2,343 research outputs found

    SWOOP: an application generator for ORACLE:WWW systems

    Get PDF
    The development of a software package (named Swoop) is described. Swoop is designed to support the generation and maintenance of WWW information systems which store information in ORACLE databases: a so-called hyperbase program. The biggest problem with hyperbases is that they require a sophisticated program to interpret Forms, query appropriate databases, and merge information into Hypertext. There is a clear need for application-generator tools which allow hyperbase programs to be constructed with minimal expertise on the part of the designer. It is this problem which Swoop addresses

    Continuing medical education speakers with high evaluation scores use more image-based slides

    Get PDF
    Although continuing medical education (CME) presentations are common across health professions, it is unknown whether slide design is independently associated with audience evaluations of the speaker. Based on the conceptual framework of Mayer’s theory of multimedia learning, this study aimed to determine whether image use and text density in presentation slides are associated with overall speaker evaluations. This retrospective analysis of six sequential CME conferences (two annual emergency medicine conferences over a three-year period) used a mixed linear regression model to assess whether postconference speaker evaluations were associated with image fraction (percentage of image-based slides per presentation) and text density (number of words per slide). A total of 105 unique lectures were given by 49 faculty members, and 1,222 evaluations (70.1% response rate) were available for analysis. On average, 47.4% (SD=25.36) of slides had at least one educationally-relevant image (image fraction). Image fraction significantly predicted overall higher evaluation scores [F(1, 100.676)=6.158, p=0.015] in the mixed linear regression model. The mean (SD) text density was 25.61 (8.14) words/slide but was not a significant predictor [F(1, 86.293)=0.55, p=0.815]. Of note, the individual speaker [χ2 (1)=2.952, p=0.003] and speaker seniority [F(3, 59.713)=4.083, p=0.011] significantly predicted higher scores. This is the first published study to date assessing the linkage between slide design and CME speaker evaluations by an audience of practicing clinicians. The incorporation of images was associated with higher evaluation scores, in alignment with Mayer’s theory of multimedia learning. Contrary to this theory, however, text density showed no significant association, suggesting that these scores may be multifactorial. Professional development efforts should focus on teaching best practices in both slide design and presentation skills

    On the creation of a secure key enclave via the use of memory isolation in systems management mode

    Get PDF
    One of the challenges of modern cloud computer security is how to isolate or contain data and applications in a variety of ways, while still allowing sharing where desirable. Hardware-based attacks such as RowHammer and Spectre have demonstrated the need to safeguard the cryptographic operations and keys from tampering upon which so much current security technology depends. This paper describes research into security mechanisms for protecting sensitive areas of memory from tampering or intrusion using the facilities of Systems Management Mode. The work focuses on the creation of a small, dedicated area of memory in which to perform cryptographic operations, isolated from the rest of the system. The approach has been experimentally validated by a case study involving the creation of a secure webserver whose encryption key is protected using this approach such that even an intruder with full Administrator level access cannot extract the key

    On the creation of a secure key enclave via the use of memory isolation in systems management mode

    Get PDF
    One of the challenges of modern cloud computer security is how to isolate or contain data and applications in a variety of ways, while still allowing sharing where desirable. Hardware-based attacks such as RowHammer and Spectre have demonstrated the need to safeguard the cryptographic operations and keys from tampering upon which so much current security technology depends. This paper describes research into security mechanisms for protecting sensitive areas of memory from tampering or intrusion using the facilities of Systems Management Mode. The work focuses on the creation of a small, dedicated area of memory in which to perform cryptographic operations, isolated from the rest of the system. The approach has been experimentally validated by a case study involving the creation of a secure webserver whose encryption key is protected using this approach such that even an intruder with full Administrator level access cannot extract the key

    Application of neural networks and sensitivity analysis to improved prediction of trauma survival

    Get PDF
    Application of neural networks and sensitivity analysis to improved prediction of trauma surviva

    Near-Infrared Integral Field Spectroscopy of Damped Lyman-alpha Systems

    Full text link
    We assess the feasibility of detecting star formation in damped Lyman-alpha systems (DLAs) at z>1 through near-infrared spectroscopy using the forthcoming integral field units on 8m-class telescopes. Although their relation to galaxies is not well established, high-z DLAs contain most of the neutral gas in the Universe, and this reservoir is depleted with time - presumably through star formation. Line emission should be an indicator of star formation activity, but searches based on Lyman-alpha are unreliable because of the selective extinction of this resonant UV line. Using more robust lines such as H-alpha forces a move to the near-infrared at z>1. For line emission searches, spectroscopy is more sensitive than imaging, but previous long-slit spectroscopic searches have been hampered by the likelihood that any star forming region in the DLA galaxy disk would fall outside the narrow slit. The new integral field units such as CIRPASS on Gemini will cover sufficient solid angles to intercept these, even in the extreme case of large galactic disks at high redshift. On an 8m-class telescope, star formation rates of <1M_sun/yr will be reached at z~1.4 with H-alpha in the H-band. Such star formation rates are well below L* for the high-z Lyman-break population, and are comparable locally to the luminous giant HII complexes in M101. It appears that instruments such as CIRPASS on Gemini will have both the sensitivity and the survey area to measure star formation rates in z>1 DLAs. These observations will probe the nature of damped Lyman-alpha systems and address their relation to galaxies.Comment: To appear in the proceedings of the ESO/ECF workshop on "Deep Fields", 9-12 October 2000, Garching. 4 page

    Microstructural Correlates of Resilience against Major Depressive Disorder: Epigenetic Mechanisms?

    Get PDF
    Mental disorders are a major cause of long-term disability and are a direct cause of mortality, with approximately 800.000 individuals dying from suicide every year worldwide - a high proportion of them related to major depressive disorder (MDD)^1^. Healthy relatives of patients with major depressive disorder (MDD) are at risk to develop the disease. This higher vulnerability is associated with structural^2-4^ and functional brain changes^5^. However, we found using high angular resolution diffusion imaging (HARDI) with 61 diffusion directions that neuron tracts between frontal cortices and limbic as well as temporal and parietal brain regions are characterized by better diffusion coefficients in unaffected relatives (UHR), who managed to stay healthy, compared to healthy volunteers without any family history for a psychiatric disease (HC). Moreover, those UHR with stronger fibre connections better managed incidences of adversity in early life without later developing depression, while in HC axonal connections were found to be decreased when they had early-life adversity. Altogether these findings indicate the presence of stronger neural fibre connections in UHR, which seem to be associated with resilience against environmental stressors, which we suggest occur through epigenetic mechanisms

    Outcomes of elective induction of labour compared with expectant management: population based study

    Get PDF
    Objective To determine neonatal outcomes (perinatal mortality and special care unit admission) and maternal outcomes (mode of delivery, delivery complications) of elective induction of labour compared with expectant management

    What is campus bridging and what is XSEDE doing about it?

    Get PDF
    The term “campus bridging” was first used in the charge given to an NSF Advisory Committee for Cyberinfrastructure task force. That task force developed this description of campus bridging: “Campus bridging is the seamlessly integrated use of cyberinfrastructure operated by a scientist or engineer with other cyberinfrastructure on the scientist’s campus, at other campuses, and at the regional, national, and international levels as if they were proximate to the scientist, and when working within the context of a Virtual Organization (VO) make the ‘virtual’ aspect of the organization irrelevant (or helpful) to the work of the VO.” Campus bridging is more a viewpoint and a set of approaches to usability, software, and information concerns than a particular set of tools or software. We outline here several specific use cases that have been identified as priorities for XSEDE in the next four years. These priorities include documentation, deployment of software used entirely outside of XSEDE, and software that helps bridge from individual researcher to campus to XSEDE cyberinfrastructure. We also describe early pilot tests and means by which the user community may stay informed of campus bridging activities and participate in the implementation of Campus Bridging tools created by XSEDE. Metrics are still being developed, and will include (1) the number of campuses that adopt and use Campus Bridging tools developed by XSEDE and (2) the number of and extent to which XSEDE-developed Campus Bridging tools are adopted among other CI projects.The work described here was supported by National Science Foundation Award Nos. 0932251, 0503697, 1002526, 1059812, 1040777, 0723054, 0521433, and 0504075
    • 

    corecore