: the FM9001 microprocessor, an SECD machine for evaluating LISP, and the SchemEngine, garbage collected machine for interpreting a byte-code representation of compiled Scheme programs. Bose and Tuna, two of DDD s developers, have subsequently commercialized the design derivation methodology at Derivation Systems, Inc. (DSI). DSI has formally derived and validated PCI bus interfaces and a Java byte-code processor; they further executed a contract to prototype SPIDER-NASA's ultra-reliable communications bus. To date, most derivations from DDD and DRS have targeted hardware due to its synchronous design paradigm. However, Starfish expressions are independent of the synchronization mechanism; there is no commitment to hardware or globally broadcast clocks. Though software back-ends for design derivation are limited to the DDD stream-interpreter, targeting synchronous or real-time software is not substantively different from targeting hardware.
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem
2013-04-01
We explore an application of OAuth to enable user delegation for OGC-based services and the evolution of this solution to form part of a wider Federation-as-a-Service offering for federated identity management. OAuth has established itself in the commercial sector as a means for users to delegate access to secured resources under their control to third parties. It has also found its way into the academic and research domains as a solution for user delegation. Notable examples including the CILogon project for Teragrid in the US, and also, closer to the Earth Sciences, as part of the OGC Web Services, Phase 6 Testbed. Both are examples of OAuth 1.0 implementations. Version 2.0 has seen significant changes to this original specification which have not been without controversy but it has arguably provided a greater degree of flexibility in how it can be applied and the use cases that it can address. At CEDA (Centre for Environmental Data Archival, STFC), a Python implementation of OAuth 2.0 was made to explore these capabilities with a focus on providing a solution for user delegation for data access, processing and visualisation services for the Earth Observation and Climate sciences domains. The initial goal was to provide a means of delegating short-lived user credentials to trusted services along the same lines as the established approach of Proxy certificates widely used in Grid computing. For the OGC and other HTTP-based services employed by CEDA, OAuth makes a natural fit for this role, integrating with minimal impact on existing interfaces. Working implementations have been made for CEDA's COWS Web Processing Service and Web Map Service. Packaging the software and making it available in Open Source repositories together with the generic nature of the solution have made it readily exploitable in other application domains. At the Max Planck Institute for Psycholinguistics (Nijmegen, The Netherlands), the software will be used to integrate some tools in the CLARIN infrastructure*. Enhancements have been fedback to the package through this activity. Collaboration with STFC's Scientific Computing department has also seen this solution expand and evolve to support a more demanding set of use cases required to meet the needs for Contrail, an EU Framework 7 project. The goal of Contrail is to develop an Open Source solution for federating resources from multiple Cloud providers. Bringing the solution developed with OAuth together with technologies such as SAML and OpenID it has been possible to develop a generic suite of services to support federated access and identity management, a Federation-as-a-Service package. This is showing promise with trials with the EUDAT project. A deployment of the Contrail software is also planned for CEMS (the facility for Climate and Environmental Monitoring from Space), a new joint academic-industry led facility based at the STFC Harwell site providing access to large-volume Earth Observation and Climate datasets through a Cloud-based service model. * This work is part of the programme of BiG Grid, the Dutch e-Science Grid, which is financially supported by the Netherlands Organisation for Scientific Research, NWO.
Malik, Kulsoom Jawaid; Unwin, Gemma; Larkin, Michael; Kroese, Biza Stenfert; Rose, John
2017-04-01
Carers and service users with intellectual disabilities from minority ethnic groups have typically been reported to be dissatisfied with the social care services they receive. However, service users themselves have rarely been asked directly about their experiences of social care. This paper aims to understand the meaning of social care services in the lives of South Asian women with intellectual disabilities, in the United Kingdom. 10 British South Asian women with mild-moderate intellectual disabilities were interviewed about their experiences of social care services. The transcripts were analysed using interpretative phenomenological analysis. The analysis produced three super-ordinate themes, which focus on how services facilitate the development of complex identities, how the participants explored their sense of being 'stuck' between cultures as they negotiated their journeys towards independence, and the triple disadvantage which they experienced as a consequence of the intersection between gender, ethnicity and disability. The participants were broadly satisfied with the role which services played in these domains, and appeared to find them valuable and helpful. The results suggest that the participants successfully managed complex identity issues, such as acculturation processes, with the support of services. It may be helpful to give more explicit consideration to the positive role which good services can play in supporting people with intellectual disabilities in the development of their identities and goals, alongside the more traditionally 'concrete' objectives of such social care. Engagement with families in 'positive risk-taking' is likely to be an important component of success. Copyright © 2017 Elsevier Ltd. All rights reserved.
Ellis, David; Chavez, Oswaldo; Coombs, Joseph J; Soto, Julian V; Gomez, Rene; Douches, David S; Panta, Ana; Silvestre, Rocio; Anglin, Noelle Lynette
2018-05-24
Breeders rely on genetic integrity of material from genebanks, however, mislabeling and errors in original data can occur. Paired samples of original material and their in vitro counterparts from 250 diverse potato landrace accessions from the International Potato Center (CIP), were fingerprinted using the Infinium 12K V2 Potato Array to confirm genetic identity and evaluate genetic diversity. Diploid, triploid, and tetraploid accessions were included representing seven cultivated potato taxa (Hawkes, 1990). Fingerprints between mother field plants and in vitro clones, were used to evaluate identity, relatedness, and ancestry. Clones of the same accession grouped together, however eleven (4.4%) accessions were mismatches genetically. SNP genotypes were used to construct a phylogeny to evaluate inter- and intraspecific relationships and population structure. Data suggests that the triploids evaluated are genetically similar. STRUCTURE analysis identified several putative hybrids and suggests six populations with significant gene flow between. This study provides a model for genetic identity of plant genetic resources collections as mistakes in conservation of these collections and in genebanks is a reality and confirmed identity is critical for breeders and other users of these collections, as well as for quality management programs and to provide insights into the diversity of the accessions evaluated.
NASA Astrophysics Data System (ADS)
Licari, Daniele; Calzolari, Federico
2011-12-01
In this paper we introduce a new way to deal with Grid portals referring to our implementation. L-GRID is a light portal to access the EGEE/EGI Grid infrastructure via Web, allowing users to submit their jobs from a common Web browser in a few minutes, without any knowledge about the Grid infrastructure. It provides the control over the complete lifecycle of a Grid Job, from its submission and status monitoring, to the output retrieval. The system, implemented as client-server architecture, is based on the Globus Grid middleware. The client side application is based on a java applet; the server relies on a Globus User Interface. There is no need of user registration on the server side, and the user needs only his own X.509 personal certificate. The system is user-friendly, secure (it uses SSL protocol, mechanism for dynamic delegation and identity creation in public key infrastructures), highly customizable, open source, and easy to install. The X.509 personal certificate does not get out from the local machine. It allows to reduce the time spent for the job submission, granting at the same time a higher efficiency and a better security level in proxy delegation and management.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
An integrated eVoucher mechanism for flexible loads in real-time retail electricity market
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Tao; Pourbabak, Hajir; Liang, Zheming
This study proposes an innovative economic and engineering coupled framework to encourage typical flexible loads or load aggregators, such as parking lots with high penetration of electric vehicles, to participate directly in the real-time retail electricity market based on an integrated eVoucher program. The integrated eVoucher program entails demand side management, either in the positive or negative direction, following a popular customer-centric design principle. It provides the extra economic benefit to end-users and reduces the risk associated with the wholesale electricity market for electric distribution companies (EDCs), meanwhile improving the potential resilience of the distribution networks with consideration for frequencymore » deviations. When implemented, the eVoucher program allows typical flexible loads, such as electric vehicle parking lots, to adjust their demand and consumption behavior according to financial incentives from an EDC. A distribution system operator (DSO) works as a third party to hasten negotiations between such parking lots and EDCs, as well as the price clearing process. Eventually, both electricity retailers and power system operators will benefit from the active participation of the flexible loads and energy customers.« less
An integrated eVoucher mechanism for flexible loads in real-time retail electricity market
Chen, Tao; Pourbabak, Hajir; Liang, Zheming; ...
2017-01-26
This study proposes an innovative economic and engineering coupled framework to encourage typical flexible loads or load aggregators, such as parking lots with high penetration of electric vehicles, to participate directly in the real-time retail electricity market based on an integrated eVoucher program. The integrated eVoucher program entails demand side management, either in the positive or negative direction, following a popular customer-centric design principle. It provides the extra economic benefit to end-users and reduces the risk associated with the wholesale electricity market for electric distribution companies (EDCs), meanwhile improving the potential resilience of the distribution networks with consideration for frequencymore » deviations. When implemented, the eVoucher program allows typical flexible loads, such as electric vehicle parking lots, to adjust their demand and consumption behavior according to financial incentives from an EDC. A distribution system operator (DSO) works as a third party to hasten negotiations between such parking lots and EDCs, as well as the price clearing process. Eventually, both electricity retailers and power system operators will benefit from the active participation of the flexible loads and energy customers.« less
A Crowdsensing Based Analytical Framework for Perceptional Degradation of OTT Web Browsing.
Li, Ke; Wang, Hai; Xu, Xiaolong; Du, Yu; Liu, Yuansheng; Ahmad, M Omair
2018-05-15
Service perception analysis is crucial for understanding both user experiences and network quality as well as for maintaining and optimizing of mobile networks. Given the rapid development of mobile Internet and over-the-top (OTT) services, the conventional network-centric mode of network operation and maintenance is no longer effective. Therefore, developing an approach to evaluate and optimizing users' service perceptions has become increasingly important. Meanwhile, the development of a new sensing paradigm, mobile crowdsensing (MCS), makes it possible to evaluate and analyze the user's OTT service perception from end-user's point of view other than from the network side. In this paper, the key factors that impact users' end-to-end OTT web browsing service perception are analyzed by monitoring crowdsourced user perceptions. The intrinsic relationships among the key factors and the interactions between key quality indicators (KQI) are evaluated from several perspectives. Moreover, an analytical framework of perceptional degradation and a detailed algorithm are proposed whose goal is to identify the major factors that impact the perceptional degradation of web browsing service as well as their significance of contribution. Finally, a case study is presented to show the effectiveness of the proposed method using a dataset crowdsensed from a large number of smartphone users in a real mobile network. The proposed analytical framework forms a valuable solution for mobile network maintenance and optimization and can help improve web browsing service perception and network quality.
Cytogenetic analyses of four solid tumours in dogs.
Mayr, B; Reifinger, M; Weissenböck, H; Schleger, W; Eisenmenger, E
1994-07-01
Four solid tumours (one haemangiopericytoma, one haemangioendothelioma, one spindle-cell sarcoma and one mammary carcinoma) in dogs were analysed cytogenetically. In the haemangiopericytoma, an additional small chromosomal segment was present. Very complex changes including centric fusions and symmetric meta-centrics 1, 6, 10 and 12 were conspicuous in the highly unbalanced karyotype of the haemangioendothelioma. Complex changes, particularly many centric fusions and a tandem translocation 4/14, were features of the spindle-cell sarcoma. One centric fusion and a symmetric metacentric 13 were present in the mammary carcinoma.
Data Centric Sensor Stream Reduction for Real-Time Applications in Wireless Sensor Networks
Aquino, Andre Luiz Lins; Nakamura, Eduardo Freire
2009-01-01
This work presents a data-centric strategy to meet deadlines in soft real-time applications in wireless sensor networks. This strategy considers three main aspects: (i) The design of real-time application to obtain the minimum deadlines; (ii) An analytic model to estimate the ideal sample size used by data-reduction algorithms; and (iii) Two data-centric stream-based sampling algorithms to perform data reduction whenever necessary. Simulation results show that our data-centric strategies meet deadlines without loosing data representativeness. PMID:22303145
Beliveau, Mary Ellen; Warnes, Carole A; Harrington, Robert A; Nishimura, Rick A; O'Gara, Patrick T; Sibley, Janice B; Oetgen, William J
2015-01-01
There is a need for a transformational change in clinical education. In postgraduate medical education we have traditionally had a faculty-centric model. That is, faculty knew what needed to be taught and who were the best teachers to teach it. They built the agenda, and worked with staff to follow Accreditation Council for Continuing Medical Education (ACCME) accreditation criteria and manage logistics. Changes in the health care marketplace now demand a learner-centric model-one that embraces needs assessments, identification of practice gaps relative to competency, development of learning objectives, contemporary adult learning theory, novel delivery systems, and measurable outcomes. This article provides a case study of one medical specialty society's efforts to respond to this demand. © 2015 The Alliance for Continuing Education in the Health Professions, the Society for Academic Continuing Medical Education, and the Council on Continuing Medical Education, Association for Hospital Medical Education.
Learning to Predict Consequences as a Method of Knowledge Transfer in Reinforcement Learning.
Chalmers, Eric; Contreras, Edgar Bermudez; Robertson, Brandon; Luczak, Artur; Gruber, Aaron
2017-04-17
The reinforcement learning (RL) paradigm allows agents to solve tasks through trial-and-error learning. To be capable of efficient, long-term learning, RL agents should be able to apply knowledge gained in the past to new tasks they may encounter in the future. The ability to predict actions' consequences may facilitate such knowledge transfer. We consider here domains where an RL agent has access to two kinds of information: agent-centric information with constant semantics across tasks, and environment-centric information, which is necessary to solve the task, but with semantics that differ between tasks. For example, in robot navigation, environment-centric information may include the robot's geographic location, while agent-centric information may include sensor readings of various nearby obstacles. We propose that these situations provide an opportunity for a very natural style of knowledge transfer, in which the agent learns to predict actions' environmental consequences using agent-centric information. These predictions contain important information about the affordances and dangers present in a novel environment, and can effectively transfer knowledge from agent-centric to environment-centric learning systems. Using several example problems including spatial navigation and network routing, we show that our knowledge transfer approach can allow faster and lower cost learning than existing alternatives.
Tobbell, Jane; Boduszek, Daniel; Kola-Palmer, Susanna; Vaughan, Joanne; Hargreaves, Janet
2018-04-01
There is global recognition that the inclusion of service users in the education of health and social care students in higher education can lead to more compassionate professional identities which will enable better decision making. However, to date there is no systematic tool to explore learning and service user involvement in the curriculum. To generate and validate a psychometric instrument which will allow educators to evaluate service user pedagogy. Construction and validation of a new scale. 365 undergraduate students from health and social care departments in two universities. A two correlated factor scale. Factor 1 - perceived presence of service users in the taught curriculum and factor 2 - professionals and service users working together (correlation between factor 1 and factor 2 - r = 0.32). The Huddersfield Service User Pedagogy Scale provides a valid instrument for educators to evaluate student learning. In addition, the tool can contribute to student reflections on their shifting professional identities as they progress through their studies. Copyright © 2018 Elsevier Ltd. All rights reserved.
DCMS: A data analytics and management system for molecular simulation.
Kumar, Anand; Grupcev, Vladimir; Berrada, Meryem; Fogarty, Joseph C; Tu, Yi-Cheng; Zhu, Xingquan; Pandit, Sagar A; Xia, Yuni
Molecular Simulation (MS) is a powerful tool for studying physical/chemical features of large systems and has seen applications in many scientific and engineering domains. During the simulation process, the experiments generate a very large number of atoms and intend to observe their spatial and temporal relationships for scientific analysis. The sheer data volumes and their intensive interactions impose significant challenges for data accessing, managing, and analysis. To date, existing MS software systems fall short on storage and handling of MS data, mainly because of the missing of a platform to support applications that involve intensive data access and analytical process. In this paper, we present the database-centric molecular simulation (DCMS) system our team developed in the past few years. The main idea behind DCMS is to store MS data in a relational database management system (DBMS) to take advantage of the declarative query interface ( i.e. , SQL), data access methods, query processing, and optimization mechanisms of modern DBMSs. A unique challenge is to handle the analytical queries that are often compute-intensive. For that, we developed novel indexing and query processing strategies (including algorithms running on modern co-processors) as integrated components of the DBMS. As a result, researchers can upload and analyze their data using efficient functions implemented inside the DBMS. Index structures are generated to store analysis results that may be interesting to other users, so that the results are readily available without duplicating the analysis. We have developed a prototype of DCMS based on the PostgreSQL system and experiments using real MS data and workload show that DCMS significantly outperforms existing MS software systems. We also used it as a platform to test other data management issues such as security and compression.
Personalized Health Monitoring System for Managing Well-Being in Rural Areas.
Nedungadi, Prema; Jayakumar, Akshay; Raman, Raghu
2017-12-14
Rural India lacks easy access to health practitioners and medical centers, depending instead on community health workers. In these areas, common ailments that are easy to manage with medicines, often lead to medical escalations and even fatalities due to lack of awareness and delayed diagnosis. The introduction of wearable health devices has made it easier to monitor health conditions and to connect doctors and patients in urban areas. However, existing initiatives have not succeeded in providing adequate health monitoring to rural and low-literate patients, as current methods are expensive, require consistent connectivity and expect literate users. Our design considerations address these concerns by providing low-cost medical devices connected to a low-cost health platform, along with personalized guidance based on patient physiological parameters in local languages, and alerts to medical practitioners in case of emergencies. This patient-centric integrated healthcare system is designed to manage the overall health of villagers with real-time health monitoring of patients, to offer guidance on preventive care, and to increase health awareness and self-monitoring at an affordable price. This personalized health monitoring system addresses the health-related needs in remote and rural areas by (1) empowering health workers in monitoring of basic health conditions for rural patients in order to prevent escalations, (2) personalized feedback regarding nutrition, exercise, diet, preventive Ayurveda care and yoga postures based on vital parameters and (3) reporting of patient data to the patient's health center with emergency alerts to doctor and patient. The system supports community health workers in the diagnostic procedure, management, and reporting of rural patients, and functions well even with only intermittent access to Internet.
Army Science Board 2001 AD HOC Study Knowledge Management
2001-11-01
dissemination, Army, Army culture, information dominance , knowledge dominance, information sharing, situational awareness, network-centric, infosphere...proposed effort and the emerging Army ICT for Information Dominance are all excellent foundation efforts for KM and Information Assurance. The panel’s...level is critical to survivability and lethality. – Unreliable information will quickly reverse the advantages of “ Information Dominance ” essential to
A metabolite-centric view on flux distributions in genome-scale metabolic models
2013-01-01
Background Genome-scale metabolic models are important tools in systems biology. They permit the in-silico prediction of cellular phenotypes via mathematical optimisation procedures, most importantly flux balance analysis. Current studies on metabolic models mostly consider reaction fluxes in isolation. Based on a recently proposed metabolite-centric approach, we here describe a set of methods that enable the analysis and interpretation of flux distributions in an integrated metabolite-centric view. We demonstrate how this framework can be used for the refinement of genome-scale metabolic models. Results We applied the metabolite-centric view developed here to the most recent metabolic reconstruction of Escherichia coli. By compiling the balance sheets of a small number of currency metabolites, we were able to fully characterise the energy metabolism as predicted by the model and to identify a possibility for model refinement in NADPH metabolism. Selected branch points were examined in detail in order to demonstrate how a metabolite-centric view allows identifying functional roles of metabolites. Fructose 6-phosphate aldolase and the sedoheptulose bisphosphate bypass were identified as enzymatic reactions that can carry high fluxes in the model but are unlikely to exhibit significant activity in vivo. Performing a metabolite essentiality analysis, unconstrained import and export of iron ions could be identified as potentially problematic for the quality of model predictions. Conclusions The system-wide analysis of split ratios and branch points allows a much deeper insight into the metabolic network than reaction-centric analyses. Extending an earlier metabolite-centric approach, the methods introduced here establish an integrated metabolite-centric framework for the interpretation of flux distributions in genome-scale metabolic networks that can complement the classical reaction-centric framework. Analysing fluxes and their metabolic context simultaneously opens the door to systems biological interpretations that are not apparent from isolated reaction fluxes. Particularly powerful demonstrations of this are the analyses of the complete metabolic contexts of energy metabolism and the folate-dependent one-carbon pool presented in this work. Finally, a metabolite-centric view on flux distributions can guide the refinement of metabolic reconstructions for specific growth scenarios. PMID:23587327
Process mining is an underutilized clinical research tool in transfusion medicine.
Quinn, Jason G; Conrad, David M; Cheng, Calvino K
2017-03-01
To understand inventory performance, transfusion services commonly use key performance indicators (KPIs) as summary descriptors of inventory efficiency that are graphed, trended, and used to benchmark institutions. Here, we summarize current limitations in KPI-based evaluation of blood bank inventory efficiency and propose process mining as an ideal methodology for application to inventory management research to improve inventory flows and performance. The transit of a blood product from inventory receipt to final disposition is complex and relates to many internal and external influences, and KPIs may be inadequate to fully understand the complexity of the blood supply chain and how units interact with its processes. Process mining lends itself well to analysis of blood bank inventories, and modern laboratory information systems can track nearly all of the complex processes that occur in the blood bank. Process mining is an analytical tool already used in other industries and can be applied to blood bank inventory management and research through laboratory information systems data using commercial applications. Although the current understanding of real blood bank inventories is value-centric through KPIs, it potentially can be understood from a process-centric lens using process mining. © 2017 AABB.
Information persistence using XML database technology
NASA Astrophysics Data System (ADS)
Clark, Thomas A.; Lipa, Brian E. G.; Macera, Anthony R.; Staskevich, Gennady R.
2005-05-01
The Joint Battlespace Infosphere (JBI) Information Management (IM) services provide information exchange and persistence capabilities that support tailored, dynamic, and timely access to required information, enabling near real-time planning, control, and execution for DoD decision making. JBI IM services will be built on a substrate of network centric core enterprise services and when transitioned, will establish an interoperable information space that aggregates, integrates, fuses, and intelligently disseminates relevant information to support effective warfighter business processes. This virtual information space provides individual users with information tailored to their specific functional responsibilities and provides a highly tailored repository of, or access to, information that is designed to support a specific Community of Interest (COI), geographic area or mission. Critical to effective operation of JBI IM services is the implementation of repositories, where data, represented as information, is represented and persisted for quick and easy retrieval. This paper will address information representation, persistence and retrieval using existing database technologies to manage structured data in Extensible Markup Language (XML) format as well as unstructured data in an IM services-oriented environment. Three basic categories of database technologies will be compared and contrasted: Relational, XML-Enabled, and Native XML. These technologies have diverse properties such as maturity, performance, query language specifications, indexing, and retrieval methods. We will describe our application of these evolving technologies within the context of a JBI Reference Implementation (RI) by providing some hopefully insightful anecdotes and lessons learned along the way. This paper will also outline future directions, promising technologies and emerging COTS products that can offer more powerful information management representations, better persistence mechanisms and improved retrieval techniques.
Complexity analysis of the Next Gen Air Traffic Management System: trajectory based operations.
Lyons, Rhonda
2012-01-01
According to Federal Aviation Administration traffic predictions currently our Air Traffic Management (ATM) system is operating at 150 percent capacity; forecasting that within the next two decades, the traffic with increase to a staggering 250 percent [17]. This will require a major redesign of our system. Today's ATM system is complex. It is designed to safely, economically, and efficiently provide air traffic services through the cost-effective provision of facilities and seamless services in collaboration with multiple agents however, contrary the vision, the system is loosely integrated and is suffering tremendously from antiquated equipment and saturated airways. The new Next Generation (Next Gen) ATM system is designed to transform the current system into an agile, robust and responsive set of operations that are designed to safely manage the growing needs of the projected increasingly complex, diverse set of air transportation system users and massive projected worldwide traffic rates. This new revolutionary technology-centric system is dynamically complex and is much more sophisticated than it's soon to be predecessor. ATM system failures could yield large scale catastrophic consequences as it is a safety critical system. This work will attempt to describe complexity and the complex nature of the NextGen ATM system and Trajectory Based Operational. Complex human factors interactions within Next Gen will be analyzed using a proposed dual experimental approach designed to identify hazards, gaps and elicit emergent hazards that would not be visible if conducted in isolation. Suggestions will be made along with a proposal for future human factors research in the TBO safety critical Next Gen environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-18
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, Office of the Assistant Secretary for Networks & Information Integration/Department...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, Mangin, Inc., Arroyo Grande, CA; NorthStar Group, LLC, Washington, DC; and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, Mosaic ATM, Leesburg, VA; NorthStar Group, LLC, Washington, DC; Luciad, Leuven...
Experiences with lab-centric instruction
NASA Astrophysics Data System (ADS)
Titterton, Nathaniel; Lewis, Colleen M.; Clancy, Michael J.
2010-06-01
Lab-centric instruction emphasizes supervised, hands-on activities by substituting lab for lecture time. It combines a multitude of pedagogical techniques into the format of an extended, structured closed lab. We discuss the range of benefits for students, including increased staff interaction, frequent and varied self-assessments, integrated collaborative activities, and a systematic sequence of activities that gradually increases in difficulty. Instructors also benefit from a deeper window into student progress and understanding. We follow with discussion of our experiences in courses at U.C. Berkeley, and using data from some of these investigate the effects of lab-centric instruction on student learning, procrastination, and course pacing. We observe that the lab-centric format helped students on exams but hurt them on extended programming assignments, counter to our hypothesis. Additionally, we see no difference in self-ratings of procrastination and limited differences in ratings of course pace. We do find evidence that the students who choose to attend lab-centric courses are different in several important ways from students who choose to attend the same course in a non-lab-centric format.
Speaking in Character: Voice Communication in Virtual Worlds
NASA Astrophysics Data System (ADS)
Wadley, Greg; Gibbs, Martin R.
This chapter summarizes 5 years of research on the implications of introducing voice communication systems to virtual worlds. Voice introduces both benefits and problems for players of fast-paced team games, from better coordination of groups and greater social presence of fellow players on the positive side, to negative features such as channel congestion, transmission of noise, and an unwillingness by some to use voice with strangers online. Similarly, in non-game worlds like Second Life, issues related to identity and impression management play important roles, as voice may build greater trust that is especially important for business users, yet it erodes the anonymity and ability to conceal social attributes like gender that are important for other users. A very different mixture of problems and opportunities exists when users conduct several simultaneous conversations in multiple text and voice channels. Technical difficulties still exist with current systems, including the challenge of debugging and harmonizing all the participants' voice setups. Different groups use virtual worlds for very different purposes, so a single modality may not suit all.
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership
Wu, Hongchen; Wang, Xinjun
2016-01-01
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users’ sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users’ decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens’ sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants’ partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness. PMID:26950064
Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran
2016-01-01
Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
Moghaddasi, Hamid; Kamkarhaghighi, Mehran
2016-01-01
Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823
Whose point-of-view is it anyway?
NASA Astrophysics Data System (ADS)
Garvey, Gregory P.
2011-03-01
Shared virtual worlds such as Second Life privilege a single point-of-view, namely that of the user. When logged into Second Life a user sees the virtual world from a default viewpoint, which is from slightly above and behind the user's avatar (the user's alter ego 'in-world.') This point-of-view is as if the user were viewing his or her avatar using a camera floating a few feet behind it. In fact it is possible to set the view to as if you were seeing the world through the eyes of your avatar or you can even move the camera completely independent of your avatar. A change in point-of-view, means, more than just a different camera point-of-view. The practice of using multiple avatars requires a transformation of identity and personality. When a user 'enacts' the identity of a particular avatar, their 'real' personality is masked by the assumed personality. The technology of virtual worlds permits both a change of point-of -view and also facilitates a change in identity. Does this cause any psychological distress? Or is the ability to be someone else and see a world (a game, a virtual world) through a different set of eyes somehow liberating and even beneficial?
NASA Astrophysics Data System (ADS)
Manda, Tiwonge Davis; Herstad, Jo
This paper presents results from a study on mobile phone use to connect two rural hospitals in Malawi with community health workers (CHWs), the hospitals work with. Mobile phone use at the hospitals has helped reduce the need for face-to-face communication to permit patient information exchange, meetings and appointments scheduling, as well as work coordination. On the other hand mobile phone use has proved paradoxical as it has introduced users to challenges, like recharging of phone batteries, they did not anticipate. The paper highlights use context-centric and solution based opportunities and challenges associated with mobile phone use in rural settings.
Colaert, Niklaas; Barsnes, Harald; Vaudel, Marc; Helsens, Kenny; Timmerman, Evy; Sickmann, Albert; Gevaert, Kris; Martens, Lennart
2011-08-05
The Thermo Proteome Discoverer program integrates both peptide identification and quantification into a single workflow for peptide-centric proteomics. Furthermore, its close integration with Thermo mass spectrometers has made it increasingly popular in the field. Here, we present a Java library to parse the msf files that constitute the output of Proteome Discoverer. The parser is also implemented as a graphical user interface allowing convenient access to the information found in the msf files, and in Rover, a program to analyze and validate quantitative proteomics information. All code, binaries, and documentation is freely available at http://thermo-msf-parser.googlecode.com.
Data-Centric Situational Awareness and Management in Intelligent Power Systems
NASA Astrophysics Data System (ADS)
Dai, Xiaoxiao
The rapid development of technology and society has made the current power system a much more complicated system than ever. The request for big data based situation awareness and management becomes urgent today. In this dissertation, to respond to the grand challenge, two data-centric power system situation awareness and management approaches are proposed to address the security problems in the transmission/distribution grids and social benefits augmentation problem at the distribution-customer lever, respectively. To address the security problem in the transmission/distribution grids utilizing big data, the first approach provides a fault analysis solution based on characterization and analytics of the synchrophasor measurements. Specically, the optimal synchrophasor measurement devices selection algorithm (OSMDSA) and matching pursuit decomposition (MPD) based spatial-temporal synchrophasor data characterization method was developed to reduce data volume while preserving comprehensive information for the big data analyses. And the weighted Granger causality (WGC) method was investigated to conduct fault impact causal analysis during system disturbance for fault localization. Numerical results and comparison with other methods demonstrate the effectiveness and robustness of this analytic approach. As more social effects are becoming important considerations in power system management, the goal of situation awareness should be expanded to also include achievements in social benefits. The second approach investigates the concept and application of social energy upon the University of Denver campus grid to provide management improvement solutions for optimizing social cost. Social element--human working productivity cost, and economic element--electricity consumption cost, are both considered in the evaluation of overall social cost. Moreover, power system simulation, numerical experiments for smart building modeling, distribution level real-time pricing and social response to the pricing signals are studied for implementing the interactive artificial-physical management scheme.
Distribution-centric 3-parameter thermodynamic models of partition gas chromatography.
Blumberg, Leonid M
2017-03-31
If both parameters (the entropy, ΔS, and the enthalpy, ΔH) of the classic van't Hoff model of dependence of distribution coefficients (K) of analytes on temperature (T) are treated as the temperature-independent constants then the accuracy of the model is known to be insufficient for the needed accuracy of retention time prediction. A more accurate 3-parameter Clarke-Glew model offers a way to treat ΔS and ΔH as functions, ΔS(T) and ΔH(T), of T. A known T-centric construction of these functions is based on relating them to the reference values (ΔS ref and ΔH ref ) corresponding to a predetermined reference temperature (T ref ). Choosing a single T ref for all analytes in a complex sample or in a large database might lead to practically irrelevant values of ΔS ref and ΔH ref for those analytes that have too small or too large retention factors at T ref . Breaking all analytes in several subsets each with its own T ref leads to discontinuities in the analyte parameters. These problems are avoided in the K-centric modeling where ΔS(T) and ΔS(T) and other analyte parameters are described in relation to their values corresponding to a predetermined reference distribution coefficient (K Ref ) - the same for all analytes. In this report, the mathematics of the K-centric modeling are described and the properties of several types of K-centric parameters are discussed. It has been shown that the earlier introduced characteristic parameters of the analyte-column interaction (the characteristic temperature, T char , and the characteristic thermal constant, θ char ) are a special chromatographically convenient case of the K-centric parameters. Transformations of T-centric parameters into K-centric ones and vice-versa as well as the transformations of one set of K-centric parameters into another set and vice-versa are described. Copyright © 2017 Elsevier B.V. All rights reserved.
An Operations Concept for Integrated Model-Centric Engineering at JPL
NASA Technical Reports Server (NTRS)
Bayer, Todd J.; Cooney, Lauren A.; Delp, Christopher L.; Dutenhoffer, Chelsea A.; Gostelow, Roli D.; Ingham, Michel D.; Jenkins, J. Steven; Smith, Brian S.
2010-01-01
As JPL's missions grow more complex, the need for improved systems engineering processes is becoming clear. Of significant promise in this regard is the move toward a more integrated and model-centric approach to mission conception, design, implementation and operations. The Integrated Model-Centric Engineering (IMCE) Initiative, now underway at JPL, seeks to lay the groundwork for these improvements. This paper will report progress on three fronts: articulating JPL's need for IMCE; characterizing the enterprise into which IMCE capabilities will be deployed; and constructing an operations concept for a flight project development in an integrated model-centric environment.
Patient privacy protection using anonymous access control techniques.
Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V
2008-01-01
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
Transnational Saudi Arabian Youth and Facebook: Enacting Privacy and Identity
ERIC Educational Resources Information Center
Abokhodair, Norah Abdulwahab
2017-01-01
Theories of privacy and identity in relationship to the use of Information Communication Technology (ICT) have been a topic of research for decades. However, little attention has been paid to the perception of privacy and identity from the perspective of Muslim Arab technology users. Privacy and identity in the context of the Arab world is highly…
Katsuse Kanayama, Akiko; Takahashi, Hiroshi; Yoshizawa, Sadako; Tateda, Kazuhiro; Kaneko, Akihiro; Kobayashi, Intetsu
2017-08-01
We investigated the genetic relatedness of Staphylococcus aureus isolates recovered from mobile phones and palms and fingers of users. Genetically identical isolates were detected from mobile phones and their user and multiple users, which is consistent with mobile phones serving as reservoirs of infection in the health care environment. These findings reinforce the need for hand hygiene prior to patient contact as the most effective intervention for preventing health care-associated infection. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.
Bible, Paul W; Kanno, Yuka; Wei, Lai; Brooks, Stephen R; O'Shea, John J; Morasso, Maria I; Loganantharaj, Rasiah; Sun, Hong-Wei
2015-01-01
Comparative co-localization analysis of transcription factors (TFs) and epigenetic marks (EMs) in specific biological contexts is one of the most critical areas of ChIP-Seq data analysis beyond peak calling. Yet there is a significant lack of user-friendly and powerful tools geared towards co-localization analysis based exploratory research. Most tools currently used for co-localization analysis are command line only and require extensive installation procedures and Linux expertise. Online tools partially address the usability issues of command line tools, but slow response times and few customization features make them unsuitable for rapid data-driven interactive exploratory research. We have developed PAPST: Peak Assignment and Profile Search Tool, a user-friendly yet powerful platform with a unique design, which integrates both gene-centric and peak-centric co-localization analysis into a single package. Most of PAPST's functions can be completed in less than five seconds, allowing quick cycles of data-driven hypothesis generation and testing. With PAPST, a researcher with or without computational expertise can perform sophisticated co-localization pattern analysis of multiple TFs and EMs, either against all known genes or a set of genomic regions obtained from public repositories or prior analysis. PAPST is a versatile, efficient, and customizable tool for genome-wide data-driven exploratory research. Creatively used, PAPST can be quickly applied to any genomic data analysis that involves a comparison of two or more sets of genomic coordinate intervals, making it a powerful tool for a wide range of exploratory genomic research. We first present PAPST's general purpose features then apply it to several public ChIP-Seq data sets to demonstrate its rapid execution and potential for cutting-edge research with a case study in enhancer analysis. To our knowledge, PAPST is the first software of its kind to provide efficient and sophisticated post peak-calling ChIP-Seq data analysis as an easy-to-use interactive application. PAPST is available at https://github.com/paulbible/papst and is a public domain work.
Interactive Parallel Data Analysis within Data-Centric Cluster Facilities using the IPython Notebook
NASA Astrophysics Data System (ADS)
Pascoe, S.; Lansdowne, J.; Iwi, A.; Stephens, A.; Kershaw, P.
2012-12-01
The data deluge is making traditional analysis workflows for many researchers obsolete. Support for parallelism within popular tools such as matlab, IDL and NCO is not well developed and rarely used. However parallelism is necessary for processing modern data volumes on a timescale conducive to curiosity-driven analysis. Furthermore, for peta-scale datasets such as the CMIP5 archive, it is no longer practical to bring an entire dataset to a researcher's workstation for analysis, or even to their institutional cluster. Therefore, there is an increasing need to develop new analysis platforms which both enable processing at the point of data storage and which provides parallelism. Such an environment should, where possible, maintain the convenience and familiarity of our current analysis environments to encourage curiosity-driven research. We describe how we are combining the interactive python shell (IPython) with our JASMIN data-cluster infrastructure. IPython has been specifically designed to bridge the gap between the HPC-style parallel workflows and the opportunistic curiosity-driven analysis usually carried out using domain specific languages and scriptable tools. IPython offers a web-based interactive environment, the IPython notebook, and a cluster engine for parallelism all underpinned by the well-respected Python/Scipy scientific programming stack. JASMIN is designed to support the data analysis requirements of the UK and European climate and earth system modeling community. JASMIN, with its sister facility CEMS focusing the earth observation community, has 4.5 PB of fast parallel disk storage alongside over 370 computing cores provide local computation. Through the IPython interface to JASMIN, users can make efficient use of JASMIN's multi-core virtual machines to perform interactive analysis on all cores simultaneously or can configure IPython clusters across multiple VMs. Larger-scale clusters can be provisioned through JASMIN's batch scheduling system. Outputs can be summarised and visualised using the full power of Python's many scientific tools, including Scipy, Matplotlib, Pandas and CDAT. This rich user experience is delivered through the user's web browser; maintaining the interactive feel of a workstation-based environment with the parallel power of a remote data-centric processing facility.
Bible, Paul W.; Kanno, Yuka; Wei, Lai; Brooks, Stephen R.; O’Shea, John J.; Morasso, Maria I.; Loganantharaj, Rasiah; Sun, Hong-Wei
2015-01-01
Comparative co-localization analysis of transcription factors (TFs) and epigenetic marks (EMs) in specific biological contexts is one of the most critical areas of ChIP-Seq data analysis beyond peak calling. Yet there is a significant lack of user-friendly and powerful tools geared towards co-localization analysis based exploratory research. Most tools currently used for co-localization analysis are command line only and require extensive installation procedures and Linux expertise. Online tools partially address the usability issues of command line tools, but slow response times and few customization features make them unsuitable for rapid data-driven interactive exploratory research. We have developed PAPST: Peak Assignment and Profile Search Tool, a user-friendly yet powerful platform with a unique design, which integrates both gene-centric and peak-centric co-localization analysis into a single package. Most of PAPST’s functions can be completed in less than five seconds, allowing quick cycles of data-driven hypothesis generation and testing. With PAPST, a researcher with or without computational expertise can perform sophisticated co-localization pattern analysis of multiple TFs and EMs, either against all known genes or a set of genomic regions obtained from public repositories or prior analysis. PAPST is a versatile, efficient, and customizable tool for genome-wide data-driven exploratory research. Creatively used, PAPST can be quickly applied to any genomic data analysis that involves a comparison of two or more sets of genomic coordinate intervals, making it a powerful tool for a wide range of exploratory genomic research. We first present PAPST’s general purpose features then apply it to several public ChIP-Seq data sets to demonstrate its rapid execution and potential for cutting-edge research with a case study in enhancer analysis. To our knowledge, PAPST is the first software of its kind to provide efficient and sophisticated post peak-calling ChIP-Seq data analysis as an easy-to-use interactive application. PAPST is available at https://github.com/paulbible/papst and is a public domain work. PMID:25970601
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... venture. No other changes have been made in either the membership or planned activity of the group...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act'') Network Centric Operations Industry Consortium, Inc. has filed... venture. No other changes have been made in either the membership or planned activity of the group...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... been made in either the membership or planned activity of the group research project. Membership in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... changes have been made in either the membership or planned activity of the group research project...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... made in either the membership or planned activity of the group research project. Membership in this...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-01
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC...&D Institute, Gdynia, POLAND; Solera Networks, Lindon, UT; and Dataline, LLC, McLean, VA, have...
An Integrated Cyberenvironment for Event-Driven Environmental Observatory Research and Education
NASA Astrophysics Data System (ADS)
Myers, J.; Minsker, B.; Butler, R.
2006-12-01
National environmental observatories will soon provide large-scale data from diverse sensor networks and community models. While much attention is focused on piping data from sensors to archives and users, truly integrating these resources into the everyday research activities of scientists and engineers across the community, and enabling their results and innovations to be brought back into the observatory, also critical to long-term success of the observatories, is often neglected. This talk will give an overview of the Environmental Cyberinfrastructure Demonstrator (ECID) Cyberenvironment for observatory-centric environmental research and education, under development at the National Center for Supercomputing Applications (NCSA), which is designed to address these issues. Cyberenvironments incorporate collaboratory and grid technologies, web services, and other cyberinfrastructure into an overall framework that balances needs for efficient coordination and the ability to innovate. They are designed to support the full scientific lifecycle both in terms of individual experiments moving from data to workflows to publication and at the macro level where new discoveries lead to additional data, models, tools, and conceptual frameworks that augment and evolve community-scale systems such as observatories. The ECID cyberenvironment currently integrates five major components a collaborative portal, workflow engine, event manager, metadata repository, and social network personalization capabilities - that have novel features inspired by the Cyberenvironment concept and enabling powerful environmental research scenarios. A summary of these components and the overall cyberenvironment will be given in this talk, while other posters will give details on several of the components. The summary will be presented within the context of environmental use case scenarios created in collaboration with researchers from the WATERS (WATer and Environmental Research Systems) Network, a joint National Science Foundation-funded initiative of the hydrology and environmental engineering communities. The use case scenarios include identifying sensor anomalies in point- and streaming sensor data and notifying data managers in near-real time; and referring users of data or data products (e.g., workflows, publications) to related data or data products.
NASA Astrophysics Data System (ADS)
Shrestha, S. R.; Hogeweg, M.; Rose, B.; Turner, A.
2017-12-01
The requirement for quality, authoritatively sourced data can often be challenging when working with scientific data. In addition, the lack of standard mechanism to discover, access, and use such data can be cumbersome. This results in slow research, poor dissemination and missed opportunities for research to positively impact policy and knowledge. There is widespread recognition that authoritative datasets are maintained by multiple organizations following various standards, and addressing these challenges will involve multiple stakeholders as well. The bottom line is that organizations need a mechanism to efficiently create, share, catalog, and discover data, and the ability to apply these to create an authoritative information products and applications is powerful and provides value. In real-world applications, individual organizations develop, modify, finalize, and support foundational data for distributed users across the system and thus require an efficient method of data management. For this, the SDI (Spatial Data Infrastructure) framework can be applied for GIS users to facilitate efficient and powerful decision making based on strong visualization and analytics. Working with research institutions, governments, and organizations across the world, we have developed a Hub framework for data and analysis sharing that is driven by outcome-centric goals which apply common methodologies and standards. SDI are an operational capability that should be equitably accessible to policy-makers, analysts, departments and public communities. These SDI need to align with operational workflows and support social communications and collaboration. The Hub framework integrates data across agencies, projects and organizations to support interoperability and drive coordination. We will present and share how Esri has been supporting the development of local, state, and national SDIs for many years and show some use cases for applications of planetary SDI. We will also share what makes an SDI successful, how organizations have used the ArcGIS platform to quickly stand up key SDI products and applications, and describe some typical SDI scenarios.
Brochhausen, Mathias; Spear, Andrew D.; Cocos, Cristian; Weiler, Gabriele; Martín, Luis; Anguita, Alberto; Stenzhorn, Holger; Daskalaki, Evangelia; Schera, Fatima; Schwarz, Ulf; Sfakianakis, Stelios; Kiefer, Stephan; Dörr, Martin; Graf, Norbert; Tsiknakis, Manolis
2017-01-01
Objective This paper introduces the objectives, methods and results of ontology development in the EU co-funded project Advancing Clinico-genomic Trials on Cancer – Open Grid Services for Improving Medical Knowledge Discovery (ACGT). While the available data in the life sciences has recently grown both in amount and quality, the full exploitation of it is being hindered by the use of different underlying technologies, coding systems, category schemes and reporting methods on the part of different research groups. The goal of the ACGT project is to contribute to the resolution of these problems by developing an ontology-driven, semantic grid services infrastructure that will enable efficient execution of discovery-driven scientific workflows in the context of multi-centric, post-genomic clinical trials. The focus of the present paper is the ACGT Master Ontology (MO). Methods ACGT project researchers undertook a systematic review of existing domain and upper-level ontologies, as well as of existing ontology design software, implementation methods, and end-user interfaces. This included the careful study of best practices, design principles and evaluation methods for ontology design, maintenance, implementation, and versioning, as well as for use on the part of domain experts and clinicians. Results To date, the results of the ACGT project include (i) the development of a master ontology (the ACGT-MO) based on clearly defined principles of ontology development and evaluation; (ii) the development of a technical infra-structure (the ACGT Platform) that implements the ACGT-MO utilizing independent tools, components and resources that have been developed based on open architectural standards, and which includes an application updating and evolving the ontology efficiently in response to end-user needs; and (iii) the development of an Ontology-based Trial Management Application (ObTiMA) that integrates the ACGT-MO into the design process of clinical trials in order to guarantee automatic semantic integration without the need to perform a separate mapping process. PMID:20438862
REFGEN and TREENAMER: Automated Sequence Data Handling for Phylogenetic Analysis in the Genomic Era
Leonard, Guy; Stevens, Jamie R.; Richards, Thomas A.
2009-01-01
The phylogenetic analysis of nucleotide sequences and increasingly that of amino acid sequences is used to address a number of biological questions. Access to extensive datasets, including numerous genome projects, means that standard phylogenetic analyses can include many hundreds of sequences. Unfortunately, most phylogenetic analysis programs do not tolerate the sequence naming conventions of genome databases. Managing large numbers of sequences and standardizing sequence labels for use in phylogenetic analysis programs can be a time consuming and laborious task. Here we report the availability of an online resource for the management of gene sequences recovered from public access genome databases such as GenBank. These web utilities include the facility for renaming every sequence in a FASTA alignment file, with each sequence label derived from a user-defined combination of the species name and/or database accession number. This facility enables the user to keep track of the branching order of the sequences/taxa during multiple tree calculations and re-optimisations. Post phylogenetic analysis, these webpages can then be used to rename every label in the subsequent tree files (with a user-defined combination of species name and/or database accession number). Together these programs drastically reduce the time required for managing sequence alignments and labelling phylogenetic figures. Additional features of our platform include the automatic removal of identical accession numbers (recorded in the report file) and generation of species and accession number lists for use in supplementary materials or figure legends. PMID:19812722
Nobrega, R Paul; Brown, Michael; Williams, Cody; Sumner, Chris; Estep, Patricia; Caffry, Isabelle; Yu, Yao; Lynaugh, Heather; Burnina, Irina; Lilov, Asparouh; Desroches, Jordan; Bukowski, John; Sun, Tingwan; Belk, Jonathan P; Johnson, Kirt; Xu, Yingda
2017-10-01
The state-of-the-art industrial drug discovery approach is the empirical interrogation of a library of drug candidates against a target molecule. The advantage of high-throughput kinetic measurements over equilibrium assessments is the ability to measure each of the kinetic components of binding affinity. Although high-throughput capabilities have improved with advances in instrument hardware, three bottlenecks in data processing remain: (1) intrinsic molecular properties that lead to poor biophysical quality in vitro are not accounted for in commercially available analysis models, (2) processing data through a user interface is time-consuming and not amenable to parallelized data collection, and (3) a commercial solution that includes historical kinetic data in the analysis of kinetic competition data does not exist. Herein, we describe a generally applicable method for the automated analysis, storage, and retrieval of kinetic binding data. This analysis can deconvolve poor quality data on-the-fly and store and organize historical data in a queryable format for use in future analyses. Such database-centric strategies afford greater insight into the molecular mechanisms of kinetic competition, allowing for the rapid identification of allosteric effectors and the presentation of kinetic competition data in absolute terms of percent bound to antigen on the biosensor.
2016-01-01
Abstract Molecular recognition by protein mostly occurs in a local region on the protein surface. Thus, an efficient computational method for accurate characterization of protein local structural conservation is necessary to better understand biology and drug design. We present a novel local structure alignment tool, G‐LoSA. G‐LoSA aligns protein local structures in a sequence order independent way and provides a GA‐score, a chemical feature‐based and size‐independent structure similarity score. Our benchmark validation shows the robust performance of G‐LoSA to the local structures of diverse sizes and characteristics, demonstrating its universal applicability to local structure‐centric comparative biology studies. In particular, G‐LoSA is highly effective in detecting conserved local regions on the entire surface of a given protein. In addition, the applications of G‐LoSA to identifying template ligands and predicting ligand and protein binding sites illustrate its strong potential for computer‐aided drug design. We hope that G‐LoSA can be a useful computational method for exploring interesting biological problems through large‐scale comparison of protein local structures and facilitating drug discovery research and development. G‐LoSA is freely available to academic users at http://im.compbio.ku.edu/GLoSA/. PMID:26813336
Lee, Hui Sun; Im, Wonpil
2016-04-01
Molecular recognition by protein mostly occurs in a local region on the protein surface. Thus, an efficient computational method for accurate characterization of protein local structural conservation is necessary to better understand biology and drug design. We present a novel local structure alignment tool, G-LoSA. G-LoSA aligns protein local structures in a sequence order independent way and provides a GA-score, a chemical feature-based and size-independent structure similarity score. Our benchmark validation shows the robust performance of G-LoSA to the local structures of diverse sizes and characteristics, demonstrating its universal applicability to local structure-centric comparative biology studies. In particular, G-LoSA is highly effective in detecting conserved local regions on the entire surface of a given protein. In addition, the applications of G-LoSA to identifying template ligands and predicting ligand and protein binding sites illustrate its strong potential for computer-aided drug design. We hope that G-LoSA can be a useful computational method for exploring interesting biological problems through large-scale comparison of protein local structures and facilitating drug discovery research and development. G-LoSA is freely available to academic users at http://im.compbio.ku.edu/GLoSA/. © 2016 The Protein Society.
Leveraging standards to support patient-centric interdisciplinary plans of care.
Dykes, Patricia C; DaDamio, Rebecca R; Goldsmith, Denise; Kim, Hyeon-eui; Ohashi, Kumiko; Saba, Virginia K
2011-01-01
As health care systems and providers move towards meaningful use of electronic health records, the once distant vision of collaborative patient-centric, interdisciplinary plans of care, generated and updated across organizations and levels of care, may soon become a reality. Effective care planning is included in the proposed Stages 2-3 Meaningful Use quality measures. To facilitate interoperability, standardization of plan of care messaging, content, information and terminology models are needed. This degree of standardization requires local and national coordination. The purpose of this paper is to review some existing standards that may be leveraged to support development of interdisciplinary patient-centric plans of care. Standards are then applied to a use case to demonstrate one method for achieving patient-centric and interoperable interdisciplinary plan of care documentation. Our pilot work suggests that existing standards provide a foundation for adoption and implementation of patient-centric plans of care that are consistent with federal requirements.
An enhanced mobile-healthcare emergency system based on extended chaotic maps.
Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios
2013-10-01
Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.
Smart Objects, Dumb Archives: A User-Centric, Layered Digital Library Framework
NASA Technical Reports Server (NTRS)
Maly, Kurt; Nelson, Michael L.; Zubair, Mohammad
1999-01-01
Currently, there exist a large number of superb digital libraries, all of which are, unfortunately, vertically integrated and all presenting a monolithic interface to their users. Ideally, a user would want to locate resources from a variety of digital libraries dealing only with one interface. A number of approaches exist to this interoperability issue exist including: defining a universal protocol for all libraries to adhere to; or developing mechanisms to translate between protocols. The approach we illustrate in this paper is to push down the level of universal protocols to one for digital object communication and for communication for simple archives. This approach creates the opportunity for digital library service providers to create digital libraries tailored to the needs of user communities drawing from available archives and individual publishers who adhere to this standard. We have created a reference implementation based on the hyper text transfer protocol (http) with the protocols being derived from the Dienst protocol. We have created a special class of digital objects called buckets and a number of archives based on a NASA collection and NSF funded projects. Starting from NCSTRL we have developed a set of digital library services called NCSTRL+ and have created digital libraries for researchers, educators and students that can each draw on all the archives and individually created buckets.
Training Community Modeling and Simulation Business Plan: 2009 Edition
2010-04-01
strategic information assurance 33 33 Provide crisis action procedures training 34 34 Provide the IC SOF-specific training at the operational level... information and products • Collaborative analysis processes • Dissemination of information throughout a command and to subordinates by redundant means...centric M&S capabilities will improve training for information warfare, assist with training for homeland defense operations, crisis -management plan- ning
Ground Systems Integration Domain (GSID) Materials for Ground Platforms
2010-09-20
Vehicles • Heavy Brigade Combat Team • Strykers • MRAPs • Ground Combat Vehicles (Future) Tactical Vehicles • HMMWVs • Trailers • Heavy, Medium and...efficient structural material solutions • Signature management, electromagnetic shielding over potentially non-metallic surfaces • Diagnostics...Occupant-Centric Survivability Focused): 1. 4500 lbs + trailer towing capacity; 4-6 man crew compartmentPayload 2. 14,000 lb curb vehicle weightPerformance
Interoperable Acquisition for Systems of Systems: The Challenges
2006-09-01
Interoperable Acquisition for Systems of Systems: The Challenges James D. Smith II D. Mike Phillips September 2006 TECHNICAL NOTE...Failure of Program-Centric Risk Management 10 3.3.2 Absence of System-of-Systems Engineering 12 3.3.3 Disconnect Between System-of-Systems...SOFTWARE ENGINEERING INSTITUTE | vii viii | CMU/SEI-2006-TN-034 Abstract Large, complex systems development has always been challenging , even when the
2004-11-01
military effectiveness, history provides us the answer: In “ Megatrends ”, John Naisbitt, writes about technology itself without knowing that a...Control Simulations; viii. Urban Planning; ix. Urban Combat; x. Chemical Biological Radiological, and Nuclear (CBRN) Evaluations; xi. Military...Capability Management. DRDC Ottawa TM 2004-221 83 References 1. Naisbitt, J. Megatrends . Warner Books, 290 pages, 1982. 2
Nosouhian, Saeid; Davoudi, Amin; Derhami, Mohammad
2015-01-01
This clinical report describes prosthetic rehabilitation of posterior open bite relationship in a patient with several missing teeth and skeletal Class III malocclusion. Primary diagnostic esthetic evaluations were performed by mounting casts in centric relation and estimating lost vertical dimension of occlusion. Exclusive treatments were designated by applying overlay removable partial denture with external attachment systems for higher retentions. PMID:26929544
Nosouhian, Saeid; Davoudi, Amin; Derhami, Mohammad
2015-01-01
This clinical report describes prosthetic rehabilitation of posterior open bite relationship in a patient with several missing teeth and skeletal Class III malocclusion. Primary diagnostic esthetic evaluations were performed by mounting casts in centric relation and estimating lost vertical dimension of occlusion. Exclusive treatments were designated by applying overlay removable partial denture with external attachment systems for higher retentions.
Net-centric Information Sharing: Supporting the 21st Century Maritime Strategy
2008-09-01
and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE September 2008 3...FEMA Federal Emergency Management Agency FOUO For Official Use Only GIS Geospacial Information System IC Intelligence Community IC ISM Intelligence...TPPU Task, Post, Process, Use UCORE Universal Core UCore Universal Core ULEX Universal Lexical Exchange USAF United States Air Force WWW World
Hurley, John; Lakeman, Richard
2011-01-01
Identity studies are well established across the social science literature with mental health nursing beginning to offer evidenced insights into what may, or may not, constitute key identity performances. For mental health nursing these performances remain contested, both from within the profession and from international contexts that favour generic constructions of mental health. This paper offers findings from a qualitative study that focused upon the process of how mental health nursing identity development is influenced, rather than what that identity may or may not be. These findings highlight that mental health nurses (MHNs) not only form their identity around service user centred education and training, but that many also use the education as a means to leave the profession. Through highlighting the impact of informal education (i.e., through work), formal education, and training upon the formation of mental health nursing identity, nurses are potentially alerted to the importance of clinically focussed mental health being prominent within curricula, rewarding mental health nursing skills specialisation, and the importance of the role of the service user in mental health nurse education and, hence, identity formation.
Network Centric Operations: Background and Oversight Issues for Congress
2007-03-15
6 Overconfidence about the Effectiveness of NCO . . . . . . . . . . . . . . . . . 7 Reduced Effectiveness for Urban Counter-Insurgency...now question the effectiveness of Network Centric Operations, and its relevance to different types of conflict, including close urban combat. Others...expectations. They wonder if the DOD model for network centric operations may underestimate an enemy’s ability to deceive high technology sensors, or block the
"They treat us like we're not there": Queer bodies and the social production of healthcare spaces.
Meer, Talia; Müller, Alex
2017-05-01
There is significant literature demonstrating the interpenetrability of identity and space, yet there is almost no work that explores the co-production of queer identities and healthcare spaces. We use Lefebvre's triad of (social) space to explore how the social spaces of South African healthcare facilities shape and are shaped by queer service-users, drawing on data from interviews and focus group discussions with 29 queer service-users and 14 representatives of organisations. Findings reveal that healthcare spaces are produced by the spatial ordering of health policy inattentive to queer health needs; the enduring symbolic representations of queerness as pathological or 'un-African'; and various identity assertions and practices of individuals, including queer service-users and healthcare providers. As a result, healthcare spaces are overwhelmingly heteronormative, although queer service-users' subversive practices suggest alternative spatial configurations. However, such resistance relies on individual empowered action and risks disciplining responses. Wider efforts are needed to transform the material and ideological space of healthcare facilities through law and policy reform and continuing professional training for healthcare providers. Copyright © 2017 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Davis, Dennis S.; Vehabovic, Nermin
2018-01-01
The authors offer guidance on recognizing and resisting test-centric instruction in reading comprehension. They posit that five practices indicate a test-centric view of comprehension: when the tested content is privileged, when the test becomes the text, when annotation requirements replace strategic thinking, when test items frame how students…
Cole-Lewis, Heather J; Smaldone, Arlene M; Davidson, Patricia R; Kukafka, Rita; Tobin, Jonathan N; Cassells, Andrea; Mynatt, Elizabeth D; Hripcsak, George; Mamykina, Lena
2016-01-01
To develop an expandable knowledge base of reusable knowledge related to self-management of diabetes that can be used as a foundation for patient-centric decision support tools. The structure and components of the knowledge base were created in participatory design with academic diabetes educators using knowledge acquisition methods. The knowledge base was validated using scenario-based approach with practicing diabetes educators and individuals with diabetes recruited from Community Health Centers (CHCs) serving economically disadvantaged communities and ethnic minorities in New York. The knowledge base includes eight glycemic control problems, over 150 behaviors known to contribute to these problems coupled with contextual explanations, and over 200 specific action-oriented self-management goals for correcting problematic behaviors, with corresponding motivational messages. The validation of the knowledge base suggested high level of completeness and accuracy, and identified improvements in cultural appropriateness. These were addressed in new iterations of the knowledge base. The resulting knowledge base is theoretically grounded, incorporates practical and evidence-based knowledge used by diabetes educators in practice settings, and allows for personally meaningful choices by individuals with diabetes. Participatory design approach helped researchers to capture implicit knowledge of practicing diabetes educators and make it explicit and reusable. The knowledge base proposed here is an important step towards development of new generation patient-centric decision support tools for facilitating chronic disease self-management. While this knowledge base specifically targets diabetes, its overall structure and composition can be generalized to other chronic conditions. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Cole-Lewis, Heather J.; Smaldone, Arlene M.; Davidson, Patricia R.; Kukafka, Rita; Tobin, Jonathan N.; Cassells, Andrea; Mynatt, Elizabeth D.; Hripcsak, George; Mamykina, Lena
2015-01-01
Objective To develop an expandable knowledge base of reusable knowledge related to self-management of diabetes that can be used as a foundation for patient-centric decision support tools. Materials and methods The structure and components of the knowledge base were created in participatory design with academic diabetes educators using knowledge acquisition methods. The knowledge base was validated using scenario-based approach with practicing diabetes educators and individuals with diabetes recruited from Community Health Centers (CHCs) serving economically disadvantaged communities and ethnic minorities in New York. Results The knowledge base includes eight glycemic control problems, over 150 behaviors known to contribute to these problems coupled with contextual explanations, and over 200 specific action-oriented self-management goals for correcting problematic behaviors, with corresponding motivational messages. The validation of the knowledge base suggested high level of completeness and accuracy, and identified improvements in cultural appropriateness. These were addressed in new iterations of the knowledge base. Discussion The resulting knowledge base is theoretically grounded, incorporates practical and evidence-based knowledge used by diabetes educators in practice settings, and allows for personally meaningful choices by individuals with diabetes. Participatory design approach helped researchers to capture implicit knowledge of practicing diabetes educators and make it explicit and reusable. Conclusion The knowledge base proposed here is an important step towards development of new generation patient-centric decision support tools for facilitating chronic disease self-management. While this knowledge base specifically targets diabetes, its overall structure and composition can be generalized to other chronic conditions. PMID:26547253
van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter
2015-01-01
The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.
Krakow, Barry J; Obando, Jessica J; Ulibarri, Victor A; McIver, Natalia D
2017-01-01
Study objectives Patients with comorbid posttraumatic stress disorder (PTSD) and obstructive sleep apnea (OSA) manifest low adherence to continuous positive airway pressure (CPAP) due to fixed, pressure-induced expiratory pressure intolerance (EPI), a subjective symptom and objective sign aggravated by anxiety sensitivity and somatosensory amplification. As advanced PAP therapy modes (ie, auto-bilevel PAP [ABPAP] or adaptive servo-ventilation [ASV]) may address these side effects, we hypothesized such treatment would be associated with decreased expiratory intolerance and increased adherence in posttraumatic stress patients with co-occurring OSA. Methods We reviewed charts of 147 consecutive adult patients with moderately severe posttraumatic stress symptoms and objectively diagnosed OSA. All patients failed or rejected CPAP and were manually titrated on auto-adjusting, dual-pressure ABPAP or ASV modes in the sleep laboratory, a technique to eliminate flow limitation breathing events while resolving EPI. Patients were then prescribed either mode of therapy. Follow-up encounters assessed patient use, and objective data downloads (ODDs) measured adherence. Results Of 147 charts reviewed, 130 patients were deemed current PAP users, and 102 provided ODDs: 64 used ASV and 38 used ABPAP. ODDs yielded three groups: 59 adherent per insurance conventions, 19 subthreshold compliant partial users, and 24 noncompliant. Compliance based on available downloads was 58%, notably higher than recently reported rates in PTSD patients with OSA. Among the 19 partial users, 17 patients were minutes of PAP use or small percentages of nights removed from meeting insurance compliance criteria for PAP devices. Conclusion Research is warranted on advanced PAP modes in managing CPAP failure in PTSD patients with comorbid OSA. Subthreshold adherence constructs may inform clinical care in a patient-centric model distinct from insurance conventions. Speculatively, clinical application of this transitional zone (“subthreshold” number of hours) may increase PAP use and eventual adherence. PMID:29200833
BioShaDock: a community driven bioinformatics shared Docker-based tools registry
Moreews, François; Sallou, Olivier; Ménager, Hervé; Le bras, Yvan; Monjeaud, Cyril; Blanchet, Christophe; Collin, Olivier
2015-01-01
Linux container technologies, as represented by Docker, provide an alternative to complex and time-consuming installation processes needed for scientific software. The ease of deployment and the process isolation they enable, as well as the reproducibility they permit across environments and versions, are among the qualities that make them interesting candidates for the construction of bioinformatic infrastructures, at any scale from single workstations to high throughput computing architectures. The Docker Hub is a public registry which can be used to distribute bioinformatic software as Docker images. However, its lack of curation and its genericity make it difficult for a bioinformatics user to find the most appropriate images needed. BioShaDock is a bioinformatics-focused Docker registry, which provides a local and fully controlled environment to build and publish bioinformatic software as portable Docker images. It provides a number of improvements over the base Docker registry on authentication and permissions management, that enable its integration in existing bioinformatic infrastructures such as computing platforms. The metadata associated with the registered images are domain-centric, including for instance concepts defined in the EDAM ontology, a shared and structured vocabulary of commonly used terms in bioinformatics. The registry also includes user defined tags to facilitate its discovery, as well as a link to the tool description in the ELIXIR registry if it already exists. If it does not, the BioShaDock registry will synchronize with the registry to create a new description in the Elixir registry, based on the BioShaDock entry metadata. This link will help users get more information on the tool such as its EDAM operations, input and output types. This allows integration with the ELIXIR Tools and Data Services Registry, thus providing the appropriate visibility of such images to the bioinformatics community. PMID:26913191
BioShaDock: a community driven bioinformatics shared Docker-based tools registry.
Moreews, François; Sallou, Olivier; Ménager, Hervé; Le Bras, Yvan; Monjeaud, Cyril; Blanchet, Christophe; Collin, Olivier
2015-01-01
Linux container technologies, as represented by Docker, provide an alternative to complex and time-consuming installation processes needed for scientific software. The ease of deployment and the process isolation they enable, as well as the reproducibility they permit across environments and versions, are among the qualities that make them interesting candidates for the construction of bioinformatic infrastructures, at any scale from single workstations to high throughput computing architectures. The Docker Hub is a public registry which can be used to distribute bioinformatic software as Docker images. However, its lack of curation and its genericity make it difficult for a bioinformatics user to find the most appropriate images needed. BioShaDock is a bioinformatics-focused Docker registry, which provides a local and fully controlled environment to build and publish bioinformatic software as portable Docker images. It provides a number of improvements over the base Docker registry on authentication and permissions management, that enable its integration in existing bioinformatic infrastructures such as computing platforms. The metadata associated with the registered images are domain-centric, including for instance concepts defined in the EDAM ontology, a shared and structured vocabulary of commonly used terms in bioinformatics. The registry also includes user defined tags to facilitate its discovery, as well as a link to the tool description in the ELIXIR registry if it already exists. If it does not, the BioShaDock registry will synchronize with the registry to create a new description in the Elixir registry, based on the BioShaDock entry metadata. This link will help users get more information on the tool such as its EDAM operations, input and output types. This allows integration with the ELIXIR Tools and Data Services Registry, thus providing the appropriate visibility of such images to the bioinformatics community.
Smith, Meredith Y; Benattia, Isma
2016-09-01
Patient-centeredness has become an acknowledged hallmark of not only high-quality health care but also high-quality drug development. Biopharmaceutical companies are actively seeking to be more patient-centric in drug research and development by involving patients in identifying target disease conditions, participating in the design of, and recruitment for, clinical trials, and disseminating study results. Drug safety departments within the biopharmaceutical industry are at a similar inflection point. Rising rates of per capita prescription drug use underscore the importance of having robust pharmacovigilance systems in place to detect and assess adverse drug reactions (ADRs). At the same time, the practice of pharmacovigilance is being transformed by a host of recent regulatory guidances and related initiatives which emphasize the importance of the patient's perspective in drug safety. Collectively, these initiatives impact the full range of activities that fall within the remit of pharmacovigilance, including ADR reporting, signal detection and evaluation, risk management, medication error assessment, benefit-risk assessment and risk communication. Examples include the fact that manufacturing authorization holders are now expected to monitor all digital sources under their control for potential reports of ADRs, and the emergence of new methods for collecting, analysing and reporting patient-generated ADR reports for signal detection and evaluation purposes. A drug safety department's ability to transition successfully into a more patient-centric organization will depend on three defining attributes: (1) a patient-centered culture; (2) deployment of a framework to guide patient engagement activities; and (3) demonstrated proficiency in patient-centered competencies, including patient engagement, risk communication and patient preference assessment. Whether, and to what extent, drug safety departments embrace the new patient-centric imperative, and the methods and processes they implement to achieve this end effectively and efficiently, promise to become distinguishing factors in the highly competitive biopharmaceutical industry landscape.
NASA Astrophysics Data System (ADS)
Liang, Y.; Gallaher, D. W.; Grant, G.; Lv, Q.
2011-12-01
Change over time, is the central driver of climate change detection. The goal is to diagnose the underlying causes, and make projections into the future. In an effort to optimize this process we have developed the Data Rod model, an object-oriented approach that provides the ability to query grid cell changes and their relationships to neighboring grid cells through time. The time series data is organized in time-centric structures called "data rods." A single data rod can be pictured as the multi-spectral data history at one grid cell: a vertical column of data through time. This resolves the long-standing problem of managing time-series data and opens new possibilities for temporal data analysis. This structure enables rapid time- centric analysis at any grid cell across multiple sensors and satellite platforms. Collections of data rods can be spatially and temporally filtered, statistically analyzed, and aggregated for use with pattern matching algorithms. Likewise, individual image pixels can be extracted to generate multi-spectral imagery at any spatial and temporal location. The Data Rods project has created a series of prototype databases to store and analyze massive datasets containing multi-modality remote sensing data. Using object-oriented technology, this method overcomes the operational limitations of traditional relational databases. To demonstrate the speed and efficiency of time-centric analysis using the Data Rods model, we have developed a sea ice detection algorithm. This application determines the concentration of sea ice in a small spatial region across a long temporal window. If performed using traditional analytical techniques, this task would typically require extensive data downloads and spatial filtering. Using Data Rods databases, the exact spatio-temporal data set is immediately available No extraneous data is downloaded, and all selected data querying occurs transparently on the server side. Moreover, fundamental statistical calculations such as running averages are easily implemented against the time-centric columns of data.
Ontology for customer centric digital services and analytics
NASA Astrophysics Data System (ADS)
Keat, Ng Wai; Shahrir, Mohammad Shazri
2017-11-01
In computer science research, ontologies are commonly utilised to create a unified abstract across many rich and different fields. In this paper, we apply the concept to the customer centric domain of digital services analytics and present an analytics solution ontology. The essence is based from traditional Entity Relationship Diagram (ERD), which then was abstracted out to cover wider areas on customer centric digital services. The ontology we developed covers both static aspects (customer identifiers) and dynamic aspects (customer's temporal interactions). The structure of the customer scape is modeled with classes that represent different types of customer touch points, ranging from digital and digital-stamps which represent physical analogies. The dynamic aspects of customer centric digital service are modeled with a set of classes, with the importance is represented in different associations involving establishment and termination of the target interaction. The realized ontology can be used in development of frameworks for customer centric applications, and for specification of common data format used by cooperating digital service applications.
Kang, Hong; Chao, Yonglie; Yi, Xinzhu
2003-12-01
Standards for determining mandibular position, especially the centric relation (CR), are in controversy because of anatomical, neurophysiological factors and research methods or instrument. The purpose of this study was to reevaluate the reproducibility of centric relation of the patients with severe dental attrition for oral rehabilitation. Reproducibility of the centric relation of 6 patients with severe occlusal attrition was investigated by using D5A Denar fully adjustable articulator and the Pantronic recording system. 1. In supine position, anterior-posterior(AP) displacement of centric relation (CR) was 0.14 mm and superior-inferior(SI) displacements of CR were between 0.11 mm-0.12 mm. 2. In upright position, anterior-posterior displacement of CR was 0.35 mm and superior-inferior changes of CR were between 0.13 mm-0.20 mm. The CR is the most stable and reproducible position of mandibule in normal stomatological system and is useful as a reference position in occlusal treatment and functional rehabilitation.
NASA Astrophysics Data System (ADS)
Servigne, S.; Gripay, Y.; Pinarer, O.; Samuel, J.; Ozgovde, A.; Jay, J.
2016-09-01
Concerning energy consumption and monitoring architectures, our goal is to develop a sustainable declarative monitoring architecture for lower energy consumption taking into account the monitoring system itself. Our second is to develop theoretical and practical tools to model, explore and exploit heterogeneous data from various sources in order to understand a phenomenon like energy consumption of smart building vs inhabitants' social behaviours. We focus on a generic model for data acquisition campaigns based on the concept of generic sensor. The concept of generic sensor is centered on acquired data and on their inherent multi-dimensional structure, to support complex domain-specific or field-oriented analysis processes. We consider that a methodological breakthrough may pave the way to deep understanding of voluminous and heterogeneous scientific data sets. Our use case concerns energy efficiency of buildings to understand relationship between physical phenomena and user behaviors. The aim of this paper is to give a presentation of our methodology and results concerning architecture and user-centric tools.
Legerton, Graham
2013-09-01
The refurbishment and extension of existing university buildings is a critical consideration for many universities. This article details an architect's perspective of an innovative and collaborative design approach to transforming an existing library into a futuristic and student-centric interactive learning environment. The design is responsive to people, place, the community and the environment, due, in part, to the enhanced physical permeability of the building. Associated user-group forums comprised the end user client, the university's facilities body, the builder, lead architectural consultants, the Centre for Indigenous Students (Gumurrii Centre) and architectural sub-consultants. This article discusses five key design moves--"triangulate", "unique geometries and spaces", "learning aviary", "sky lounge" and "understanding flexibility". It goes on to discuss these elements in relation to designing spaces to enhance interprofessional education and collaboration. In summary, this article identifies how it is possible to maximise the value and characteristics of an existing library whilst creating a series of innovative spaces that offer choice, encourage serendipity and embrace experimentation.
NASA Astrophysics Data System (ADS)
Lin, Po-Chuan; Chen, Bo-Wei; Chang, Hangbae
2016-07-01
This study presents a human-centric technique for social video expansion based on semantic processing and graph analysis. The objective is to increase metadata of an online video and to explore related information, thereby facilitating user browsing activities. To analyze the semantic meaning of a video, shots and scenes are firstly extracted from the video on the server side. Subsequently, this study uses annotations along with ConceptNet to establish the underlying framework. Detailed metadata, including visual objects and audio events among the predefined categories, are indexed by using the proposed method. Furthermore, relevant online media associated with each category are also analyzed to enrich the existing content. With the above-mentioned information, users can easily browse and search the content according to the link analysis and its complementary knowledge. Experiments on a video dataset are conducted for evaluation. The results show that our system can achieve satisfactory performance, thereby demonstrating the feasibility of the proposed idea.
Kannry, Joseph; Mukani, Sonia; Myers, Kristin
2006-01-01
The experience of Mount Sinai Hospital is representative of the challenges and problems facing large academic medical centers in selecting an ambulatory EMR. The facility successfully revived a stalled process in a challenging financial climate, using a framework of science and rigorous investigation. The process incorporated several innovations: 1) There was a thorough review of medical informatics literature to develop a mission statement, determine practical objectives and guide the demonstration process; 2) The process involved rigorous investigation of vendor statements, industry statements and other institution's views of vendors; 3) The initiative focused on user-centric selection, and the survey instrument was scientifically and specifically designed to assess user feedback; 4) There was scientific analysis of validated findings and survey results at all steering meetings; 5) The process included an assessment of vendors' ability to support research by identifying funded and published research; 6) Selection involved meticulous total cost of ownership analysis to assess and compare real costs of implementing a vendor solution; and finally, 7) There were iterative meetings with stakeholders, executives and users to understand needs, address concerns and communicate the vision.
Time-Centric Models For Designing Embedded Cyber-physical Systems
2009-10-09
Time -centric Models For Designing Embedded Cyber- physical Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou Electrical... Time -centric Models For Designing Embedded Cyber-physical Systems ∗ John C. Eidson , Edward A. Lee, Slobodan Matic, Sanjit A. Seshia, Jia Zou...implementations, such a uniform notion of time cannot be precisely realized. Time triggered networks [10] and time synchronization [9] can be used to
2010-08-01
the public and for first responders to access disaster information and services provided by government agencies and non- governmental organizations...thereby reducing the performance gap for a single federal disaster-management site. DMIS provides government and non- governmental organizations...NIMS) and Na- tional Response Framework (NRF): a. First responders b. Local governments and agencies c. Regional and federal agencies 2
The Program Management Challenges of Web 2.0
2010-06-01
identifying and keeping abreast of the newly emerging technologies; their fast pace of evolution or modification, changing domain focus areas, their varied...definitive experts. No one knows what the future holds for network-centric materiel development . We are in the early stages of the Information Age and...led to the development and evolution of online Web-based communities and services such as auction houses, knowledge portals, social networking sites
College Students, Internet Use, and Protection from Online Identity Theft
ERIC Educational Resources Information Center
Norum, Pamela S.; Weagley, Robert O.
2007-01-01
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
Any Effects of Different Levels of Online User Identity Revelation?
ERIC Educational Resources Information Center
Yu, Fu-Yun
2012-01-01
This study examined the effects of different levels of identity revelation in relation to aspects most relevant to engaged online learning activities. An online learning system supporting question-generation and peer-assessment was adopted. Three 7th grade classes (N=101) were assigned to three identity revelation modes (real-name, nickname and…
Chapter 13. Exploring Use of the Reserved Core
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holmen, John; Humphrey, Alan; Berzins, Martin
2015-07-29
In this chapter, we illustrate benefits of thinking in terms of thread management techniques when using a centralized scheduler model along with interoperability of MPI and PThread. This is facilitated through an exploration of thread placement strategies for an algorithm modeling radiative heat transfer with special attention to the 61st core. This algorithm plays a key role within the Uintah Computational Framework (UCF) and current efforts taking place at the University of Utah to model next-generation, large-scale clean coal boilers. In such simulations, this algorithm models the dominant form of heat transfer and consumes a large portion of compute time.more » Exemplified by a real-world example, this chapter presents our early efforts in porting a key portion of a scalability-centric codebase to the Intel Xeon Phi coprocessor. Specifically, this chapter presents results from our experiments profiling the native execution of a reverse Monte-Carlo ray tracing-based radiation model on a single coprocessor. These results demonstrate that our fastest run configurations utilized the 61st core and that performance was not profoundly impacted when explicitly oversubscribing the coprocessor operating system thread. Additionally, this chapter presents a portion of radiation model source code, a MIC-centric UCF cross-compilation example, and less conventional thread management technique for developers utilizing the PThreads threading model.« less
ELIXIR pilot action: Marine metagenomics - towards a domain specific set of sustainable services.
Robertsen, Espen Mikal; Denise, Hubert; Mitchell, Alex; Finn, Robert D; Bongo, Lars Ailo; Willassen, Nils Peder
2017-01-01
Metagenomics, the study of genetic material recovered directly from environmental samples, has the potential to provide insight into the structure and function of heterogeneous microbial communities. There has been an increased use of metagenomics to discover and understand the diverse biosynthetic capacities of marine microbes, thereby allowing them to be exploited for industrial, food, and health care products. This ELIXIR pilot action was motivated by the need to establish dedicated data resources and harmonized metagenomics pipelines for the marine domain, in order to enhance the exploration and exploitation of marine genetic resources. In this paper, we summarize some of the results from the ELIXIR pilot action "Marine metagenomics - towards user centric services".
Flexible and Transparent User Authentication for Mobile Devices
NASA Astrophysics Data System (ADS)
Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.
Backus, Lisa I.; Gavrilov, Sergey; Loomis, Timothy P.; Halloran, James P.; Phillips, Barbara R.; Belperio, Pamela S.; Mole, Larry A.
2009-01-01
The Department of Veterans Affairs (VA) has a system-wide, patient-centric electronic medical record system (EMR) within which the authors developed the Clinical Case Registries (CCR) to support population-centric delivery and evaluation of VA medical care. To date, the authors have applied the CCR to populations with human immunodeficiency virus (HIV) and hepatitis C virus (HCV). Local components use diagnosis codes and laboratory test results to identify patients who may have HIV or HCV and support queries on local care delivery with customizable reports. For each patient in a local registry, key EMR data are transferred via HL7 messaging to a single national registry. From 128 local registry systems, over 60,000 and 320,000 veterans in VA care have been identified as having HIV and HCV, respectively, and entered in the national database. Local and national reports covering demographics, resource usage, quality of care metrics and medication safety issues have been generated. PMID:19717794
Yan, Peter; Tan, Eng Kiat Kevin; Choo, Jason Chon Jun; Liew, Choon Fong Stanley; Lau, Titus; Waters, David D
2016-07-01
The link between cholesterol levels and atherosclerotic cardiovascular disease (ASCVD) is well-established. In Singapore, there is an increasing prevalence of risk factors for ASCVD. Like many Asian countries, Singapore's population is rapidly ageing and increasingly sedentary, which predisposes individuals to chronic health problems. Current international and local guidelines recommend statin therapy for the primary and secondary prevention of ASCVD. However, despite the effectiveness of statin therapy, some studies have highlighted that Asian patients with cardiovascular disease are not achieving target lipid goals. Furthermore, it is widely believed that the responses of Asians (both patients and physicians) to statin therapy are different from those of their Western counterparts. Experts convened in 2014 to determine the impact of current guidelines on clinical practice in Singapore. This review summarises the key findings and recommendations of these guidelines, and presents key principles to aid clinicians to manage the cardiovascular risk of their patients more effectively. Copyright: © Singapore Medical Association.
Yan, Peter; Tan, Eng Kiat Kevin; Choo, Jason Chon Jun; Liew, Choon Fong Stanley; Lau, Titus; Waters, David D
2016-01-01
The link between cholesterol levels and atherosclerotic cardiovascular disease (ASCVD) is well-established. In Singapore, there is an increasing prevalence of risk factors for ASCVD. Like many Asian countries, Singapore’s population is rapidly ageing and increasingly sedentary, which predisposes individuals to chronic health problems. Current international and local guidelines recommend statin therapy for the primary and secondary prevention of ASCVD. However, despite the effectiveness of statin therapy, some studies have highlighted that Asian patients with cardiovascular disease are not achieving target lipid goals. Furthermore, it is widely believed that the responses of Asians (both patients and physicians) to statin therapy are different from those of their Western counterparts. Experts convened in 2014 to determine the impact of current guidelines on clinical practice in Singapore. This review summarises the key findings and recommendations of these guidelines, and presents key principles to aid clinicians to manage the cardiovascular risk of their patients more effectively. PMID:27439304
Working to reduce the effects of discrimination: Identity management strategies in organizations.
Shih, Margaret; Young, Maia J; Bucher, Amy
2013-04-01
Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.
NASA Astrophysics Data System (ADS)
Zhu, Jun; Chen, Lijun; Ma, Lantao; Li, Dejian; Jiang, Wei; Pan, Lihong; Shen, Huiting; Jia, Hongmin; Hsiang, Chingyun; Cheng, Guojie; Ling, Li; Chen, Shijie; Wang, Jun; Liao, Wenkui; Zhang, Gary
2014-04-01
Defect review is a time consuming job. Human error makes result inconsistent. The defects located on don't care area would not hurt the yield and no need to review them such as defects on dark area. However, critical area defects can impact yield dramatically and need more attention to review them such as defects on clear area. With decrease in integrated circuit dimensions, mask defects are always thousands detected during inspection even more. Traditional manual or simple classification approaches are unable to meet efficient and accuracy requirement. This paper focuses on automatic defect management and classification solution using image output of Lasertec inspection equipment and Anchor pattern centric image process technology. The number of mask defect found during an inspection is always in the range of thousands or even more. This system can handle large number defects with quick and accurate defect classification result. Our experiment includes Die to Die and Single Die modes. The classification accuracy can reach 87.4% and 93.3%. No critical or printable defects are missing in our test cases. The missing classification defects are 0.25% and 0.24% in Die to Die mode and Single Die mode. This kind of missing rate is encouraging and acceptable to apply on production line. The result can be output and reloaded back to inspection machine to have further review. This step helps users to validate some unsure defects with clear and magnification images when captured images can't provide enough information to make judgment. This system effectively reduces expensive inline defect review time. As a fully inline automated defect management solution, the system could be compatible with current inspection approach and integrated with optical simulation even scoring function and guide wafer level defect inspection.
BMDS/SSA Integrated Sensing Demonstration (BISD)
NASA Astrophysics Data System (ADS)
Turner, T.; Springford, K.; Grimaldi, L.
2011-09-01
This demonstration is intended to provide a near-term prototype, leave-behind capability for integrating Ballistic Missile Defense System (BMDS) ground sensors for use in the Space Situational Awareness (SSA) mission. Closed-loop tasking and cueing capability will be implemented, and a demonstration of net-centric space data dissemination using the BMDS sensors will be undertaken using various SSA mission threads. The demonstration is designed to highlight the implications of modifying software and/or hardware at the BMDS command and control node so that cost, risk, and schedule for an operational implementation can be fully understood. Additionally, this demonstration is intended to assess the impacts to both mission areas as a multi-mission, non-traditional sensor capability is integrated into the SSA mission. A successful demonstration will have many leave-behind capabilities and first-of-its-kind achievements to include: a) an extensible SSA operational prototype configuration for BMDS X-Band radars such as AN/TPY-2 and Sea-Based X-Band (SBX) b) a prototype SSA tasking and cueing capability between the Joint Functional Component Command for Space (JFCC Space) Joint Space Operations Center (JSpOC) and the Command, Control, Battle Management, and Communications (C2BMC) Experimental Laboratory (X-Lab), extensible to the Combatant Commands (COCOMS), and out to BMDS sensors c) a capability for a twoway, net-centric, interface for JSpOC space operations, to include translation from net-centric communications to legacy systems and d) processing of BMDS X-Band Radar tracks in the Space Defense Operations Center (SPADOC).
CRM System Implementation in a Multinational Enterprise
NASA Astrophysics Data System (ADS)
Mishra, Alok; Mishra, Deepti
The concept of customer relationship management (CRM) resonates with managers in today's competitive economy. As more and more organizations realize the significance of becoming customer-centric in today's competitive era, they embrace CRM as a core business strategy. CRM an integration of information technology and relationship marketing provides the infrastructure that facilitates long-term relationship building with customers at an enterprise-wide level. Successful CRM implementation is a complex, expensive and rarely technical projects. This paper presents the successful implementation of CRM in a multinational organization. This study will facilitate in understanding transition, constraints and implementation of CRM in multinational enterprises.
76 FR 45902 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... will allow our users to maintain one User ID, consisting of a self-selected Username and Password, to...) Registration and identity verification; (2) enhancement of the User ID; and (3) authentication. The...- person identification verification process for individuals who cannot or are not willing to register...
Information Age Transformation: Getting to a 21st Century Military (revised)
2002-06-01
strategy for transformation is built around experimentation with network- centric concepts designed to leverage the power of Information Age technologies and...Edward A. Smith: From Network- Centric to Effects-Based Operations. 7 CHAPTER 2 Background and Purpose DoD is fully committed to taking advantage...Network Centric Warfare3 (NCW) translates these broad vision statements into a way ahead. NCW is a set of warfighting concepts4 designed to create and
Transforming from a Service-Centric to a Joint Recruiting Environment
2011-03-09
Manpower Policy, (Lawrence, Kansas, University Press of Kansas, 1989), 170. 9 Rostker, I Want You!, 52. 10 Milton Friedman (Why not a Volunteer Army...partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those...centric with a narrow vision. Why does DoD recruit with a service-centric mindset? Why does DoD have separate headquarters to command and control
Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking
2016-11-01
protocol designed to support groups of devices in a local region [4]. It attempts to use the wireless medium to broadcast minimal control information...1) Group Discovery: The goal of the group discovery algo- rithm is to find group nodes without globally flooding control messages. To facilitate this...Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory
2005-05-01
made. 4. Do military decision makers identify / analyze adverse consequences presently? Few do based on this research and most don’t do it effectively ...A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM...ENS/05-01 A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM
2003-01-01
OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced
The medical leadership challenge in healthcare is an identity challenge.
Andersson, Thomas
2015-01-01
The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.
SSA Building Blocks - Transforming Your Data and Applications into Operational Capability
NASA Astrophysics Data System (ADS)
Buell, D.; Hawthorne, Shayn, L.; Higgins, J.
The Electronic System Center's 850 Electronic Systems Group (ELSG) is currently using a Service Oriented Architecture (SOA) to rapidly create net-centric experimental prototypes. This SOA has been utilized effectively across diverse mission areas, such as global air operations and rapid sensor tasking for improved space event management. The 850 ELSG has deployed a working, accredited, SOA on the SIPRNET and provided real-time space information to five separate distributed operations centers. The 850 ELSG has learned first-hand the power of SOAs for integrating DoD and non-DoD SSA data in a rapid and agile manner, allowing capabilities to be fielded and sensors to be integrated in weeks instead of months. This opens a world of opportunity to integrate University data and experimental or proof-of-concept data with sensitive sensors and sources to support developing an array of SSA products for approved users in and outside of the space community. This paper will identify how new capabilities can be proactively developed to rapidly answer critical needs when SOA methodologies are employed and identifies the operational utility and the far-reaching benefits realized by implementing a service-oriented architecture. We offer a new paradigm for how data and application producer's contributions are presented for the rest of the community to leverage.
NASA Astrophysics Data System (ADS)
Saunders, Vance M.
1999-06-01
The downsizing of the Department of Defense (DoD) and the associated reduction in budgets has re-emphasized the need for commonality, reuse, and standards with respect to the way DoD does business. DoD has implemented significant changes in how it buys weapon systems. The new emphasis is on concurrent engineering with Integrated Product and Process Development and collaboration with Integrated Product Teams. The new DoD vision includes Simulation Based Acquisition (SBA), a process supported by robust, collaborative use of simulation technology that is integrated across acquisition phases and programs. This paper discusses the Air Force Research Laboratory's efforts to use Modeling and Simulation (M&S) resources within a Collaborative Enterprise Environment to support SBA and other Collaborative Enterprise and Virtual Prototyping (CEVP) applications. The paper will discuss four technology areas: (1) a Processing Ontology that defines a hierarchically nested set of collaboration contexts needed to organize and support multi-disciplinary collaboration using M&S, (2) a partial taxonomy of intelligent agents needed to manage different M&S resource contributions to advancing the state of product development, (3) an agent- based process for interfacing disparate M&S resources into a CEVP framework, and (4) a Model-View-Control based approach to defining `a new way of doing business' for users of CEVP frameworks/systems.
Talking about sunbed tanning: Social representations and identity-work.
Taylor, Jennifer; Murray, Michael; Lamont, Alexandra
2017-07-01
Despite the publicised health risks associated with its usage, sunbed tanning remains popular in many Western countries. Previous research indicates that knowledge of the harmful effects does not necessarily lead to a reduction in sunbed use. The aim of this study was to develop a more extensive social psychological understanding of sunbed use, in the United Kingdom, by exploring the social representations of sunbed tanning held by both those who use and who have never used sunbeds. Semi-structured interviews were conducted with 15 sunbed users and 10 who had never used a sunbed. A thematic analysis identified two dimensions in the social representations of both the users and non-users; these were concerned with a) health and b) beauty. However, whereas non-users emphasised the health risks, users downplayed and minimised them, instead emphasising the health benefits. Similarly, whereas non-users emphasised the negative aspects of excessive concern with beauty, sunbed users challenged and distanced themselves from this negativity. Sunbed users were engaged in a form of identity-work to protect themselves from the wider negativity and disapproval of which they were aware. Theoretically, social representations theory has provided a unique lens through which to explore this topic, highlighting the importance of taking into consideration the wider environment in which sunbed use takes place. Preliminary practical suggestions include that health workers should consider identity-work when designing interventions aimed at reducing sunbed use. Findings also suggest that, rather than continuing to educate sunbed users about the risks, campaigns and interventions should challenge the commonly drawn upon arguments about the health benefits. These benefits emerged as a particularly powerful discursive tool for the sunbed users in helping to justify their behaviour, but also to counteract negative stereotypes and assumptions they knew others held of them. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos
2014-05-01
Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.