362 research outputs found

    Computer automation of ultrasonic testing

    Get PDF
    Report describes a prototype computer-automated ultrasonic system developed for the inspection of weldments. This system can be operated in three modes: manual, automatic, and computer-controlled. In the computer-controlled mode, the system will automatically acquire, process, analyze, store, and display ultrasonic inspection data in real-time. Flaw size (in cross-section), location (depth), and type (porosity-like or crack-like) can be automatically discerned and displayed. The results and pertinent parameters are recorded

    Μελέτη επιπτώσεων συνδρομολόγησηςεφαρμογών σε πολυπύρηνες αρχιτεκτονικές

    Get PDF
    Understanding viral transmission dynamics within populations of reservoir hosts can facilitate greater knowledge of the spillover of emerging infectious diseases. While bat-borne viruses are of concern to public health, investigations into their dynamics have been limited by a lack of longitudinal data from individual bats. Here, we examine capture-mark-recapture (CMR) data from a species of Australian bat (Myotis macropus) infected with a putative novel Alphacoronavirus within a Bayesian framework. Then, we developed epidemic models to estimate the effect of persistently infectious individuals (which shed viruses for extensive periods) on the probability of viral maintenance within the study population. We found that the CMR data analysis supported grouping of infectious bats into persistently and transiently infectious bats. Maintenance of coronavirus within the study population was more likely in an epidemic model that included both persistently and transiently infectious bats, compared with the epidemic model with non-grouping of bats. These findings, using rare CMR data from longitudinal samples of individual bats, increase our understanding of transmission dynamics of bat viral infectious diseases

    Together forever? Explaining exclusivity in party-firm relations

    Get PDF
    Parties and firms are the key actors of representative democracy and capitalism respectively and the dynamic of attachment between them is a central feature of any political economy. This is the first article to systematically analyse the exclusivity of party-firm relations. We consider exclusivity at a point in time and exclusivity over time. Does a firm have a relationship with only one party at a given point in time, or is it close to more than one party? Does a firm maintain a relationship with only one party over time, or does it switch between parties? Most important, how do patterns of exclusivity impact on a firm’s ability to lobby successfully? We propose a general theory, which explains patterns of party-firm relations by reference to the division of institutions and the type of party competition in a political system. A preliminary test of our theory with Polish survey data confirms our predictions, establishing a promising hypothesis for future research

    An exploratory study on the potential of social enterprise to act as the institutional glue of network governance

    Get PDF
    This study combines two topics of contemporary salience for public administration: social enterprise and governance networks. While operating at different levels, both are institutions which attempt to draw together the three pillars of state, market, and civil society. Nevertheless, the respective literatures focus on particular aspects of the three pillars. We connect the two concepts and suggest that some social enterprises can act as the institutional glue of networks due to their ability to benefit organizations in each of the three sectors. This requires social enterprises to have the managerial capacity to diffuse social know-how, and is facilitated by the trust of other organizations and a supportive policy framework. The links are explicated at the conceptual level before providing evidence from South Korea and the UK. Finally, research propositions are offered, which suggest new avenues for future research

    A Phase 3 Trial of 2 Years of Androgen Suppression and Radiation Therapy With or Without Adjuvant Chemotherapy for High-Risk Prostate Cancer: Final Results of Radiation Therapy Oncology Group Phase 3 Randomized Trial NRG Oncology RTOG 9902.

    Get PDF
    PURPOSE: Long-term (LT) androgen suppression (AS) with radiation therapy (RT) is a standard treatment of high-risk, localized prostate cancer (PCa). Radiation Therapy Oncology Group 9902 was a randomized trial testing the hypothesis that adjuvant combination chemotherapy (CT) with paclitaxel, estramustine, and oral etoposide plus LT AS plus RT would improve overall survival (OS). METHODS AND MATERIALS: Patients with high-risk PCa (prostate-specific antigen 20-100 ng/mL and Gleason score [GS] ≥ 7 or clinical stage ≥ T2 and GS ≥ 8) were randomized to RT and AS (AS + RT) alone or with adjuvant CT (AS + RT + CT). CT was given as four 21-day cycles, delivered beginning 28 days after 70.2 Gy of RT. AS was given as luteinizing hormone-releasing hormone for 24 months, beginning 2 months before RT plus an oral antiandrogen for 4 months before and during RT. The study was designed based on a 6% improvement in OS from 79% to 85% at 5 years, with 90% power and a 2-sided alpha of 0.05. RESULTS: A total of 397 patients (380 eligible) were randomized. The patients had high-risk PCa, 68% with GS 8 to 10 and 34% T3 to T4 tumors, and median prostate-specific antigen of 22.6 ng/mL. The median follow-up period was 9.2 years. The trial closed early because of excess thromboembolic toxicity in the CT arm. The 10-year results for all randomized patients revealed no significant difference between the AS + RT and AS + RT + CT arms in OS (65% vs 63%; P=.81), biochemical failure (58% vs 54%; P=.82), local progression (11% vs 7%; P=.09), distant metastases (16% vs 14%; P=.42), or disease-free survival (22% vs 26%; P=.61). CONCLUSIONS: NRG Oncology RTOG 9902 showed no significant differences in OS, biochemical failure, local progression, distant metastases, or disease-free survival with the addition of adjuvant CT to LT AS + RT. The trial results provide valuable data regarding the natural history of high-risk PCa treated with LT AS + RT and have implications for the feasibility of clinical trial accrual and tolerability using CT for PCa

    How and When Socially Entrepreneurial Nonprofit Organizations Benefit From Adopting Social Alliance Management Routines to Manage Social Alliances?

    Get PDF
    Social alliance is defined as the collaboration between for-profit and nonprofit organizations. Building on the insights derived from the resource-based theory, we develop a conceptual framework to explain how socially entrepreneurial nonprofit organizations (SENPOs) can improve their social alliance performance by adopting strategic alliance management routines. We test our framework using the data collected from 203 UK-based SENPOs in the context of cause-related marketing campaign-derived social alliances. Our results confirm a positive relationship between social alliance management routines and social alliance performance. We also find that relational mechanisms, such as mutual trust, relational embeddedness, and relational commitment, mediate the relationship between social alliance management routines and social alliance performance. Moreover, our findings suggest that different types of social alliance motivation can influence the impact of social alliance management routines on different types of the relational mechanisms. In general, we demonstrate that SENPOs can benefit from adopting social alliance management routines and, in addition, highlight how and when the social alliance management routines–social alliance performance relationship might be shaped. Our study offers important academic and managerial implications, and points out future research directions

    What does security culture look like for small organizations?

    No full text
    The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and for whom the culture of the organization exerts a strong influence. A review of multiple definitions and descriptions of security culture was made to assess and analyse the drivers and influences that exist for security culture in small organizations. An initial representation of the factors that should drive security culture, together with those that should only influence it, was constructed. At a fundamental level these drivers are related to a formulated response to security issues rather than a reaction to it, and should reflect the responsibility allocated in a secure environment. In contrast, the influences on security culture can be grouped by communities of practice, individual awareness and organizational management. The encapsulation of potential driving and influencing factors couched in information security terms rather than behavioural science terms, will allow security researchers to investigate how a security culture can be fostered to improve information security in small organizations
    corecore