5,482 research outputs found

    HepData and JetWeb: HEP data archiving and model validation

    Get PDF
    The CEDAR collaboration is extending and combining the JetWeb and HepData systems to provide a single service for tuning and validating models of high-energy physics processes. The centrepiece of this activity is the fitting by JetWeb of observables computed from Monte Carlo event generator events against their experimentally determined distributions, as stored in HepData. Caching the results of the JetWeb simulation and comparison stages provides a single cumulative database of event generator tunings, fitted against a wide range of experimental quantities. An important feature of this integration is a family of XML data formats, called HepML.Comment: 4 pages, 0 figures. To be published in proceedings of CHEP0

    HepForge: A lightweight development environment for HEP software

    Get PDF
    Setting up the infrastructure to manage a software project can become a task as significant writing the software itself. A variety of useful open source tools are available, such as Web-based viewers for version control systems, "wikis" for collaborative discussions and bug-tracking systems, but their use in high-energy physics, outside large collaborations, is insubstantial. Understandably, physicists would rather do physics than configure project management tools. We introduce the CEDAR HepForge system, which provides a lightweight development environment for HEP software. Services available as part of HepForge include the above-mentioned tools as well as mailing lists, shell accounts, archiving of releases and low-maintenance Web space. HepForge also exists to promote best-practice software development methods and to provide a central repository for re-usable HEP software and phenomenology codes.Comment: 3 pages, 0 figures. To be published in proceedings of CHEP06. Refers to the HepForge facility at http://hepforge.cedar.ac.u

    Attack tree analysis for insider threats on the IoT using Isabelle

    Get PDF
    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in “regular” organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and information flow. In this paper, we seek to illustrate and classify insider threats in relation to the IoT (by ‘smart insiders’), exhibiting attack vectors for their characterisation. To model the attacks we apply a method of formal modelling of Insider Threats in the interactive theorem prover Isabelle. On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack tree

    Eat Your Fruits and Veggies: Who Informs Consumers about Produce Choices and Nutrition?

    Get PDF
    Food consumption trends in the U.S. may be affected by and/or contributing to the growth in food- and nutrition-related information channels. Information channels are increasing in number, as are the sources (McCluskey & Swinnnen 2004) that provide information. This paper examines consumer perceptions of the relative desirability of various food and nutrition information sources and education methods as well as the relative credibility of various food and nutrition sources. Using data from a 2006 nationwide consumer survey, comparative summary statistics show significant differences between information delivery methods and sources that consumers use and trust. By understanding how consumers receive and value information we can better target consumer groups.Food Consumption/Nutrition/Food Safety,

    Design and development of a classification system for knowledge management tools and methods

    Get PDF
    Mechanical and manufacturing engineering (MME) organizations commonly recognize the value of their knowledge resources, yet most fail effectively to exploit these assets. Knowledge management (KM) solutions should provide the means for appropriate exploitation of the resources, but there are very few published KM implementations in MME contexts compared with the wealth of KM solutions published in other sectors. This paper demonstrates a methodology for the creation of a KM solution space based on the review, analysis, and characterization of 157 sources, including examples of KM problems within 55 companies from 16 different industry sectors. The example KM solution set can be used to identify appropriate tools to solve KM-related problems in many MME contexts

    Managing Ambiguity: Nurses Caring for the Mother of a Stillborn Baby

    Full text link
    Abstract Purpose: The aim of this study was to describe and conceptualize the experiences and processes involved when labor and delivery nurses provide care to women experiencing a stillbirth. Background: The care of a woman experiencing a stillbirth is an important topic that requires attention, however, there is a paucity of literature on the specifics of a nurse’s experience as she or he cares for a grieving mother. These experiences may shed light on gaps in care that may exist as well as gaps in the resources, education and support needed to appropriately prepare nurses for providing care to a mother at such a difficult and vulnerable time. Stillbirth is increasingly referred to in the literature as a traumatic death, unexpected and unplanned, resulting in post-traumatic stress responses. Understanding what the bedside nurse does, thinks, and feels during these moments of traumatic bereavement will contribute to a greater understanding of the nurse’s experience of providing care to a patient. Method: This study used a grounded theory approach. Data were collected via in-depth interviews with 20 labor and delivery nurses. Each interview session was recorded, transcribed verbatim, and analyzed using the constant comparative method of analysis. Results: Based on the inductive method of grounded theory and a thorough comparative analysis of the data, the theory Managing Ambiguity emerged as the basic social process of how nurses struggle to care for a mother whose baby was stillborn. This theoretical underpinning summed up the substance of what was occurring when nurses cared from a mother experiencing a stillbirth and was characterized in three different categories by labor and delivery nurses as Experiencing a spectrum of emotions, Managing the ambiguous patient, and Managing institutional ambiguity. These factors contributed to the overall ambiguity the nurse had to manage when providing care for the patient whose baby was stillborn and became the three main categories of the overall theory: Conclusions: This theory of Managing Ambiguity provided a perspective on the experiences, behaviors, and social processes involved in caring for a woman delivering a stillborn baby. This theory also provided insights into how the interactions between the nurse and herself, the nurse and the patient, and the nurse and her environment impacted the process and the meaning of the event. The importance of this study is the resulting understanding of factors that impede and enhance the process of providing care to a mother whose baby was stillborn. Feelings of uncertainty, ambiguity, and discomfort must be addressed at the nursing education and nursing leadership levels

    The Public Health Contribution to the Development of Policy for the Prevention of Violence and Abuse in England

    Get PDF
    Introduction: The aim was: “To document the process of policy development to prevent interpersonal violence in England, and explore the implications and potential role of public health”. Research gaps addressed include: an insider perspective of the policy process in general, and on the formulation process in particular. Violence and abuse are complex and challenging public health issues and wider lessons were drawn for public health. Methods: Qualitative research methods of documentary review, mapping and observation were used in the context of a case study of development of policy for violence prevention at regional and national levels in England from 2005- 2010. The research was based upon participatory observation methods as a public health advisor contributing to the policy process. In total 44 documents were reviewed and 157 meetings attended. Content and thematic analysis was conducted with violence, public health and policy frameworks followed by triangulation. Results: From initiation to publication, the policy process took ten years to complete (2003- 2012). Regional policy implementation contributed partially to national policy development. Networks and embedding within wider policy maintained the agenda. Evidence-based public health contributed to the policy, whilst, collaborative working, persistence and communication skills influenced uptake. Internal actors had the most power, especially the Prime-Ministers Office and the Home Office, whilst the Department of Health ensured development of the final policy. Senior leadership and champions drove the policy process and media reporting created windows of opportunity. Policy formulation revealed the importance of consensus and cyclical decision-making. Conclusions: Lessons include strengthening the art of public health: with clear leadership, communications and collaborative relationships, contributing to the uptake of evidence. Taking advantage of windows of opportunity and creating consensus is important for external actors. An integrated model of policy and the formulation process are presented to enhance understanding between policy and public health

    IL-10-conditioned dendritic cells, decommissioned for recruitment of adaptive immunity, elicit innate inflammatory gene products in response to danger signals

    Get PDF
    Dendritic cells (DCs) are the professional APCs of the immune system, enabling T cells to perceive and respond appropriately to potentially dangerous microbes, while also being able to maintain T cell tolerance toward self. In part, such tolerance can be determined by IL-10 released from certain types of regulatory T cells. IL-10 has previously been shown to render DCs unable to activate T cells and it has been assumed that this process represents a general block in maturation. Using serial analysis of gene expression, we show that IL-10 pretreatment of murine bone marrow-derived DCs alone causes significant changes in gene expression. Furthermore, these cells retain the ability to respond to Toll-like receptor agonists, but in a manner skewed toward the selective induction of mediators known to enhance local inflammation and innate immunity, among which we highlight a novel CXCR2 ligand, DC inflammatory protein-1. These data suggest that, while the presence of a protolerogenic and purportedly anti-inflammatory agent such as IL-10 precludes DCs from acquiring their potential as initiators of adaptive immunity, their ability to act as initiators of innate immunity in response to Toll-like receptor signaling is enhanced

    The technification of domestic abuse: Methods, tools and criminal justice responses

    Get PDF
    Methods of domestic abuse are progressively incorporating computer misuse and other related online offences and digital tools, escalating opportunities for perpetrators to monitor, threaten and humiliate their victims. Drawing on empirical research involving media case study analysis, a technology review and interviews undertaken with 21 professionals and service providers supporting domestic abuse victims, this article outlines the context in England and Wales regarding the methods, tools and criminal justice responses involved in what we conceptualise as the technification of domestic abuse. As technology continues to deeply intertwine with our daily lives, it is undeniable that its involvement within domestic abuse encompasses harmful behaviours that pose an increasing risk of harm, and unless effective criminal justice interventions are implemented, this risk will inevitably grow even further

    Juvenile Corrections in the Era of Reform: A Meta-Synthesis of Qualitative Studies

    Get PDF
    In this article, the authors synthesize knowledge from select qualitative studies examining rehabilitation-oriented juvenile residential corrections and aftercare programs. Using meta-synthesis methodology, the authors extracted and coded content from 10 research studies conducted by five authors across criminology, sociology, and social welfare disciplines. The total number of published works based on those studies analyzed was 18. Collectively, these studies offer insight into three major components of the juvenile correctional experience: therapeutic treatment and evidence-based practices, the shaping of identities and masculinities, and preparation for reentry. This analysis is particularly important as the United States is currently in an era of reform during which policymakers are increasingly espousing the benefits of rehabilitation for youth offenders over punishment. These studies took place before, during, and after this era of reform, and yet, the findings are surprisingly consistent over time, raising key questions about the effectiveness of the reform strategies
    corecore