80 research outputs found

    Ten years: History and principles of the left opposition

    Get PDF
    https://stars.library.ucf.edu/prism/1308/thumbnail.jp

    Preternatural Fauna

    Get PDF
    Not Include

    The Phony War 1939-1940

    Get PDF

    A Stochastic Model to Measure Patient Effects Stemming from Hospital-Acquired Infections

    Get PDF
    We introduce a Markov chain model to represent a patient's path in terms of the number and type of infections sjhe may have acquired during a hospitalization period. The model allows for categories of patient diagnoses, surgery, the four major types of nosocomial (hospital-acquired) infections and discharqe or death. Data from a national medical records survey including 58,647 patients enable us to estimate transition probabilities and, ultimately, perform statistical tests of fit, including a validation test. Novel parameterizations (functions of the transition matrix) are introduced to answer research questions on timedependent infection rates, time to discharge or death as a function of patient characteristics at admission"and conditional infection rates reflecting intervening variables (e.g., surgery)

    A review of cyber threats and defence approaches in emergency management

    Get PDF
    Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature

    The Technological culture of war

    Get PDF
    The article proceeds from the argument that war is a social institution and not a historical inevitability of human interaction, that is, war can be “unlearned.” This process involves deconstructing/dismantling war as an institution in society. An important step in this process is to understand the philosophical and cultural bases on which technology is employed as “tools” of war. The article focuses on such questions as, Is technology just viewed as instruments in the hand of its human masters in war? Does technology take on an autonomous role in war? How should we assess the impact of context (political, economic, and cultural) of technology when employed in war? By exploring these points, the article hopes to provide input into the discussion on the control of war technologies and ultimately the dismantling of war as an institution in society

    Other Federal Activities

    Get PDF
    published or submitted for publicatio

    Absolute zero and the conquest of cold

    No full text
    • …
    corecore