769 resultados para reporters and reporting
Resumo:
The Steering Committee recognizes that the Departments may need to implement reviews necessary to address specific Federal requirements and that while consolidated reporting should be used when possible, the review and reporting processes should facilitate the ability to garner Federal funding. However, the analysis thus far confirms the need for change and a significant potential to reduce redundant monitoring and reporting. At the end of this Executive Summary, there is a summary presentation, including a timeline and progress indicators, that gives more details on these recommendations.
Resumo:
"December, 1930."
Resumo:
Issued Aug. 1979.
Resumo:
"Issued December 1964."
Resumo:
Description based on: 1985 releases.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
Genetic analysis in animals has been used for many applications, such as kinship analysis, for determining the sire of an offspring when a female has been exposed to multiple males, determining parentage when an animal switches offspring with another dam, extended lineage reconstruction, estimating inbreeding, identification in breed registries, and speciation. It now also is being used increasingly to characterize animal materials in forensic cases. As such, it is important to operate under a set of minimum guidelines that assures that all service providers have a template to follow for quality practices. None have been delineated for animal genetic identity testing. Based on the model for human DNA forensic analyses, a basic discussion of the issues and guidelines is provided for animal testing to include analytical practices, data evaluation, nomenclature, allele designation, statistics, validation, proficiency testing, lineage markers, casework files, and reporting. These should provide a basis for professional societies and/or working groups to establish more formalized recommendations.
Resumo:
This study assessed the implications of parental attachment security and parental conflict behavior for offspring's relational adjustment (attachment security, loneliness, and relationship satisfaction). Further, reports of parental conflict behavior were obtained from both parents and offspring, addressing questions regarding agreement between reporters and the origin and extent of discrepant perceptions. Results revealed consistent patterns of conflict behavior and moderate agreement between reporters. However, offspring reported parental conflict behavior more negatively than parents, especially when offspring or parents were anxious about relationships. Parental attachment security had direct associations with offspring's relationship anxiety, whereas associations between parental attachment and offspring's loneliness and discomfort with closeness were mediated by parental conflict behavior. Parental conflict behavior was also associated with offspring's relationship satisfaction. The results are discussed in terms of the mechanisms involved in the intergenerational transmission of relationship difficulties.
Resumo:
This paper illustrates a method for finding useful visual landmarks for performing simultaneous localization and mapping (SLAM). The method is based loosely on biological principles, using layers of filtering and pooling to create learned templates that correspond to different views of the environment. Rather than using a set of landmarks and reporting range and bearing to the landmark, this system maps views to poses. The challenge is to produce a system that produces the same view for small changes in robot pose, but provides different views for larger changes in pose. The method has been developed to interface with the RatSLAM system, a biologically inspired method of SLAM. The paper describes the method of learning and recalling visual landmarks in detail, and shows the performance of the visual system in real robot tests.
Resumo:
The aim of this paper is to provide an overview and an analysis of recent developments and changes in the implementation of sustainability practices by food retailers. It also aims to explore whether the sustainability measurement criteria and indicators identified in the literature can be applied in practice. A literature review identified the current trends, developments and the proposed sustainability objectives, criteria and indicators. Via case study research, we collected empirical data from four retailers. This involved both qualitative and quantitative data drawn from questionnaires and in-depth interviews with logistics directors from four retailers' distribution centres. The empirical data collected from the interviews indicate similarities in some of the characteristics of distribution centres, as well as differences. However, it was difficult to make cross-company comparisons due to the absence of benchmarks or assessments of the relative importance of each sustainability criterion and indicator. This research focused only on two sustainability objectives. Further research on other sustainability objectives is therefore required. Lessons learnt from the four case studies can be taken into consideration when developing future sustainability performance rating scales. The paper provides an in-depth analysis of sustainability in the food chain, with emphasis on food retailing. Its value lies in presenting an attempt to test in practice how a number of sustainability objectives, criteria and indicators are applied in logistics-related processes, identifying the gaps and reporting the potential difficulties.
Resumo:
Research Question/Issue: In this paper, we empirically investigate whether US listed commercial banks with effective corporate governance structures engage in higher levels of conservative financial accounting and reporting. Research Findings/Insights: Using both market- and accrual-based measures of conservatism and both composite and disaggregated governance indices, we document convincing evidence that well-governed banks engage in significantly higher levels of conditional conservatism in their financial reporting practices. For example, we find that banks with effective governance structures, particularly those with effective board and audit governance structures, recognize loan loss provisions that are larger relative to changes in nonperforming loans compared to their counterparts with ineffective governance structures. Theoretical/Academic Implications: We contribute to the extant literature on the relationship between corporate governance and quality of accounting information by providing evidence that banks with effective governance structures practice higher levels of accounting conservatism. Practitioner/Policy Implications: The findings of this study would be useful to US bank regulators/supervisors in improving the existing regulatory framework by focusing on accounting conservatism as a complement to corporate governance in mitigating the opaqueness and intense information asymmetry that plague banks.
Resumo:
Strategic sourcing has increased in importance in recent years, and now plays an important role in companies’ planning. The current volatility in supply markets means companies face multiple challenges involving lock-in situations, supplier bankruptcies or supply security issues. In addition, their exposure can increase due to natural disasters, as witnessed recently in the form of bird flu, volcanic ash and tsunamis. Therefore, the primary focus of this study is risk management in the context of strategic sourcing. The study presents a literature review on sourcing based on the 15 years from 1998–2012, and considers 131 academic articles. The literature describes strategic sourcing as a strategic, holistic process in managing supplier relationships, with a long-term focus on adding value to the company and realising competitive advantage. Few studies discovered the real risk impact and status of risk management in strategic sourcing, and evaluation across countries and industries was limited, with the construction sector particularly under-researched. This methodology is founded on a qualitative study of twenty cases across Ger-many and the United Kingdom from the construction sector and electronics manufacturing industries. While considering risk management in the context of strategic sourcing, the thesis takes into account six dimensions that cover trends in strategic sourcing, theoretical and practical sourcing models, risk management, supply and demand management, critical success factors and the strategic supplier evaluation. The study contributes in several ways. First, recent trends are traced and future needs identified across the research dimensions of countries, industries and companies. Second, it evaluates critical success factors in contemporary strategic sourcing. Third, it explores the application of theoretical and practical sourcing models in terms of effectiveness and sustainability. Fourth, based on the case study findings, a risk-oriented strategic sourcing framework and a model for strategic sourcing are developed. These are based on the validation of contemporary requirements and a critical evaluation of the existing situation. It contemplates the empirical findings and leads to a structured process to manage risk in strategic sourcing. The risk-oriented framework considers areas such as trends, corporate and sourcing strategy, critical success factors, strategic supplier selection criteria, risk assessment, reporting, strategy alignment and reporting. The proposed model highlights the essential dimensions in strategic sourcing and guides us to a new definition of strategic sourcing supported by this empirical study.
Resumo:
Background. Previous research has found links between being a victim of bullying and reporting more unhealthy eating behaviours and cognitions, particularly in girls. However, little is known about the factors that might mediate these relationships. Aim. The present study compared the relationships between bullying, emotional adjustment, restrained eating, and body dissatisfaction in adolescent boys and girls. Sample/method. Self-report data were collected from a sample of 11- to 14-year-olds (N= 376) on experiences of bullying, emotional symptoms, and unhealthy eating and shape-related attitudes and behaviours. Results. Bullying, emotional symptoms, restrained eating, and body dissatisfaction were all correlated. Emotional symptoms were found to significantly mediate the relationships between verbal bullying with body dissatisfaction in girls but not in boys. Conclusions. Findings suggest that the experience of being verbally bullied places adolescent girls at risk of developing emotional problems which can then lead to body dissatisfaction. Longitudinal research is necessary to disentangle these pathways in more detail to facilitate the development of informed interventions to support children who are being bullied.
Resumo:
Background: Proton Magnetic Resonance Spectroscopy (H-MRS) is a non-invasive imaging technique that enables quantification of neurochemistry in vivo and thereby facilitates investigation of the biochemical underpinnings of human cognitive variability. Studies in the field of cognitive spectroscopy have commonly focused on relationships between measures of N-acetyl aspartate (NAA), a surrogate marker of neuronal health and function, and broad measures of cognitive performance, such as IQ. Methodology/Principal Findings: In this study, we used H-MRS to interrogate single-voxels in occipitoparietal and frontal cortex, in parallel with assessments of psychometric intelligence, in a sample of 40 healthy adult participants. We found correlations between NAA and IQ that were within the range reported in previous studies. However, the magnitude of these effects was significantly modulated by the stringency of data screening and the extent to which outlying values contributed to statistical analyses. Conclusions/Significance: H-MRS offers a sensitive tool for assessing neurochemistry non-invasively, yet the relationships between brain metabolites and broad aspects of human behavior such as IQ are subtle. We highlight the need to develop an increasingly rigorous analytical and interpretive framework for collecting and reporting data obtained from cognitive spectroscopy studies of this kind. © 2014 Patel, Blyth, Griffiths, Kelly and Talcott.
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.