WiPo for SAR

Author(s):  
Karyn Rastrick ◽  
Florian Stahl ◽  
Gottfried Vossen ◽  
Stuart Dillon

WiPo (Web in your pocket) is a prototypical mobile information provisioning concept that can offer potential benefits to a range of situations where data sources are vast, dynamic and unvalidated and where continuous Internet connectivity cannot be assured. One such case is that of search and rescue (SAR), a unique case of emergency management characterized by the need for high-quality, accurate and time-sensitive information. This paper reports on empirical research undertaken to explore the potential for a real-world application of a mobile service such as WiPo which is based on the delivery of highly curated, multi-source data made available offline. Adopting an interpretive interview-based approach, the authors evaluate the potential usefulness of WiPo for search and rescue incidents in New Zealand. Upon learning of the core functionality of WiPo and the alignment of that with the typical search and rescue situation, study participants were unanimously positive about its potential for improving search and rescue management and outcomes.

Author(s):  
Karyn Rastrick ◽  
Florian Stahl ◽  
Gottfried Vossen ◽  
Stuart Dillon

WiPo (Web in your pocket) is a prototypical mobile information provisioning concept that can offer potential benefits to a range of situations where data sources are vast, dynamic and unvalidated and where continuous Internet connectivity cannot be assured. One such case is that of search and rescue (SAR), a unique case of emergency management characterized by the need for high-quality, accurate and time-sensitive information. This paper reports on empirical research undertaken to explore the potential for a real-world application of a mobile service such as WiPo which is based on the delivery of highly curated, multi-source data made available offline. Adopting an interpretive interview-based approach, the authors evaluate the potential usefulness of WiPo for search and rescue incidents in New Zealand. Upon learning of the core functionality of WiPo and the alignment of that with the typical search and rescue situation, study participants were unanimously positive about its potential for improving search and rescue management and outcomes.


Author(s):  
I. Murph ◽  
M. McDonald ◽  
K. Richardson ◽  
M. Wilkinson ◽  
S. Robertson ◽  
...  

Within distracting environments, it is difficult to maintain attentional focus on complex tasks. Cognitive aids can support attention by adding relevant information to the environment, such as via augmented reality (AR). However, there may be a benefit in removing elements from the environment, such as irrelevant alarms, displays, and conversations. De-emphasis of distracting elements is a type of AR called Diminished Reality (DR). Although de-emphasizing distraction may help focus on a primary task, it may also reduce situational awareness (SA) of other activities that may become relevant. In the current study, participants will assemble a medical ventilator during a simulated emergency while experiencing varying levels of DR. Participants will also be probed to assess secondary SA. We anticipate that participants will have better accuracy and completion times in the full DR conditions but their SA will suffer. Future applications include the design of future DR systems and improved training methods.


Author(s):  
Jiawei Wang ◽  
Yong-Yi Wang ◽  
William A. Bruce ◽  
Steve Rapp ◽  
Russell Scoles

Abstract Construction of a cross-country pipeline involves lifting the pipeline off the skids and lowering it into the trench (lifting and lowering-in). This can introduce the highest stress magnitude that the pipe may experience over its service life. If not managed properly, overly high stresses may cause integrity issues during construction and/or service. If the girth welds are qualified and accepted using alternative flaw acceptance criteria, such as those in API 1104 Annex A and CSA Z662 Annex K, these stresses must be kept below a preset level during lifting and lowering-in to satisfy the requirements of those standards. This paper covers the development and usage of a stress analysis tool for the continuous lifting and lowering-in of pipe strings without a concrete coating or river weights. The outcome of the stress analysis can be used to develop lifting and lowering-in plans for construction crews. The core functionality of the application tool is to calculate the stresses from bending in the vertical and horizontal planes. The stresses from vertical bending are derived from an extensive analysis of continuous lifting and lowering-in processes. The stresses from horizontal bending are calculated using closed-form analytical solutions. The tool provides a graphical interface that interprets the background stress analysis results and displays information necessary for the development of lifting and lowering-in plans. The tool can be used to evaluate what-if scenarios for various tentative lifting and lowering-in scenarios. The process of using the tool to develop lifting and lowering-in plans is demonstrated in this paper through an example problem. The number of sidebooms and other lifting and lowering-in parameters such as sideboom spacing and lifting height range are changed to make the lifting and lowering-in plan easy to use for the laying contractors. Such tradeoffs can be addressed proactively with construction contractors to ensure that a mutually acceptable approach to lifting and lowering-in is taken.


2018 ◽  
Vol 8 (2) ◽  
pp. 47-65 ◽  
Author(s):  
Ubaidullah Alias Kashif ◽  
Zulfiqar Ali Memon ◽  
Shafaq Siddiqui ◽  
Abdul Rasheed Balouch ◽  
Rakhi Batra

This article describes how the enormous potential benefits provided by the cloud services, made enterprises to show huge interest in adopting cloud computing. As the service provider has control over the entire data of an organization stored onto the cloud, a malicious activity, whether internal or external can tamper with the data and computation. This causes enterprises to lack trust in adopting services due to privacy, security and trust issues. Despite of having such issues, the consumer has no root level access right to secure and check the integrity of procured resources. To establish a trust between the consumer and the provider, it is desirable to let the consumer to check the procured platform hosted at provider side for safety and security. This article proposes an architectural design of a trusted platform for the IaaS cloud computing by the means of which the consumer can check the integrity of a guest platform. TCG's TPM is deployed and used on the consumer side as the core component of the proposed architecture and it is distributed between the service provider and the consumer.


2017 ◽  
Vol 8 (1) ◽  
pp. 52 ◽  
Author(s):  
Amir H. Abdalla

The purpose of this study is to investigate the potential benefits of using the intercultural approach to teaching English as a foreign language in the preparatory –year programme (male branch), Taif University, Kingdom of Saudi Arabia. The intercultural approach is considered a viable means of foreign language education that seeks to address issues of culture in foreign language learning and teaching and how best to address them. Hence, this study intends to explore the attitudes of first year EFL Taif university students to the potential benefits of the intercultural approach to EFL. A sample of 200 EFL students participated in the study. Participants’ views on the topic of the study are collected via a questionnaire the researcher designed and administered to the participants. In addition, the views of 50 EFL instructors teaching in the preparatory programme were gathered by a questionnaire regarding the topic researched. Descriptive statistics were used to analyse the collected data.


2019 ◽  
Vol 214 ◽  
pp. 06027
Author(s):  
Adrian Bevan ◽  
Thomas Charman ◽  
Jonathan Hays

HIPSTER (Heavily Ionising Particle Standard Toolkit for Event Recognition) is an open source Python package designed to facilitate the use of TensorFlow in a high energy physics analysis context. The core functionality of the software is presented, with images from the MoEDAL experiment Nuclear Track Detectors (NTDs) serving as an example dataset. Convolutional neural networks are selected as the classification algorithm for this dataset and the process of training a variety of models with different hyper-parameters is detailed. Next the results are shown for the MoEDAL problem demonstrating the rich information output by HIPSTER that enables the user to probe the performance of their model in detail.


Author(s):  
Diane C. Davis ◽  
Minal Thakkar

The need to adopt an electronic health record (EHR) system in United States (U.S.) hospitals seems to be more and more obvious when evaluating the benefits of improved patient safety, quality of care, and efficiency. The purpose of the study was to identify the status of EHR systems in U.S. hospitals in regard to the core functionalities implemented (as identified by the Institute of Medicine) and to determine if there was a significant relationship between perceived level of benefit and risk with the use of each core functionality, as well as if there was a significant relationship between the status of the EHR system and size of hospital. A national survey of U.S. hospitals was conducted to answer the research questions. The results showed that 37% had some components in all.of the core functionalities of an EHR system, while 27% were using at least some functionalities. Health information and data, administrative processes, and results management were the three core functionalities that a majority of hospitals had as a part of their EHR system. A significant positive correlation between perceived benefits and risks was found in all of the eight core functionalities. There was no significant relationship found between status of EHR system and size of hospitals.


2020 ◽  
pp. 026377582095870
Author(s):  
Laura Schack ◽  
Ashley Witcher

Civil society actors aiding border crossers in Europe have been subject to systematic criminalization through prosecutions and attempted prosecutions, extensive police harassment, public scapegoating, and the imposition of bureaucratic barriers. We seek to explain why this is occurring through the analysis of field research data, collected in Greece between 2017 and 2019, through the lens of Derrida’s concept of “hostile hospitality”. We develop a theoretical framework with three key features: first, the demarcation between insider and outsider which lies at the core of notions of hospitality; second, the constitutive relationship between hostility and hospitality which is closely related to notions of sovereignty; and third, the primacy of state definitions of hospitality, which subordinate private and collective hospitality practices. This explanatory framework guides the analysis of two case studies from our fieldwork: the criminalization of solidarity initiatives providing accommodation in squats in Athens and Pikpa camp on Lesvos, and the criminalization of boat-spotting and search and rescue activities on Lesvos. We conclude that civil society actors aiding border crossers in Greece are criminalized because they challenge and interfere with state policies and practices of hostile hospitality.


2018 ◽  
Vol 2 (2) ◽  
Author(s):  
Lisa H Gren ◽  
Rachel Jaggi ◽  
Caren J Frost ◽  
Scott Benson

In a study of dietary supplementation among women in Ghana, a disproportionately high number of pregnant study participants were found to no longer be pregnant, leading researchers to suspect that the very early identification of pregnancy status made possible by study participation may have contributed to an elevated incidence of elective abortion among study participants. While abortion is legal in Ghana under certain circumstances, misinformation regarding its legality and persistent stigmatization result in many Ghanaian women choosing abortion methods that are unsafe and often illegal. While the study of the potential benefits of dietary supplementation during pregnancy initially appeared to pose very little risk to participants, the unintended and unforeseen consequence of unsafe abortions required researchers to reevaluate study protocol. In the following discussion of this case, we explore the ethical considerations researchers must address when unintended consequences emerge in global health research. 


2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Demetris Avraam ◽  
Rebecca Wilson ◽  
Oliver Butters ◽  
Thomas Burton ◽  
Christos Nicolaides ◽  
...  

AbstractData visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be concealed in tabulated data. In disciplines like medicine and the social sciences, where collected data include sensitive information about study participants, the sharing and publication of individual-level records is controlled by data protection laws and ethico-legal norms. Thus, as data visualizations – such as graphs and plots – may be linked to other released information and used to identify study participants and their personal attributes, their creation is often prohibited by the terms of data use. These restrictions are enforced to reduce the risk of breaching data subject confidentiality, however they limit analysts from displaying useful descriptive plots for their research features and findings.Here we propose the use of anonymization techniques to generate privacy-preserving visualizations that retain the statistical properties of the underlying data while still adhering to strict data disclosure rules. We demonstrate the use of (i) the well-known k-anonymization process which preserves privacy by reducing the granularity of the data using suppression and generalization, (ii) a novel deterministic approach that replaces individual-level observations with the centroids of each k nearest neighbours, and (iii) a probabilistic procedure that perturbs individual attributes with the addition of random stochastic noise. We apply the proposed methods to generate privacy-preserving data visualizations for exploratory data analysis and inferential regression plot diagnostics, and we discuss their strengths and limitations.


Sign in / Sign up

Export Citation Format

Share Document