3,585 research outputs found

    Evaluation of a risk assessment system for heritage railway earthworks

    Get PDF
    There are currently over 100 heritage railways in the UK carrying 6.8 million passengers on 15 million passenger journeys and contributing an estimated £579 million to the UK economy. Many of these lines include significant earthworks, which present a considerable risk to their safe operation. In the last decade there have been major slips at several heritage railways causing major disruption to operations and a serious threat to business continuity. This research describes the application of a risk assessment system based on that used by Network Rail but specifically adapted for heritage railway conditions. Adaptations include significant alterations to the consequence categories used in prioritization of earthwork issues and a simple low-cost method of implementation based on paper forms and Excel spreadsheets. Use of the system on two heritage railways, the Bo’ness and Kinneil Railway and the Strathspey Railway is evaluated by means of discussion with railway engineering staff and civil engineering volunteers. It is concluded that whilst the system represents a realistic and useful approach to management of earthwork assets, the system could not be used by heritage railway volunteer staff without targeted training. Such training, however, would be straightforward to provide, perhaps under the auspices of the Heritage Railway Association

    Children's understanding of homonymy: metalinguistic awareness and false belief

    Get PDF
    The aim of this study was to explain why children have difficulty with homonymy. Two experiments were conducted with forty-eight children (Experiment 1) and twenty-four children (Experiment 2). Three- and four-year-old children had to either select or judge another person's selection of a different object with the same name, avoiding identical objects and misnomers. Older children were successful, but despite possessing the necessary vocabulary, younger children failed these tasks. Understanding of homonymy was strongly and significantly associated to understanding of synonymy, and more importantly, understanding of false belief, even when verbal mental age, chronological age, and control measures were partialled out. This indicates that children's ability to understand homonymy results from their ability to make a distinction characteristic of representation, a distinction fundamental to both metalinguistic awareness and theory of mind

    Children's difficulty in learning homonyms

    Get PDF
    Mazzocco (1997) claimed that children have persistent difficulty in learning pseudo-homonyms – words like rope used to refer to a novel object (e.g. spade). Because the novel objects were familiar, the pseudohomonyms in her study were also synonyms (i.e. rope and spade both now mean spade). The results could therefore be due to children’s well-known difficulties in learning synonyms. In Experiment 1, 55 six- to ten-year-olds used story context to select referents for pseudo-homonyms from picture sets containing the intended referents, with primary referents amongst the distractors. Children were equally poor when the intended referents were familiar (e.g. spade) as when they were unfamiliar (e.g. tapir) – 35 and 38% correct, respectively. This indicates that familiarity of referent does not account for children’s difficulties. In Experiment 2, 64 five- to ten-year-olds received instruction about homonymy, then a story set without pictures of the primary referents, in order to make the experimenter’s intentions clear. Children were then shown one of the story sets from Experiment 1. Performance was just as poor (38% correct), indicating that misunderstanding of task demands did not account for failure. The conclusion is that Mazzocco’s findings represent a psychologically interesting developmental difficulty

    Algorithms for assessing the probability of an Adverse Drug Reaction

    Get PDF
    AbstractAdverse Drug Reactions (ADRs) are common and are associated with significant risk of morbidity, mortality and admission to hospital. Deciding if a clinical event is an Adverse Drug Reaction, or not, can be difficult. The decision is often based on clinical judgment alone, yet studies have shown that decisions based on clinical judgment often vary greatly between raters.Therefore a number of decision aids or Algorithms have been developed to try and improve this variability. Studies have shown that the use of algorithms does improve the between and within rater agreement significantly, and gives a semi-quantitative measure of the likelihood of causality. There are variations between these algorithms but none of them can in themselves prove or disprove causality. These algorithms, their benefits and their problems will be discussed in this article

    Supporting security-oriented, collaborative nanoCMOS electronics research

    Get PDF
    Grid technologies support collaborative e-Research typified by multiple institutions and resources seamlessly shared to tackle common research problems. The rules for collaboration and resource sharing are commonly achieved through establishment and management of virtual organizations (VOs) where policies on access and usage of resources by collaborators are defined and enforced by sites involved in the collaboration. The expression and enforcement of these rules is made through access control systems where roles/privileges are defined and associated with individuals as digitally signed attribute certificates which collaborating sites then use to authorize access to resources. Key to this approach is that the roles are assigned to the right individuals in the VO; the attribute certificates are only presented to the appropriate resources in the VO; it is transparent to the end user researchers, and finally that it is manageable for resource providers and administrators in the collaboration. In this paper, we present a security model and implementation improving the overall usability and security of resources used in Grid-based e-Research collaborations through exploitation of the Internet2 Shibboleth technology. This is explored in the context of a major new security focused project at the National e-Science Centre (NeSC) at the University of Glasgow in the nanoCMOS electronics domain

    Do infants understand that external goals are internally represented?

    Get PDF
    Evidence for infants’ sensitivity to behavior being goal oriented leaves it open as to whether they see such behavior as being designed to lead to an external goal or whether they see it, in addition, as being directed by an internal representation of the goal. We point out the difficulty of finding possible criteria for how infants or children view this matter

    Mental files: Developmental integration of dual naming and theory of mind

    Get PDF
    We use mental files theory to provide an integral theory of children’s diverse dual naming problems and why these problems are overcome when children pass the false belief test. When an object is encountered under different appearances or given different verbal labels, two distinct representations (mental files) may be deployed for that single object. The resulting files refer to the same object but capture different perspectives on the object. Such coreferential files can thus be used to represent people’s differing perspectives (e.g., belief). Typically the existence of different files indicates the existence of two separate objects. To mark that only a single object is involved, coreferential files need to be linked. Development of the ability to link files provides a powerful developmental explanation for success on dual labelling and perspective tasks at the same age, around 4 years: processing identity statements, overcoming mutual exclusivity (accepting different labels for an object), visual perspective taking, and understanding differences of belief. Mental files also provide a new framework for understanding conceptual pacts and their relation to mutual exclusivity in children and adults

    Federated authentication and authorisation for e-science

    Get PDF
    The Grid and Web service community are defining a range of standards for a complete solution for security. The National e-Science Centre (NeSC) at the University of Glasgow is investigating how the various pre-integration components work together in a variety of e-Science projects. The EPSRC-funded nanoCMOS project aims to allow electronics designers and manufacturers to use e-Science technologies and expertise to solve problems of device variability and its impact on system design. To support the security requirements of nanoCMOS, two NeSC projects (VPMan and OMII-SP) are providing tools to allow easy configuration of security infrastructures, exploiting previous successful projects using Shibboleth and PERMIS. This paper presents the model in which these tools interoperate to provide secure and simple access to Grid resources for non-technical users
    • 

    corecore