Advanced Bridge Automation

1993 ◽  
Vol 30 (04) ◽  
pp. 276-285
Author(s):  
Edward Denham

The past thirty years have seen great advances in many areas of the technologies used in naval vessels. Propulsion systems, machinery automation, and information management systems have all undergone revolutionary changes. The bridges of these ships have similarly seen the advent of many new sources of navigational and environmental data. The process of correlating and interpreting all of this information has until now remained very labor-intensive, subject to human error at many stages of the process. In response to this challenge, a suite of new equipment has been developed for distributing, displaying, correlating, and logging shipboard data. This equipment automates most of the low-level, routine tasks involved in navigating a vessel at sea, significantly reducing the stress and workload of bridge personnel. This gives the humans on the bridge more time for doing the job that they do so much better than machines: making decisions. This paper focuses on the key technologies that are used in these new products and the advances in bridge design and automation they make possible. The benefits of these new capabilities to system designers, to shipbuilders, and to ship operators are also explored.

AERA Open ◽  
2019 ◽  
Vol 5 (4) ◽  
pp. 233285841988889 ◽  
Author(s):  
Joseph R. Cimpian ◽  
Jennifer D. Timmer

Although numerous survey-based studies have found that students who identify as lesbian, gay, bisexual, or questioning (LGBQ) have elevated risk for many negative academic, disciplinary, psychological, and health outcomes, the validity of the types of data on which these results rest have come under increased scrutiny. Over the past several years, a variety of data-validity screening techniques have been used in attempts to scrub data sets of “mischievous responders,” youth who systematically provide extreme and untrue responses to outcome items and who tend to falsely report being LGBQ. We conducted a preregistered replication of Cimpian et al. with the 2017 Youth Risk Behavior Survey to (1) estimate new LGBQ-heterosexual disparities on 20 outcomes; (2) test a broader, mechanistic theory relating mischievousness effects with a feature of items (i.e., item response-option extremity); and (3) compare four techniques used to address mischievous responders. Our results are consistent with Cimpian et al.’s findings that potentially mischievous responders inflate LGBQ-heterosexual disparities, do so more among boys than girls, and affect outcomes differentially. For example, we find that removing students suspected of being mischievous responders can cut male LGBQ-heterosexual disparities in half overall and can completely or mostly eliminate disparities in outcomes including fighting at school, driving drunk, and using cocaine, heroin, and ecstasy. Methodologically, we find that some methods are better than others at addressing the issue of data integrity, with boosted regressions coupled with data removal leading to potentially very large decreases in the estimates of LGBQ-heterosexual disparities, but regression adjustment having almost no effect. While the empirical focus of this article is on LGBQ youth, the issues discussed are relevant to research on other minority groups and youth generally, and speak to survey development, methodology, and the robustness and transparency of research.


Author(s):  
Shuichi Fukuda

Our traditional machines are operated by commands. But Increasing diversification and frequent changes in our environments make it more and more difficult for a designer to foresee the operating conditions. Therefore, designs are shifting from designer-centric to user-centric, because it is a user who knows the situation and can make decisions what he or she should do. So now machines should be designed to help a user understand the current situation better and to help him or her make better decisions. They need more flexibility to work better together with its user. But there are many examples, where although a machine is equipped with a wide variety of functions to cope with almost all sorts of situations, accidents occur due to a human error. Such typical case is CFIT (Controlled Flight into terrain) [1] in airplanes. Norman pointed out that simple mechanical objects can be trusted because their behaviors are so simple people know how to operate them. But machines are getting more and more complicated so a user does not know what to expect from them. And if it does not react to his or her expectations, a user sometimes gets very much emotionally upset and gets panicked. How can we solve this problem? A solution may be found in software development. Software was produced in the past just in the same way as hardware, with their functions fixed. But now software changed its product development style. Software first provides a user with simple functions and once he or she becomes familiar with this basic level of functions, it evolves to a little higher level. Through experience and feedback from a user, software evolves its function gradually and continually. It must be noted that most of our machines are not hardware or software alone. They are combinations of both. So we can develop such a machine which possesses a diversity of functions but reveals at the very early stage of operation a basic level of functions to a user, until he or she gets accustomed to it and puts confidence in it. And when he or she fully experiences this level and desires higher level functions, then the machine evolves. How a user cope with situations varies from user to user, but if a machine is customized this way, a user would trust our machines and would operate with full confidence in them.


2017 ◽  
Vol 35 (1) ◽  
pp. 71-90
Author(s):  
Thomas Corey Davis

Anesthesia information management systems (AIMS) are rapidly gaining widespread acceptance. Aggressively promoted as an improvement to manual-entry recordkeeping systems in the areas of accuracy, completeness, quality improvement, billing, and vigilance, these systems record all patient vital signs and parameters, providing a legible hard copy and permanent electronic record. With well-documented financial incentives, as well as government subsidies, AIMS are becoming adopted at an unprecedented rate. With the goals of the federal government to enhance the use of the electronic medical record, there is an emerging belief that AIMS may soon be mandated, with more limited choices than currently available. As assessed by, and often in spite of the published evidence, concerns of practitioners still reflect many of the same concerns expressed in the editorial comments of the past.


Author(s):  
Elias Pimenidis ◽  
Christos K. Georgiadis

Electronic Government applications have been the focus of hundreds of local and national government administrations all over the world during the past decade. The emphasis of most of these applications lies in their effort to improve the experience of the user in interacting with public administration services and to minimise waiting times in completing transactions public services and citizens. Early applications were relying mainly on the speed and simplicity of submitting a request by the user while most of the work beyond the web based interaction was carried out as in the era before the introduction of the web based applications. The benefits from such endeavours have been short lived as citizens are looking for real enhancements in the way public administration serves their needs and responds to their requests. The authors argue that for e-government applications to succeed, considerable changes in the way public administration organizes itself and how it utilizes information management systems to respond to user / citizen requirements including and addressing the goals of all stakeholders involved are required. Currently the number of successful applications to that end is quite low when compared to the projects implemented and the resources invested in such systems so far. The authors propose steps that would maintain the focus of future implementations in doing so. They also identify the next steps for research in addressing this complex and ever evolving issue.


2014 ◽  
Vol 7 (1) ◽  
pp. 1-25
Author(s):  
Jodie Eichler-Levine

In this article I analyze how Americans draw upon the authority of both ancient, so-called “hidden” texts and the authority of scholarly discourse, even overtly fictional scholarly discourse, in their imaginings of the “re-discovered” figure of Mary Magdalene. Reading recent treatments of Mary Magdalene provides me with an entrance onto three topics: how Americans see and use the past, how Americans understand knowledge itself, and how Americans construct “religion” and “spirituality.” I do so through close studies of contemporary websites of communities that focus on Mary Magdalene, as well as examinations of relevant books, historical novels, reader reviews, and comic books. Focusing on Mary Magdalene alongside tropes of wisdom also uncovers the gendered dynamics at play in constructions of antiquity, knowledge, and religious accessibility.


1997 ◽  
Vol 36 (4I) ◽  
pp. 321-331
Author(s):  
Sarfraz Khan Qureshi

It is an honour for me as President of the Pakistan Society of Development Economists to welcome you to the 13th Annual General Meeting and Conference of the Society. I consider it a great privilege to do so as this Meeting coincides with the Golden Jubilee celebrations of the state of Pakistan, a state which emerged on the map of the postwar world as a result of the Muslim freedom movement in the Indian Subcontinent. Fifty years to the date, we have been jubilant about it, and both as citizens of Pakistan and professionals in the social sciences we have also been thoughtful about it. We are trying to see what development has meant in Pakistan in the past half century. As there are so many dimensions that the subject has now come to have since its rather simplistic beginnings, we thought the Golden Jubilee of Pakistan to be an appropriate occasion for such stock-taking.


2017 ◽  
Vol 8 (2) ◽  
Author(s):  
Andreas Budiman ◽  
Dennis Gunawan ◽  
Seng Hansun

Plagiarism is a behavior that causes violence of copyrights. Survey shows 55% of college presidents say that plagiarism in students’ papers has increased over the past 10 years. Therefore, an application for detecting plagiarism is needed, especially for teachers. This plagiarism checker application is made by using Visual C# 2010. The plagiarism checker uses hamming distance algorithm for matching line code of the source code. This algorithm works by matching the same length string of the code programs. Thus, it needs brute will be matched with hamming distance. Another important thing for detecting plagiarism is the preprocessing, which is used to help the algorithm for detecting plagiarized source code. This paper shows that the application works good in detecting plagiarism, the hamming distance algorithm and brute force algorithm works better than levenstein distance algorithm for detecting structural type of plagiarism and this thesis also shows that the preprocessing could help the application to increase its percentage and its accuracy. Index Terms—Brute Force, Hamming Distance, Plagiarisme, Preprocessing.


Sign in / Sign up

Export Citation Format

Share Document