1,658 research outputs found

    Application of Shower Theory to High Energy Total Absorption Čerenkov Radiation Counter

    Get PDF
    Theoretical calculations describing the performance of a Čerenkov counter designed as a total absorption gamma ray spectrometer for the energy range 100-1000 Msv are presented, using approximation A from the standard shower theory, and R. Wilson\u27s quasi-analytical method of cascade shower analysis

    Belly-case

    Get PDF
    THE man in the bed beside me was going to die. The nurses knew there was nothing that could be done for him, and most of the patients knew it too. All day long he had lain there straining, and trying to breathe. Sweat rolled down his face and he caught his breath with a high, sucking sound..

    Dataset on the in-stream and off-stream economic value of water

    Get PDF
    This dataset contains 706 estimates of the economic value of water; it has been compiled from published sources. Economic values are provided for three off-stream uses (agriculture/irrigation, industry, and municipal) and three in-stream ecosystem services (recreation, waste assimilation, and wildlife habitat). The dataset covers per period and capitalised asset values. All value estimates have been standardised in USD (2014) per acre-foot. The data accompanies the research article entitled “Shifting from volume to economic value in virtual water allocation problems: a proposed new framework and methodology” [1]. The dataset can be used to facilitate benefits (or value) transfer

    Prospect Theory and Information Security Investment Decisions

    Get PDF
    Most articles that discuss the economics of security focus on the use of rational choice decision models for evaluating investment alternatives. However, security investment decisions involve risk and several researchers have noted that risk related decisions often violate the fundamental principles of rational choice decision models. Accordingly, we assert that problems exist with using these models to explain security investment decisions. Further, we believe that the development of prescriptive models to guide investment decisions requires a deeper understanding of the cognitive processes involved. To test these ideas, we introduce a study that uses prospect theory to analyze security practitioners’ investment decisions. The article includes a discussion of our methodology to electronically assess security practitioners’ preference patterns. Additionally, we discuss data collection efforts which are currently in-process and future plans to analyze the collected data. Interim analytical results of data received prior to AMCIS 2012 will be presented to conference attendees

    Next Steps in Discovery Implementation: User‐Centered Discovery System Redesign

    Get PDF
    This paper will discuss a discovery system redesign project at the University of Houston Libraries, and in particular the Discovery Redesign Team’s collaborative, user‐centered approach. Throughout the redesign process, the team collected information about the needs and expectations of internal and external users regarding the Library’s discovery system. The team worked with two internal working groups to gather and evaluate the collected information. The results of this evaluation were used to make user‐centered design decisions. The Discovery Redesign Team worked with the Discovery Advisory Group, made up of library employees from various departments, to seek feedback and suggestions throughout the redesign process. Working collaboratively with this Group informed design decisions made by the team while also generating buy‐in for the discovery redesign. The team worked with the Discovery Usability Group to collect information from end‐users to inform the Team’s design decisions. The Committee held focus groups with the Library Information Desk staff to learn how the discovery system was serving users, and where it was falling short; they conducted usability tests with students to find out where users were experiencing breakdowns while completing common tasks. The methodologies and findings of the team’s various activities will be discussed. Changes to system interfaces affect both internal and external users. The University of Houston’s discovery system redesign is an example of a successful, user‐centered, collaborative design project

    Taming the Wilde: Collaborating with Expertise for Faster, Better, Smarter Collection Analysis

    Get PDF
    The importance of collection assessment and evaluation has been a hot topic due to increasing budget restrictions and the need to prove worth to stakeholders through evidence‐based evaluations. More robust collection analyses, like comparisons of holdings usage to ILL requests, and gap analyses, are increasingly embraced by the library community. Less thought, however, has been given to how to best conduct these analyses to ensure that the cleanest data is used and that the data tells the right story. The data to do these types of analyses often reside in complex systems and web‐environments, which may not be fully understood by the collection managers or subject librarians. The University of Houston Libraries embarked on a largescale gap analysis of the collection by subject area. The key component to success was quickly, accurately, and properly mining the data sources such as Sierra and the electronic resource management system. Our collection team contends that collaboration with expertise in the Resource Discovery Systems Department allowed the team to more quickly develop complete and accurate datasets, and helped to shape the analysis conducted. This paper discusses the challenges of defining project scope, the process of forming methodology, and the challenges of collecting the data. It will also review how experts were able to contribute to each step of this process. Finally it will outline some initial findings of the analysis, and how this research was accomplished in a realistic time frame
    • 

    corecore