Sample records for absolutely secure processing

  1. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...

  2. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  3. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  4. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  5. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  6. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  7. Optimization of airport security process

    NASA Astrophysics Data System (ADS)

    Wei, Jianan

    2017-05-01

    In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.

  8. Process Security in Chemical Engineering Education

    ERIC Educational Resources Information Center

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  9. Evaluation of security algorithms used for security processing on DICOM images

    NASA Astrophysics Data System (ADS)

    Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.

    2005-04-01

    In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.

  10. National Security Technology Incubator Evaluation Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less

  11. Absolutely relative or relatively absolute: violations of value invariance in human decision making.

    PubMed

    Teodorescu, Andrei R; Moran, Rani; Usher, Marius

    2016-02-01

    Making decisions based on relative rather than absolute information processing is tied to choice optimality via the accumulation of evidence differences and to canonical neural processing via accumulation of evidence ratios. These theoretical frameworks predict invariance of decision latencies to absolute intensities that maintain differences and ratios, respectively. While information about the absolute values of the choice alternatives is not necessary for choosing the best alternative, it may nevertheless hold valuable information about the context of the decision. To test the sensitivity of human decision making to absolute values, we manipulated the intensities of brightness stimuli pairs while preserving either their differences or their ratios. Although asked to choose the brighter alternative relative to the other, participants responded faster to higher absolute values. Thus, our results provide empirical evidence for human sensitivity to task irrelevant absolute values indicating a hard-wired mechanism that precedes executive control. Computational investigations of several modelling architectures reveal two alternative accounts for this phenomenon, which combine absolute and relative processing. One account involves accumulation of differences with activation dependent processing noise and the other emerges from accumulation of absolute values subject to the temporal dynamics of lateral inhibition. The potential adaptive role of such choice mechanisms is discussed.

  12. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  13. Process Improvement Should Link to Security: SEPG 2007 Security Track Recap

    DTIC Science & Technology

    2007-09-01

    the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security

  14. Superfast high-resolution absolute 3D recovery of a stabilized flapping flight process.

    PubMed

    Li, Beiwen; Zhang, Song

    2017-10-30

    Scientific research of a stabilized flapping flight process (e.g. hovering) has been of great interest to a variety of fields including biology, aerodynamics, and bio-inspired robotics. Different from the current passive photogrammetry based methods, the digital fringe projection (DFP) technique has the capability of performing dense superfast (e.g. kHz) 3D topological reconstructions with the projection of defocused binary patterns, yet it is still a challenge to measure a flapping flight process with the presence of rapid flapping wings. This paper presents a novel absolute 3D reconstruction method for a stabilized flapping flight process. Essentially, the slow motion parts (e.g. body) and the fast-motion parts (e.g. wings) are segmented and separately reconstructed with phase shifting techniques and the Fourier transform, respectively. The topological relations between the wings and the body are utilized to ensure absolute 3D reconstruction. Experiments demonstrate the success of our computational framework by testing a flapping wing robot at different flapping speeds.

  15. 20 CFR 404.1205 - Absolute coverage groups.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Absolute coverage groups. 404.1205 Section 404.1205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... grouping of employees, e.g., all the employees of a city or town. It is a coverage group for coverage and...

  16. [Ecological security of wastewater treatment processes: a review].

    PubMed

    Yang, Sai; Hua, Tao

    2013-05-01

    Though the regular indicators of wastewater after treatment can meet the discharge requirements and reuse standards, it doesn't mean the effluent is harmless. From the sustainable point of view, to ensure the ecological and human security, comprehensive toxicity should be considered when discharge standards are set up. In order to improve the ecological security of wastewater treatment processes, toxicity reduction should be considered when selecting and optimizing the treatment processes. This paper reviewed the researches on the ecological security of wastewater treatment processes, with the focus on the purposes of various treatment processes, including the processes for special wastewater treatment, wastewater reuse, and for the safety of receiving waters. Conventional biological treatment combined with advanced oxidation technologies can enhance the toxicity reduction on the base of pollutants removal, which is worthy of further study. For the process aimed at wastewater reuse, the integration of different process units can complement the advantages of both conventional pollutants removal and toxicity reduction. For the process aimed at ecological security of receiving waters, the emphasis should be put on the toxicity reduction optimization of process parameters and process unit selection. Some suggestions for the problems in the current research and future research directions were put forward.

  17. 10 CFR 1016.9 - Processing security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Processing security facility approval. 1016.9 Section 1016... § 1016.9 Processing security facility approval. The following receipt of an acceptable request for... granted pursuant to § 1016.6 of this part. ...

  18. 10 CFR 1016.9 - Processing security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Processing security facility approval. 1016.9 Section 1016... § 1016.9 Processing security facility approval. The following receipt of an acceptable request for... granted pursuant to § 1016.6 of this part. ...

  19. The Case for Absolute Ligand Discrimination: Modeling Information Processing and Decision by Immune T Cells

    NASA Astrophysics Data System (ADS)

    François, Paul; Altan-Bonnet, Grégoire

    2016-03-01

    Some cells have to take decision based on the quality of surroundings ligands, almost irrespective of their quantity, a problem we name "absolute discrimination". An example of absolute discrimination is recognition of not-self by immune T Cells. We show how the problem of absolute discrimination can be solved by a process called "adaptive sorting". We review several implementations of adaptive sorting, as well as its generic properties such as antagonism. We show how kinetic proofreading with negative feedback implement an approximate version of adaptive sorting in the immune context. Finally, we revisit the decision problem at the cell population level, showing how phenotypic variability and feedbacks between population and single cells are crucial for proper decision.

  20. Auditory processing in absolute pitch possessors

    NASA Astrophysics Data System (ADS)

    McKetton, Larissa; Schneider, Keith A.

    2018-05-01

    Absolute pitch (AP) is a rare ability in classifying a musical pitch without a reference standard. It has been of great interest to researchers studying auditory processing and music cognition since it is seldom expressed and sheds light on influences pertaining to neurodevelopmental biological predispositions and the onset of musical training. We investigated the smallest frequency that could be detected or just noticeable difference (JND) between two pitches. Here, we report significant differences in JND thresholds in AP musicians and non-AP musicians compared to non-musician control groups at both 1000 Hz and 987.76 Hz testing frequencies. Although the AP-musicians did better than non-AP musicians, the difference was not significant. In addition, we looked at neuro-anatomical correlates of musicianship and AP using structural MRI. We report increased cortical thickness of the left Heschl's Gyrus (HG) and decreased cortical thickness of the inferior frontal opercular gyrus (IFO) and circular insular sulcus volume (CIS) in AP compared to non-AP musicians and controls. These structures may therefore be optimally enhanced and reduced to form the most efficient network for AP to emerge.

  1. A code inspection process for security reviews

    NASA Astrophysics Data System (ADS)

    Garzoglio, Gabriele

    2010-04-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  2. A code inspection process for security reviews

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garzoglio, Gabriele; /Fermilab

    2009-05-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application andmore » their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.« less

  3. Airport security inspection process model and optimization based on GSPN

    NASA Astrophysics Data System (ADS)

    Mao, Shuainan

    2018-04-01

    Aiming at the efficiency of airport security inspection process, Generalized Stochastic Petri Net is used to establish the security inspection process model. The model is used to analyze the bottleneck problem of airport security inspection process. The solution to the bottleneck is given, which can significantly improve the efficiency and reduce the waiting time by adding the place for people to remove their clothes and the X-ray detector.

  4. Processing multilevel secure test and evaluation information

    NASA Astrophysics Data System (ADS)

    Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa

    1994-07-01

    The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.

  5. Application of the JDL data fusion process model for cyber security

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  6. Coordination and organization of security software process for power information application environment

    NASA Astrophysics Data System (ADS)

    Wang, Qiang

    2017-09-01

    As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.

  7. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  8. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  9. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... the securities delivery process work? If any of the offers you submitted are accepted, you must...

  10. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  11. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  12. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  13. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Process against Social Security Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their...

  14. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  15. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  16. Research on information security system of waste terminal disposal process

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  17. Ultrahigh-Repetition Pulse Train with Absolute-Phase Control Produced by AN Adiabatic Raman Process

    NASA Astrophysics Data System (ADS)

    Katsuragawa, M.; Suzuki, T.; Shiraga, K.; Arakawa, M.; Onose, T.; Yokoyama, K.; Hong, F. L.; Misawa, K.

    2010-02-01

    We describe the generation of an ultrahigh-repetition-rate train of ultrashort pulses on the basis of an adiabatic Raman process. We also describe recent progress in studies toward the ultimate regime: realization of an ultrahigh-repetition-rate train of monocycle pulses with control of the absolute phase. We comment on the milestones expected in the near future in terms of the study of such novel light sources and the new field of optical science stimulated by their development.

  18. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  19. Absolute Summ

    NASA Astrophysics Data System (ADS)

    Phillips, Alfred, Jr.

    Summ means the entirety of the multiverse. It seems clear, from the inflation theories of A. Guth and others, that the creation of many universes is plausible. We argue that Absolute cosmological ideas, not unlike those of I. Newton, may be consistent with dynamic multiverse creations. As suggested in W. Heisenberg's uncertainty principle, and with the Anthropic Principle defended by S. Hawking, et al., human consciousness, buttressed by findings of neuroscience, may have to be considered in our models. Predictability, as A. Einstein realized with Invariants and General Relativity, may be required for new ideas to be part of physics. We present here a two postulate model geared to an Absolute Summ. The seedbed of this work is part of Akhnaton's philosophy (see S. Freud, Moses and Monotheism). Most important, however, is that the structure of human consciousness, manifest in Kenya's Rift Valley 200,000 years ago as Homo sapiens, who were the culmination of the six million year co-creation process of Hominins and Nature in Africa, allows us to do the physics that we do. .

  20. Guidelines for Automatic Data Processing Physical Security and Risk Management. Federal Information Processing Standards Publication 31.

    ERIC Educational Resources Information Center

    National Bureau of Standards (DOC), Washington, DC.

    These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…

  1. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Other process directed to the Social Security Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the...

  2. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Other process directed to the Social Security Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the...

  3. Focus on Resiliency: A Process-Oriented Approach to Security

    DTIC Science & Technology

    2005-11-01

    by ANSI Std Z39-18 © 2005 Carnegie Mellon University CSI v1.0 2 Agenda About the SEI Characterizing the problem Security, resiliency, and risk A...2005 Carnegie Mellon University CSI v1.0 5 SEI Technical Programs Product Line Systems Dynamic Systems Software Engineering Process Management...University CSI v1.0 7 What is the problem? Is your organization’s security capability sufficient to identify and manage risks that result from failed

  4. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their... capacities must be served in compliance with the requirements for service of process on individuals who are... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Process against Social Security...

  5. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    DTIC Science & Technology

    2015-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...December 2015 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...the programs. While acknowledging the expanding role of the programs, the findings indicate a need for reforms in the export -control mechanisms

  6. The new risk paradigm for chemical process security and safety.

    PubMed

    Moore, David A

    2004-11-11

    The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.

  7. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental

  8. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... requirements-high or moderate risk contracts. 1352.237-70 Section 1352.237-70 Federal Acquisition Regulations... Provisions and Clauses 1352.237-70 Security processing requirements—high or moderate risk contracts. As prescribed in 48 CFR 1337.110-70 (b), insert the following clause: Security Processing Requirements—High or...

  9. Teaching Absolute Value Meaningfully

    ERIC Educational Resources Information Center

    Wade, Angela

    2012-01-01

    What is the meaning of absolute value? And why do teachers teach students how to solve absolute value equations? Absolute value is a concept introduced in first-year algebra and then reinforced in later courses. Various authors have suggested instructional methods for teaching absolute value to high school students (Wei 2005; Stallings-Roberts…

  10. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  11. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  12. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  13. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  14. Bio-Inspired Stretchable Absolute Pressure Sensor Network

    PubMed Central

    Guo, Yue; Li, Yu-Hung; Guo, Zhiqiang; Kim, Kyunglok; Chang, Fu-Kuo; Wang, Shan X.

    2016-01-01

    A bio-inspired absolute pressure sensor network has been developed. Absolute pressure sensors, distributed on multiple silicon islands, are connected as a network by stretchable polyimide wires. This sensor network, made on a 4’’ wafer, has 77 nodes and can be mounted on various curved surfaces to cover an area up to 0.64 m × 0.64 m, which is 100 times larger than its original size. Due to Micro Electro-Mechanical system (MEMS) surface micromachining technology, ultrathin sensing nodes can be realized with thicknesses of less than 100 µm. Additionally, good linearity and high sensitivity (~14 mV/V/bar) have been achieved. Since the MEMS sensor process has also been well integrated with a flexible polymer substrate process, the entire sensor network can be fabricated in a time-efficient and cost-effective manner. Moreover, an accurate pressure contour can be obtained from the sensor network. Therefore, this absolute pressure sensor network holds significant promise for smart vehicle applications, especially for unmanned aerial vehicles. PMID:26729134

  15. On the Perceptual Subprocess of Absolute Pitch.

    PubMed

    Kim, Seung-Goo; Knösche, Thomas R

    2017-01-01

    Absolute pitch (AP) is the rare ability of musicians to identify the pitch of tonal sound without external reference. While there have been behavioral and neuroimaging studies on the characteristics of AP, how the AP is implemented in human brains remains largely unknown. AP can be viewed as comprising of two subprocesses: perceptual (processing auditory input to extract a pitch chroma) and associative (linking an auditory representation of pitch chroma with a verbal/non-verbal label). In this review, we focus on the nature of the perceptual subprocess of AP. Two different models on how the perceptual subprocess works have been proposed: either via absolute pitch categorization (APC) or based on absolute pitch memory (APM). A major distinction between the two views is that whether the AP uses unique auditory processing (i.e., APC) that exists only in musicians with AP or it is rooted in a common phenomenon (i.e., APM), only with heightened efficiency. We review relevant behavioral and neuroimaging evidence that supports each notion. Lastly, we list open questions and potential ideas to address them.

  16. On the Perceptual Subprocess of Absolute Pitch

    PubMed Central

    Kim, Seung-Goo; Knösche, Thomas R.

    2017-01-01

    Absolute pitch (AP) is the rare ability of musicians to identify the pitch of tonal sound without external reference. While there have been behavioral and neuroimaging studies on the characteristics of AP, how the AP is implemented in human brains remains largely unknown. AP can be viewed as comprising of two subprocesses: perceptual (processing auditory input to extract a pitch chroma) and associative (linking an auditory representation of pitch chroma with a verbal/non-verbal label). In this review, we focus on the nature of the perceptual subprocess of AP. Two different models on how the perceptual subprocess works have been proposed: either via absolute pitch categorization (APC) or based on absolute pitch memory (APM). A major distinction between the two views is that whether the AP uses unique auditory processing (i.e., APC) that exists only in musicians with AP or it is rooted in a common phenomenon (i.e., APM), only with heightened efficiency. We review relevant behavioral and neuroimaging evidence that supports each notion. Lastly, we list open questions and potential ideas to address them. PMID:29085275

  17. Quantum cryptography to satellites for global secure key distribution

    NASA Astrophysics Data System (ADS)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  18. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  19. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  20. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  1. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  2. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the Commissioner. Subpoenas and other process (other than summonses and complaints) that are required to be served... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Other process directed to the Social Security...

  3. Easy Absolute Values? Absolutely

    ERIC Educational Resources Information Center

    Taylor, Sharon E.; Mittag, Kathleen Cage

    2015-01-01

    The authors teach a problem-solving course for preservice middle-grades education majors that includes concepts dealing with absolute-value computations, equations, and inequalities. Many of these students like mathematics and plan to teach it, so they are adept at symbolic manipulations. Getting them to think differently about a concept that they…

  4. Perceptions of randomized security schedules.

    PubMed

    Scurich, Nicholas; John, Richard S

    2014-04-01

    Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. © 2013 Society for Risk Analysis.

  5. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...

  6. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...

  7. Aerial secure display by use of polarization-processing display with retarder film and retro-reflector

    NASA Astrophysics Data System (ADS)

    Ito, Shusei; Uchida, Keitaro; Mizushina, Haruki; Suyama, Shiro; Yamamoto, Hirotsugu

    2017-02-01

    Security is one of the big issues in automated teller machine (ATM). In ATM, two types of security have to be maintained. One is to secure displayed information. The other is to secure screen contamination. This paper gives a solution for these two security issues. In order to secure information against peeping at the screen, we utilize visual cryptography for displayed information and limit the viewing zone. Furthermore, an aerial information screen with aerial imaging by retro-reflection, named AIRR enables users to avoid direct touch on the information screen. The purpose of this paper is to propose an aerial secure display technique that ensures security of displayed information as well as security against contamination problem on screen touch. We have developed a polarization-processing display that is composed of a backlight, a polarizer, a background LCD panel, a gap, a half-wave retarder, and a foreground LCD panel. Polarization angle is rotated with the LCD panels. We have constructed a polarization encryption code set. Size of displayed images are designed to limit the viewing position. Furthermore, this polarization-processing display has been introduced into our aerial imaging optics, which employs a reflective polarizer and a retro-reflector covered with a quarter-wave retarder. Polarization-modulated light forms the real image over the reflective polarizer. We have successfully formed aerial information screen that shows the secret image with a limited viewing position. This is the first realization of aerial secure display by use of polarization-processing display with retarder-film and retro-reflector.

  8. Absolute biological needs.

    PubMed

    McLeod, Stephen

    2014-07-01

    Absolute needs (as against instrumental needs) are independent of the ends, goals and purposes of personal agents. Against the view that the only needs are instrumental needs, David Wiggins and Garrett Thomson have defended absolute needs on the grounds that the verb 'need' has instrumental and absolute senses. While remaining neutral about it, this article does not adopt that approach. Instead, it suggests that there are absolute biological needs. The absolute nature of these needs is defended by appeal to: their objectivity (as against mind-dependence); the universality of the phenomenon of needing across the plant and animal kingdoms; the impossibility that biological needs depend wholly upon the exercise of the abilities characteristic of personal agency; the contention that the possession of biological needs is prior to the possession of the abilities characteristic of personal agency. Finally, three philosophical usages of 'normative' are distinguished. On two of these, to describe a phenomenon or claim as 'normative' is to describe it as value-dependent. A description of a phenomenon or claim as 'normative' in the third sense does not entail such value-dependency, though it leaves open the possibility that value depends upon the phenomenon or upon the truth of the claim. It is argued that while survival needs (or claims about them) may well be normative in this third sense, they are normative in neither of the first two. Thus, the idea of absolute need is not inherently normative in either of the first two senses. © 2013 John Wiley & Sons Ltd.

  9. Neural Sensitivity to Absolute and Relative Anticipated Reward in Adolescents

    PubMed Central

    Vaidya, Jatin G.; Knutson, Brian; O'Leary, Daniel S.; Block, Robert I.; Magnotta, Vincent

    2013-01-01

    Adolescence is associated with a dramatic increase in risky and impulsive behaviors that have been attributed to developmental differences in neural processing of rewards. In the present study, we sought to identify age differences in anticipation of absolute and relative rewards. To do so, we modified a commonly used monetary incentive delay (MID) task in order to examine brain activity to relative anticipated reward value (neural sensitivity to the value of a reward as a function of other available rewards). This design also made it possible to examine developmental differences in brain activation to absolute anticipated reward magnitude (the degree to which neural activity increases with increasing reward magnitude). While undergoing fMRI, 18 adolescents and 18 adult participants were presented with cues associated with different reward magnitudes. After the cue, participants responded to a target to win money on that trial. Presentation of cues was blocked such that two reward cues associated with $.20, $1.00, or $5.00 were in play on a given block. Thus, the relative value of the $1.00 reward varied depending on whether it was paired with a smaller or larger reward. Reflecting age differences in neural responses to relative anticipated reward (i.e., reference dependent processing), adults, but not adolescents, demonstrated greater activity to a $1 reward when it was the larger of the two available rewards. Adults also demonstrated a more linear increase in ventral striatal activity as a function of increasing absolute reward magnitude compared to adolescents. Additionally, reduced ventral striatal sensitivity to absolute anticipated reward (i.e., the difference in activity to medium versus small rewards) correlated with higher levels of trait Impulsivity. Thus, ventral striatal activity in anticipation of absolute and relative rewards develops with age. Absolute reward processing is also linked to individual differences in Impulsivity. PMID:23544046

  10. Absolute Distance Measurement with the MSTAR Sensor

    NASA Technical Reports Server (NTRS)

    Lay, Oliver P.; Dubovitsky, Serge; Peters, Robert; Burger, Johan; Ahn, Seh-Won; Steier, William H.; Fetterman, Harrold R.; Chang, Yian

    2003-01-01

    The MSTAR sensor (Modulation Sideband Technology for Absolute Ranging) is a new system for measuring absolute distance, capable of resolving the integer cycle ambiguity of standard interferometers, and making it possible to measure distance with sub-nanometer accuracy. The sensor uses a single laser in conjunction with fast phase modulators and low frequency detectors. We describe the design of the system - the principle of operation, the metrology source, beamlaunching optics, and signal processing - and show results for target distances up to 1 meter. We then demonstrate how the system can be scaled to kilometer-scale distances.

  11. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...

  12. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...

  13. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...

  14. An Integrated Model of Choices and Response Times in Absolute Identification

    ERIC Educational Resources Information Center

    Brown, Scott D.; Marley, A. A. J.; Donkin, Christopher; Heathcote, Andrew

    2008-01-01

    Recent theoretical developments in the field of absolute identification have stressed differences between relative and absolute processes, that is, whether stimulus magnitudes are judged relative to a shorter term context provided by recently presented stimuli or a longer term context provided by the entire set of stimuli. The authors developed a…

  15. Automated absolute phase retrieval in across-track interferometry

    NASA Technical Reports Server (NTRS)

    Madsen, Soren N.; Zebker, Howard A.

    1992-01-01

    Discussed is a key element in the processing of topographic radar maps acquired by the NASA/JPL airborne synthetic aperture radar configured as an across-track interferometer (TOPSAR). TOPSAR utilizes a single transmit and two receive antennas; the three-dimensional target location is determined by triangulation based on a known baseline and two measured slant ranges. The slant range difference is determined very accurately from the phase difference between the signals received by the two antennas. This phase is measured modulo 2pi, whereas it is the absolute phase which relates directly to the difference in slant range. It is shown that splitting the range bandwidth into two subbands in the processor and processing each individually allows for the absolute phase. The underlying principles and system errors which must be considered are discussed, together with the implementation and results from processing data acquired during the summer of 1991.

  16. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research

    PubMed Central

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing

  17. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research.

    PubMed

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing

  18. Redefining the business process of Department of Food Security and Agriculture in Government of Surabaya City

    NASA Astrophysics Data System (ADS)

    Cahyono, H.; Wessiani, N. A.

    2018-04-01

    Government of Indonesia has been launched the bureaucratic reform program since 2010. One of the action is conducted restructuring organization in all city governments. Department of Food Security and Agriculture in Government of Surabaya City is the result of merger from two Department, namely Bureau of Food Security and Department of Agriculture. This merger makes Department of Food Security and Agriculture to redefine their business process. The new business process is needed to be defined in order to align the new structure with the long term strategic planning of Surabaya City Government. This research aims to redefine the business process of Department of Food Security and Agriculture in Government of Surabaya City. The CIMOSA model is adopted for identifying the activities in the business process. The new business process is important for the department to allocate their resource, mainly the human resource and as the main input for the department to build their standard operating procedure.

  19. Jasminum flexile flower absolute from India--a detailed comparison with three other jasmine absolutes.

    PubMed

    Braun, Norbert A; Kohlenberg, Birgit; Sim, Sherina; Meier, Manfred; Hammerschmidt, Franz-Josef

    2009-09-01

    Jasminum flexile flower absolute from the south of India and the corresponding vacuum headspace (VHS) sample of the absolute were analyzed using GC and GC-MS. Three other commercially available Indian jasmine absolutes from the species: J. sambac, J. officinale subsp. grandiflorum, and J. auriculatum and the respective VHS samples were used for comparison purposes. One hundred and twenty-one compounds were characterized in J. flexile flower absolute, with methyl linolate, benzyl salicylate, benzyl benzoate, (2E,6E)-farnesol, and benzyl acetate as the main constituents. A detailed olfactory evaluation was also performed.

  20. Security Risk Assessment Process for UAS in the NAS CNPC Architecture

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Young, Dennis P.; Thadani, Suresh K.; Winter, Gilbert A.

    2013-01-01

    This informational paper discusses the risk assessment process conducted to analyze Control and Non-Payload Communications (CNPC) architectures for integrating civil Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS). The assessment employs the National Institute of Standards and Technology (NIST) Risk Management framework to identify threats, vulnerabilities, and risks to these architectures and recommends corresponding mitigating security controls. This process builds upon earlier work performed by RTCA Special Committee (SC) 203 and the Federal Aviation Administration (FAA) to roadmap the risk assessment methodology and to identify categories of information security risks that pose a significant impact to aeronautical communications systems. A description of the deviations from the typical process is described in regards to this aeronautical communications system. Due to the sensitive nature of the information, data resulting from the risk assessment pertaining to threats, vulnerabilities, and risks is beyond the scope of this paper.

  1. Security Risk Assessment Process for UAS in the NAS CNPC Architecture

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis Christopher; Young, Daniel Paul; Suresh, Thadhani; Winter, Gilbert A.

    2013-01-01

    This informational paper discusses the risk assessment process conducted to analyze Control and Non-Payload Communications (CNPC) architectures for integrating civil Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS). The assessment employs the National Institute of Standards and Technology (NIST) Risk Management framework to identify threats, vulnerabilities, and risks to these architectures and recommends corresponding mitigating security controls. This process builds upon earlier work performed by RTCA Special Committee (SC) 203 and the Federal Aviation Administration (FAA) to roadmap the risk assessment methodology and to identify categories of information security risks that pose a significant impact to aeronautical communications systems. A description of the deviations from the typical process is described in regards to this aeronautical communications system. Due to the sensitive nature of the information, data resulting from the risk assessment pertaining to threats, vulnerabilities, and risks is beyond the scope of this paper

  2. Absolute nuclear material assay

    DOEpatents

    Prasad, Manoj K [Pleasanton, CA; Snyderman, Neal J [Berkeley, CA; Rowland, Mark S [Alamo, CA

    2012-05-15

    A method of absolute nuclear material assay of an unknown source comprising counting neutrons from the unknown source and providing an absolute nuclear material assay utilizing a model to optimally compare to the measured count distributions. In one embodiment, the step of providing an absolute nuclear material assay comprises utilizing a random sampling of analytically computed fission chain distributions to generate a continuous time-evolving sequence of event-counts by spreading the fission chain distribution in time.

  3. Absolute nuclear material assay

    DOEpatents

    Prasad, Manoj K [Pleasanton, CA; Snyderman, Neal J [Berkeley, CA; Rowland, Mark S [Alamo, CA

    2010-07-13

    A method of absolute nuclear material assay of an unknown source comprising counting neutrons from the unknown source and providing an absolute nuclear material assay utilizing a model to optimally compare to the measured count distributions. In one embodiment, the step of providing an absolute nuclear material assay comprises utilizing a random sampling of analytically computed fission chain distributions to generate a continuous time-evolving sequence of event-counts by spreading the fission chain distribution in time.

  4. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  5. Probing Carbohydrate Product Expulsion from a Processive Cellulase with Multiple Absolute Binding Free Energy Methods*

    PubMed Central

    Bu, Lintao; Beckham, Gregg T.; Shirts, Michael R.; Nimlos, Mark R.; Adney, William S.; Himmel, Michael E.; Crowley, Michael F.

    2011-01-01

    Understanding the enzymatic mechanism that cellulases employ to degrade cellulose is critical to efforts to efficiently utilize plant biomass as a sustainable energy resource. A key component of cellulase action on cellulose is product inhibition from monosaccharide and disaccharides in the product site of cellulase tunnel. The absolute binding free energy of cellobiose and glucose to the product site of the catalytic tunnel of the Family 7 cellobiohydrolase (Cel7A) of Trichoderma reesei (Hypocrea jecorina) was calculated using two different approaches: steered molecular dynamics (SMD) simulations and alchemical free energy perturbation molecular dynamics (FEP/MD) simulations. For the SMD approach, three methods based on Jarzynski's equality were used to construct the potential of mean force from multiple pulling trajectories. The calculated binding free energies, −14.4 kcal/mol using SMD and −11.2 kcal/mol using FEP/MD, are in good qualitative agreement. Analysis of the SMD pulling trajectories suggests that several protein residues (Arg-251, Asp-259, Asp-262, Trp-376, and Tyr-381) play key roles in cellobiose and glucose binding to the catalytic tunnel. Five mutations (R251A, D259A, D262A, W376A, and Y381A) were made computationally to measure the changes in free energy during the product expulsion process. The absolute binding free energies of cellobiose to the catalytic tunnel of these five mutants are −13.1, −6.0, −11.5, −7.5, and −8.8 kcal/mol, respectively. The results demonstrated that all of the mutants tested can lower the binding free energy of cellobiose, which provides potential applications in engineering the enzyme to accelerate the product expulsion process and improve the efficiency of biomass conversion. PMID:21454590

  6. Absolute photon-flux measurements in the vacuum ultraviolet

    NASA Technical Reports Server (NTRS)

    Samson, J. A. R.; Haddad, G. N.

    1974-01-01

    Absolute photon-flux measurements in the vacuum ultraviolet have extended to short wavelengths by use of rare-gas ionization chambers. The technique involves the measurement of the ion current as a function of the gas pressure in the ion chamber. The true value of the ion current, and hence the absolute photon flux, is obtained by extrapolating the ion current to zero gas pressure. Examples are given at 162 and 266 A. The short-wavelength limit is determined only by the sensitivity of the current-measuring apparatus and by present knowledge of the photoionization processes that occur in the rate gases.

  7. The Design Process of Physical Security as Applied to a U.S. Border Point of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1998-10-26

    This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.

  8. Secure VM for Monitoring Industrial Process Controllers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less

  9. Electronic Absolute Cartesian Autocollimator

    NASA Technical Reports Server (NTRS)

    Leviton, Douglas B.

    2006-01-01

    An electronic absolute Cartesian autocollimator performs the same basic optical function as does a conventional all-optical or a conventional electronic autocollimator but differs in the nature of its optical target and the manner in which the position of the image of the target is measured. The term absolute in the name of this apparatus reflects the nature of the position measurement, which, unlike in a conventional electronic autocollimator, is based absolutely on the position of the image rather than on an assumed proportionality between the position and the levels of processed analog electronic signals. The term Cartesian in the name of this apparatus reflects the nature of its optical target. Figure 1 depicts the electronic functional blocks of an electronic absolute Cartesian autocollimator along with its basic optical layout, which is the same as that of a conventional autocollimator. Referring first to the optical layout and functions only, this or any autocollimator is used to measure the compound angular deviation of a flat datum mirror with respect to the optical axis of the autocollimator itself. The optical components include an illuminated target, a beam splitter, an objective or collimating lens, and a viewer or detector (described in more detail below) at a viewing plane. The target and the viewing planes are focal planes of the lens. Target light reflected by the datum mirror is imaged on the viewing plane at unit magnification by the collimating lens. If the normal to the datum mirror is parallel to the optical axis of the autocollimator, then the target image is centered on the viewing plane. Any angular deviation of the normal from the optical axis manifests itself as a lateral displacement of the target image from the center. The magnitude of the displacement is proportional to the focal length and to the magnitude (assumed to be small) of the angular deviation. The direction of the displacement is perpendicular to the axis about which the

  10. Fluctuation theorems in feedback-controlled open quantum systems: Quantum coherence and absolute irreversibility

    NASA Astrophysics Data System (ADS)

    Murashita, Yûto; Gong, Zongping; Ashida, Yuto; Ueda, Masahito

    2017-10-01

    The thermodynamics of quantum coherence has attracted growing attention recently, where the thermodynamic advantage of quantum superposition is characterized in terms of quantum thermodynamics. We investigate the thermodynamic effects of quantum coherent driving in the context of the fluctuation theorem. We adopt a quantum-trajectory approach to investigate open quantum systems under feedback control. In these systems, the measurement backaction in the forward process plays a key role, and therefore the corresponding time-reversed quantum measurement and postselection must be considered in the backward process, in sharp contrast to the classical case. The state reduction associated with quantum measurement, in general, creates a zero-probability region in the space of quantum trajectories of the forward process, which causes singularly strong irreversibility with divergent entropy production (i.e., absolute irreversibility) and hence makes the ordinary fluctuation theorem break down. In the classical case, the error-free measurement ordinarily leads to absolute irreversibility, because the measurement restricts classical paths to the region compatible with the measurement outcome. In contrast, in open quantum systems, absolute irreversibility is suppressed even in the presence of the projective measurement due to those quantum rare events that go through the classically forbidden region with the aid of quantum coherent driving. This suppression of absolute irreversibility exemplifies the thermodynamic advantage of quantum coherent driving. Absolute irreversibility is shown to emerge in the absence of coherent driving after the measurement, especially in systems under time-delayed feedback control. We show that absolute irreversibility is mitigated by increasing the duration of quantum coherent driving or decreasing the delay time of feedback control.

  11. Estimating the absolute wealth of households.

    PubMed

    Hruschka, Daniel J; Gerkey, Drew; Hadley, Craig

    2015-07-01

    To estimate the absolute wealth of households using data from demographic and health surveys. We developed a new metric, the absolute wealth estimate, based on the rank of each surveyed household according to its material assets and the assumed shape of the distribution of wealth among surveyed households. Using data from 156 demographic and health surveys in 66 countries, we calculated absolute wealth estimates for households. We validated the method by comparing the proportion of households defined as poor using our estimates with published World Bank poverty headcounts. We also compared the accuracy of absolute versus relative wealth estimates for the prediction of anthropometric measures. The median absolute wealth estimates of 1,403,186 households were 2056 international dollars per capita (interquartile range: 723-6103). The proportion of poor households based on absolute wealth estimates were strongly correlated with World Bank estimates of populations living on less than 2.00 United States dollars per capita per day (R(2)  = 0.84). Absolute wealth estimates were better predictors of anthropometric measures than relative wealth indexes. Absolute wealth estimates provide new opportunities for comparative research to assess the effects of economic resources on health and human capital, as well as the long-term health consequences of economic change and inequality.

  12. Absolute irradiance of the Moon for on-orbit calibration

    USGS Publications Warehouse

    Stone, T.C.; Kieffer, H.H.; ,

    2002-01-01

    The recognized need for on-orbit calibration of remote sensing imaging instruments drives the ROLO project effort to characterize the Moon for use as an absolute radiance source. For over 5 years the ground-based ROLO telescopes have acquired spatially-resolved lunar images in 23 VNIR (Moon diameter ???500 pixels) and 9 SWIR (???250 pixels) passbands at phase angles within ??90 degrees. A numerical model for lunar irradiance has been developed which fits hundreds of ROLO images in each band, corrected for atmospheric extinction and calibrated to absolute radiance, then integrated to irradiance. The band-coupled extinction algorithm uses absorption spectra of several gases and aerosols derived from MODTRAN to fit time-dependent component abundances to nightly observations of standard stars. The absolute radiance scale is based upon independent telescopic measurements of the star Vega. The fitting process yields uncertainties in lunar relative irradiance over small ranges of phase angle and the full range of lunar libration well under 0.5%. A larger source of uncertainty enters in the absolute solar spectral irradiance, especially in the SWIR, where solar models disagree by up to 6%. Results of ROLO model direct comparisons to spacecraft observations demonstrate the ability of the technique to track sensor responsivity drifts to sub-percent precision. Intercomparisons among instruments provide key insights into both calibration issues and the absolute scale for lunar irradiance.

  13. An approach for investigation of secure access processes at a combined e-learning environment

    NASA Astrophysics Data System (ADS)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  14. Estimating the absolute wealth of households

    PubMed Central

    Gerkey, Drew; Hadley, Craig

    2015-01-01

    Abstract Objective To estimate the absolute wealth of households using data from demographic and health surveys. Methods We developed a new metric, the absolute wealth estimate, based on the rank of each surveyed household according to its material assets and the assumed shape of the distribution of wealth among surveyed households. Using data from 156 demographic and health surveys in 66 countries, we calculated absolute wealth estimates for households. We validated the method by comparing the proportion of households defined as poor using our estimates with published World Bank poverty headcounts. We also compared the accuracy of absolute versus relative wealth estimates for the prediction of anthropometric measures. Findings The median absolute wealth estimates of 1 403 186 households were 2056 international dollars per capita (interquartile range: 723–6103). The proportion of poor households based on absolute wealth estimates were strongly correlated with World Bank estimates of populations living on less than 2.00 United States dollars per capita per day (R2 = 0.84). Absolute wealth estimates were better predictors of anthropometric measures than relative wealth indexes. Conclusion Absolute wealth estimates provide new opportunities for comparative research to assess the effects of economic resources on health and human capital, as well as the long-term health consequences of economic change and inequality. PMID:26170506

  15. The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1999-02-22

    This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less

  16. FFT swept filtering: a bias-free method for processing fringe signals in absolute gravimeters

    NASA Astrophysics Data System (ADS)

    Křen, Petr; Pálinkáš, Vojtech; Mašika, Pavel; Val'ko, Miloš

    2018-05-01

    Absolute gravimeters, based on laser interferometry, are widely used for many applications in geoscience and metrology. Although currently the most accurate FG5 and FG5X gravimeters declare standard uncertainties at the level of 2-3 μGal, their inherent systematic errors affect the gravity reference determined by international key comparisons based predominately on the use of FG5-type instruments. The measurement results for FG5-215 and FG5X-251 clearly showed that the measured g-values depend on the size of the fringe signal and that this effect might be approximated by a linear regression with a slope of up to 0.030 μGal/mV . However, these empirical results do not enable one to identify the source of the effect or to determine a reasonable reference fringe level for correcting g-values in an absolute sense. Therefore, both gravimeters were equipped with new measuring systems (according to Křen et al. in Metrologia 53:27-40, 2016. https://doi.org/10.1088/0026-1394/53/1/27 applied for FG5), running in parallel with the original systems. The new systems use an analogue-to-digital converter HS5 to digitize the fringe signal and a new method of fringe signal analysis based on FFT swept bandpass filtering. We demonstrate that the source of the fringe size effect is connected to a distortion of the fringe signal due to the electronic components used in the FG5(X) gravimeters. To obtain a bias-free g-value, the FFT swept method should be applied for the determination of zero-crossings. A comparison of g-values obtained from the new and the original systems clearly shows that the original system might be biased by approximately 3-5 μGal due to improperly distorted fringe signal processing.

  17. 20 CFR 404.1205 - Absolute coverage groups.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Absolute coverage groups. 404.1205 Section... Covered § 404.1205 Absolute coverage groups. (a) General. An absolute coverage group is a permanent... are not under a retirement system. An absolute coverage group may include positions which were...

  18. Relational versus absolute representation in categorization.

    PubMed

    Edwards, Darren J; Pothos, Emmanuel M; Perlman, Amotz

    2012-01-01

    This study explores relational-like and absolute-like representations in categorization. Although there is much evidence that categorization processes can involve information about both the particular physical properties of studied instances and abstract (relational) properties, there has been little work on the factors that lead to one kind of representation as opposed to the other. We tested 370 participants in 6 experiments, in which participants had to classify new items into predefined artificial categories. In 4 experiments, we observed a predominantly relational-like mode of classification, and in 2 experiments we observed a shift toward an absolute-like mode of classification. These results suggest 3 factors that promote a relational-like mode of classification: fewer items per group, more training groups, and the presence of a time delay. Overall, we propose that less information about the distributional properties of a category or weaker memory traces for the category exemplars (induced, e.g., by having smaller categories or a time delay) can encourage relational-like categorization.

  19. Securing Provenance of Distributed Processes in an Untrusted Environment

    NASA Astrophysics Data System (ADS)

    Syalim, Amril; Nishide, Takashi; Sakurai, Kouichi

    Recently, there is much concern about the provenance of distributed processes, that is about the documentation of the origin and the processes to produce an object in a distributed system. The provenance has many applications in the forms of medical records, documentation of processes in the computer systems, recording the origin of data in the cloud, and also documentation of human-executed processes. The provenance of distributed processes can be modeled by a directed acyclic graph (DAG) where each node represents an entity, and an edge represents the origin and causal relationship between entities. Without sufficient security mechanisms, the provenance graph suffers from integrity and confidentiality problems, for example changes or deletions of the correct nodes, additions of fake nodes and edges, and unauthorized accesses to the sensitive nodes and edges. In this paper, we propose an integrity mechanism for provenance graph using the digital signature involving three parties: the process executors who are responsible in the nodes' creation, a provenance owner that records the nodes to the provenance store, and a trusted party that we call the Trusted Counter Server (TCS) that records the number of nodes stored by the provenance owner. We show that the mechanism can detect the integrity problem in the provenance graph, namely unauthorized and malicious “authorized” updates even if all the parties, except the TCS, collude to update the provenance. In this scheme, the TCS only needs a very minimal storage (linear with the number of the provenance owners). To protect the confidentiality and for an efficient access control administration, we propose a method to encrypt the provenance graph that allows access by paths and compartments in the provenance graph. We argue that encryption is important as a mechanism to protect the provenance data stored in an untrusted environment. We analyze the security of the integrity mechanism, and perform experiments to measure

  20. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  1. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Adam D.

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  2. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  3. 75 FR 82489 - Process for Submissions for Review of Security-Based Swaps for Mandatory Clearing and Notice...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-30

    ... Part IV Securities and Exchange Commission 17 CFR Parts 240 and 249 Process for Submissions for Review of Security-Based Swaps for Mandatory Clearing and Notice Filing Requirements for Clearing...;#0; [[Page 82490

  4. 17 CFR 240.15Ca2-5 - Consent to service of process to be furnished by non-resident government securities brokers or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... Government Securities Dealers § 240.15Ca2-5 Consent to service of process to be furnished by non-resident... government securities dealer by the service of process upon the Commission and the forwarding of a copy...

  5. Behavior of Multiclass Pesticide Residue Concentrations during the Transformation from Rose Petals to Rose Absolute.

    PubMed

    Tascone, Oriane; Fillâtre, Yoann; Roy, Céline; Meierhenrich, Uwe J

    2015-05-27

    This study investigates the concentrations of 54 multiclass pesticides during the transformation processes from rose petal to concrete and absolute using roses spiked with pesticides as a model. The concentrations of the pesticides were followed during the process of transforming the spiked rose flowers from an organic field into concrete and then into absolute. The rose flowers, the concrete, and the absolute, as well as their transformation intermediates, were analyzed for pesticide content using gas chromatography/tandem mass spectrometry. We observed that all the pesticides were extracted and concentrated in the absolute, with the exception of three molecules: fenthion, fenamiphos, and phorate. Typical pesticides were found to be concentrated by a factor of 100-300 from the rose flowers to the rose absolute. The observed effect of pesticide enrichment was also studied in roses and their extracts from four classically phytosanitary treated fields. Seventeen pesticides were detected in at least one of the extracts. Like the case for the spiked samples in our model, the pesticides present in the rose flowers from Turkey were concentrated in the absolute. Two pesticides, methidathion and chlorpyrifos, were quantified in the rose flowers at approximately 0.01 and 0.01-0.05 mg kg(-1), respectively, depending on the treated field. The concentrations determined for the corresponding rose absolutes were 4.7 mg kg(-1) for methidathion and 0.65-27.25 mg kg(-1) for chlorpyrifos.

  6. SOA does not Reveal the Absolute Time Course of Cognitive Processing in Fast Priming Experiments

    PubMed Central

    Tzur, Boaz; Frost, Ram

    2007-01-01

    Applying Bloch's law to visual word recognition research, both exposure duration of the prime and its luminance determine the prime's overall energy, and consequently determine the size of the priming effect. Nevertheless, experimenters using fast-priming paradigms traditionally focus only on the SOA between prime and target to reflect the absolute speed of cognitive processes under investigation. Some of the discrepancies in results regarding the time course of orthographic and phonological activation in word recognition research may be due to this factor. This hypothesis was examined by manipulating parametrically the luminance of the prime and its exposure duration, measuring their joint impact on masked repetition priming. The results show that small and non-significant priming effects can be more than tripled as a result of simply increasing luminance, when SOA is kept constant. Moreover, increased luminance may compensate for briefer exposure duration and vice versa. PMID:18379635

  7. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  8. Forecasting Error Calculation with Mean Absolute Deviation and Mean Absolute Percentage Error

    NASA Astrophysics Data System (ADS)

    Khair, Ummul; Fahmi, Hasanul; Hakim, Sarudin Al; Rahim, Robbi

    2017-12-01

    Prediction using a forecasting method is one of the most important things for an organization, the selection of appropriate forecasting methods is also important but the percentage error of a method is more important in order for decision makers to adopt the right culture, the use of the Mean Absolute Deviation and Mean Absolute Percentage Error to calculate the percentage of mistakes in the least square method resulted in a percentage of 9.77% and it was decided that the least square method be worked for time series and trend data.

  9. Introducing the CERT (Trademark) Resiliency Engineering Framework: Improving the Security and Sustainability Processes

    DTIC Science & Technology

    2007-05-01

    Organizational Structure 40 6.1.3 Funding Model 40 6.1.4 Role of Information Technology 40 6.2 Considering Process Improvement 41 6.2.1 Dimensions of...to the process definition for resiliency engineering. 6.1.3 Funding Model Just as organizational structures tend to align across security and...responsibility. Adopting an enter- prise view of operational resiliency and a process improvement approach requires that the funding model evolve to one

  10. 20 CFR 404.1205 - Absolute coverage groups.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Absolute coverage groups. 404.1205 Section... INSURANCE (1950- ) Coverage of Employees of State and Local Governments What Groups of Employees May Be Covered § 404.1205 Absolute coverage groups. (a) General. An absolute coverage group is a permanent...

  11. 20 CFR 404.1205 - Absolute coverage groups.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Absolute coverage groups. 404.1205 Section... INSURANCE (1950- ) Coverage of Employees of State and Local Governments What Groups of Employees May Be Covered § 404.1205 Absolute coverage groups. (a) General. An absolute coverage group is a permanent...

  12. 20 CFR 404.1205 - Absolute coverage groups.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Absolute coverage groups. 404.1205 Section... INSURANCE (1950- ) Coverage of Employees of State and Local Governments What Groups of Employees May Be Covered § 404.1205 Absolute coverage groups. (a) General. An absolute coverage group is a permanent...

  13. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    NASA Astrophysics Data System (ADS)

    Mohammadi, Hadi

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that

  14. Quantum Secure Direct Communication with Quantum Memory

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-01

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  15. Quantum Secure Direct Communication with Quantum Memory.

    PubMed

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-02

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  16. Variance computations for functional of absolute risk estimates.

    PubMed

    Pfeiffer, R M; Petracci, E

    2011-07-01

    We present a simple influence function based approach to compute the variances of estimates of absolute risk and functions of absolute risk. We apply this approach to criteria that assess the impact of changes in the risk factor distribution on absolute risk for an individual and at the population level. As an illustration we use an absolute risk prediction model for breast cancer that includes modifiable risk factors in addition to standard breast cancer risk factors. Influence function based variance estimates for absolute risk and the criteria are compared to bootstrap variance estimates.

  17. Variance computations for functional of absolute risk estimates

    PubMed Central

    Pfeiffer, R.M.; Petracci, E.

    2011-01-01

    We present a simple influence function based approach to compute the variances of estimates of absolute risk and functions of absolute risk. We apply this approach to criteria that assess the impact of changes in the risk factor distribution on absolute risk for an individual and at the population level. As an illustration we use an absolute risk prediction model for breast cancer that includes modifiable risk factors in addition to standard breast cancer risk factors. Influence function based variance estimates for absolute risk and the criteria are compared to bootstrap variance estimates. PMID:21643476

  18. Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process

    DTIC Science & Technology

    2010-09-01

    IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER...United States. AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER PROCESS...USAF September 2010 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND

  19. Can EHRs and HIEs get along with HIPAA security requirements?

    PubMed

    Sarrico, Christine; Hauenstein, Jim

    2011-02-01

    For Enloe Medical Center in California, a good-faith effort to self-report a breach in the privacy of a patient's medical record resulted in a six-figure fine imposed by a state regulatory agency. Hospitals face a "catch-22" situation in responding to the conflicting mandates of developing electronic health records that allow information sharing across institutions versus ensuring absolute protection and security of patients' individual health information. Some industry analysts suggest that the sanctions for security breaches such as the one experienced by Enloe will have the unintended effect of discouraging self-reporting of breaches.

  20. Exponential bound in the quest for absolute zero

    NASA Astrophysics Data System (ADS)

    Stefanatos, Dionisis

    2017-10-01

    In most studies for the quantification of the third law of thermodynamics, the minimum temperature which can be achieved with a long but finite-time process scales as a negative power of the process duration. In this article, we use our recent complete solution for the optimal control problem of the quantum parametric oscillator to show that the minimum temperature which can be obtained in this system scales exponentially with the available time. The present work is expected to motivate further research in the active quest for absolute zero.

  1. Exponential bound in the quest for absolute zero.

    PubMed

    Stefanatos, Dionisis

    2017-10-01

    In most studies for the quantification of the third law of thermodynamics, the minimum temperature which can be achieved with a long but finite-time process scales as a negative power of the process duration. In this article, we use our recent complete solution for the optimal control problem of the quantum parametric oscillator to show that the minimum temperature which can be obtained in this system scales exponentially with the available time. The present work is expected to motivate further research in the active quest for absolute zero.

  2. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    DTIC Science & Technology

    2017-06-01

    processes. Rothkopf, David J. 2006. Running the World: The Inside Story of The National Security Council and The Architects of American Power . 1st ed...recognized Soviet aims. They aimed to gain power , spread communism, and counter the West. Eisenhower’s belief in American physical and ideological...The Architects of American Power . 1st ed. New York: Public Affairs: 322-324. 22 Burke, Honest Broker?, 341. 23 U.N. Ambassador Albright, Treasury

  3. Challenging process to make the Lateglacial tree-ring chronologies from Europe absolute - an inventory

    NASA Astrophysics Data System (ADS)

    Kaiser, Klaus Felix; Friedrich, Michael; Miramont, Cécile; Kromer, Bernd; Sgier, Mario; Schaub, Matthias; Boeren, Ilse; Remmele, Sabine; Talamo, Sahra; Guibal, Frédéric; Sivan, Olivier

    2012-03-01

    Here we present the entire range of Lateglacial tree-ring chronologies from Switzerland, Germany, France, covering the Lateglacial north and west of the Alps without interruption as well as finds from northern Italy, complemented by a 14C data set of the Swiss chronologies. Geographical expansion of cross-matched European Lateglacial chronologies, limits and prospects of teleconnection between remote sites and extension of the absolute tree-ring chronology are discussed. High frequency signals and long-term fluctuations are revealed by the ring-width data sets of the newly constructed Swiss Late-glacial Master Chronology (SWILM) as well as the Central European Lateglacial Master Chronology (CELM) spanning 1606 years. They agree well with the characteristics of Boelling/Alleroed (GI-1) and the transition into Younger Dryas (GS-1). The regional chronologies of Central Europe may provide improved interconnection to other terrestrial or marine high-resolution archives. Nevertheless the breakthrough to a continuous absolute chronology back to Boelling (GI-1e) has not yet been achieved. A gap remains, even though it is covered by several floating chronologies from France and Switzerland.

  4. Absolute optical metrology : nanometers to kilometers

    NASA Technical Reports Server (NTRS)

    Dubovitsky, Serge; Lay, O. P.; Peters, R. D.; Liebe, C. C.

    2005-01-01

    We provide and overview of the developments in the field of high-accuracy absolute optical metrology with emphasis on space-based applications. Specific work on the Modulation Sideband Technology for Absolute Ranging (MSTAR) sensor is described along with novel applications of the sensor.

  5. A global algorithm for estimating Absolute Salinity

    NASA Astrophysics Data System (ADS)

    McDougall, T. J.; Jackett, D. R.; Millero, F. J.; Pawlowicz, R.; Barker, P. M.

    2012-12-01

    The International Thermodynamic Equation of Seawater - 2010 has defined the thermodynamic properties of seawater in terms of a new salinity variable, Absolute Salinity, which takes into account the spatial variation of the composition of seawater. Absolute Salinity more accurately reflects the effects of the dissolved material in seawater on the thermodynamic properties (particularly density) than does Practical Salinity. When a seawater sample has standard composition (i.e. the ratios of the constituents of sea salt are the same as those of surface water of the North Atlantic), Practical Salinity can be used to accurately evaluate the thermodynamic properties of seawater. When seawater is not of standard composition, Practical Salinity alone is not sufficient and the Absolute Salinity Anomaly needs to be estimated; this anomaly is as large as 0.025 g kg-1 in the northernmost North Pacific. Here we provide an algorithm for estimating Absolute Salinity Anomaly for any location (x, y, p) in the world ocean. To develop this algorithm, we used the Absolute Salinity Anomaly that is found by comparing the density calculated from Practical Salinity to the density measured in the laboratory. These estimates of Absolute Salinity Anomaly however are limited to the number of available observations (namely 811). In order to provide a practical method that can be used at any location in the world ocean, we take advantage of approximate relationships between Absolute Salinity Anomaly and silicate concentrations (which are available globally).

  6. Absolute instability of the Gaussian wake profile

    NASA Technical Reports Server (NTRS)

    Hultgren, Lennart S.; Aggarwal, Arun K.

    1987-01-01

    Linear parallel-flow stability theory has been used to investigate the effect of viscosity on the local absolute instability of a family of wake profiles with a Gaussian velocity distribution. The type of local instability, i.e., convective or absolute, is determined by the location of a branch-point singularity with zero group velocity of the complex dispersion relation for the instability waves. The effects of viscosity were found to be weak for values of the wake Reynolds number, based on the center-line velocity defect and the wake half-width, larger than about 400. Absolute instability occurs only for sufficiently large values of the center-line wake defect. The critical value of this parameter increases with decreasing wake Reynolds number, thereby indicating a shrinking region of absolute instability with decreasing wake Reynolds number. If backflow is not allowed, absolute instability does not occur for wake Reynolds numbers smaller than about 38.

  7. 49 CFR 236.709 - Block, absolute.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Block, absolute. 236.709 Section 236.709 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Block, absolute. A block in which no train is permitted to enter while it is occupied by another train. ...

  8. 49 CFR 236.709 - Block, absolute.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Block, absolute. 236.709 Section 236.709 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Block, absolute. A block in which no train is permitted to enter while it is occupied by another train. ...

  9. Absolute quantification of microbial taxon abundances.

    PubMed

    Props, Ruben; Kerckhof, Frederiek-Maarten; Rubbens, Peter; De Vrieze, Jo; Hernandez Sanabria, Emma; Waegeman, Willem; Monsieurs, Pieter; Hammes, Frederik; Boon, Nico

    2017-02-01

    High-throughput amplicon sequencing has become a well-established approach for microbial community profiling. Correlating shifts in the relative abundances of bacterial taxa with environmental gradients is the goal of many microbiome surveys. As the abundances generated by this technology are semi-quantitative by definition, the observed dynamics may not accurately reflect those of the actual taxon densities. We combined the sequencing approach (16S rRNA gene) with robust single-cell enumeration technologies (flow cytometry) to quantify the absolute taxon abundances. A detailed longitudinal analysis of the absolute abundances resulted in distinct abundance profiles that were less ambiguous and expressed in units that can be directly compared across studies. We further provide evidence that the enrichment of taxa (increase in relative abundance) does not necessarily relate to the outgrowth of taxa (increase in absolute abundance). Our results highlight that both relative and absolute abundances should be considered for a comprehensive biological interpretation of microbiome surveys.

  10. Final report on the Seventh International Comparison of Absolute Gravimeters (ICAG 2005)

    USGS Publications Warehouse

    Jiang, Z.; Francis, O.; Vitushkin, L.; Palinkas, V.; Germak, A.; Becker, M.; D'Agostino, G.; Amalvict, M.; Bayer, R.; Bilker-Koivula, M.; Desogus, S.; Faller, J.; Falk, R.; Hinderer, J.; Gagnon, C.; Jakob, T.; Kalish, E.; Kostelecky, J.; Lee, C.; Liard, J.; Lokshyn, Y.; Luck, B.; Makinen, J.; Mizushima, S.; Le, Moigne N.; Origlia, C.; Pujol, E.R.; Richard, P.; Robertsson, L.; Ruess, D.; Schmerge, D.; Stus, Y.; Svitlov, S.; Thies, S.; Ullrich, C.; Van Camp, M.; Vitushkin, A.; Ji, W.; Wilmes, H.

    2011-01-01

    The Bureau International des Poids et Mesures (BIPM), S??vres, France, hosted the 7th International Comparison of Absolute Gravimeters (ICAG) and the associated Relative Gravity Campaign (RGC) from August to September 2005. ICAG 2005 was prepared and performed as a metrological pilot study, which aimed: To determine the gravity comparison reference values; To determine the offsets of the absolute gravimeters; and As a pilot study to accumulate experience for the CIPM Key Comparisons. This document presents a complete and extensive review of the technical protocol and data processing procedures. The 1st ICAG-RGC comparison was held at the BIPM in 1980-1981 and since then meetings have been organized every 4 years. In this paper, we present an overview of how the meeting was organized, the conditions of BIPM gravimetric sites, technical specifications, data processing strategy and an analysis of the final results. This 7th ICAG final report supersedes all previously published reports. Readings were obtained from participating instruments, 19 absolute gravimeters and 15 relative gravimeters. Precise levelling measurements were carried out and all measurements were performed on the BIPM micro-gravity network which was specifically designed for the comparison. ?? 2011 BIPM & IOP Publishing Ltd.

  11. Absolute Humidity and the Seasonality of Influenza (Invited)

    NASA Astrophysics Data System (ADS)

    Shaman, J. L.; Pitzer, V.; Viboud, C.; Grenfell, B.; Goldstein, E.; Lipsitch, M.

    2010-12-01

    Much of the observed wintertime increase of mortality in temperate regions is attributed to seasonal influenza. A recent re-analysis of laboratory experiments indicates that absolute humidity strongly modulates the airborne survival and transmission of the influenza virus. Here we show that the onset of increased wintertime influenza-related mortality in the United States is associated with anomalously low absolute humidity levels during the prior weeks. We then use an epidemiological model, in which observed absolute humidity conditions temper influenza transmission rates, to successfully simulate the seasonal cycle of observed influenza-related mortality. The model results indicate that direct modulation of influenza transmissibility by absolute humidity alone is sufficient to produce this observed seasonality. These findings provide epidemiological support for the hypothesis that absolute humidity drives seasonal variations of influenza transmission in temperate regions. In addition, we show that variations of the basic and effective reproductive numbers for influenza, caused by seasonal changes in absolute humidity, are consistent with the general timing of pandemic influenza outbreaks observed for 2009 A/H1N1 in temperate regions. Indeed, absolute humidity conditions correctly identify the region of the United States vulnerable to a third, wintertime wave of pandemic influenza. These findings suggest that the timing of pandemic influenza outbreaks is controlled by a combination of absolute humidity conditions, levels of susceptibility and changes in population mixing and contact rates.

  12. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    PubMed

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  13. Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carilli, Jhon T.; Krenzien, Susan K.

    2013-07-01

    The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)

  14. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  15. Low absolute neutrophil counts in African infants.

    PubMed

    Kourtis, Athena P; Bramson, Brian; van der Horst, Charles; Kazembe, Peter; Ahmed, Yusuf; Chasela, Charles; Hosseinipour, Mina; Knight, Rodney; Lugalia, Lebah; Tegha, Gerald; Joaki, George; Jafali, Robert; Jamieson, Denise J

    2005-07-01

    Infants of African origin have a lower normal range of absolute neutrophil counts than white infants; this fact, however, remains under appreciated by clinical researchers in the United States. During the initial stages of a clinical trial in Malawi, the authors noted an unexpectedly high number of infants with absolute neutrophil counts that would be classifiable as neutropenic using the National Institutes of Health's Division of AIDS toxicity tables. The authors argue that the relevant Division of AIDS table does not take into account the available evidence of low absolute neutrophil counts in African infants and that a systematic collection of data from many African settings might help establish the absolute neutrophil count cutpoints to be used for defining neutropenia in African populations.

  16. Absolute colorimetric characterization of a DSLR camera

    NASA Astrophysics Data System (ADS)

    Guarnera, Giuseppe Claudio; Bianco, Simone; Schettini, Raimondo

    2014-03-01

    A simple but effective technique for absolute colorimetric camera characterization is proposed. It offers a large dynamic range requiring just a single, off-the-shelf target and a commonly available controllable light source for the characterization. The characterization task is broken down in two modules, respectively devoted to absolute luminance estimation and to colorimetric characterization matrix estimation. The characterized camera can be effectively used as a tele-colorimeter, giving an absolute estimation of the XYZ data in cd=m2. The user is only required to vary the f - number of the camera lens or the exposure time t, to better exploit the sensor dynamic range. The estimated absolute tristimulus values closely match the values measured by a professional spectro-radiometer.

  17. Alpha absolute power measurement in panic disorder with agoraphobia patients.

    PubMed

    de Carvalho, Marcele Regine; Velasques, Bruna Brandão; Freire, Rafael C; Cagy, Maurício; Marques, Juliana Bittencourt; Teixeira, Silmar; Rangé, Bernard P; Piedade, Roberto; Ribeiro, Pedro; Nardi, Antonio Egidio; Akiskal, Hagop Souren

    2013-10-01

    Panic attacks are thought to be a result from a dysfunctional coordination of cortical and brainstem sensory information leading to heightened amygdala activity with subsequent neuroendocrine, autonomic and behavioral activation. Prefrontal areas may be responsible for inhibitory top-down control processes and alpha synchronization seems to reflect this modulation. The objective of this study was to measure frontal absolute alpha-power with qEEG in 24 subjects with panic disorder and agoraphobia (PDA) compared to 21 healthy controls. qEEG data were acquired while participants watched a computer simulation, consisting of moments classified as "high anxiety"(HAM) and "low anxiety" (LAM). qEEG data were also acquired during two rest conditions, before and after the computer simulation display. We observed a higher absolute alpha-power in controls when compared to the PDA patients while watching the computer simulation. The main finding was an interaction between the moment and group factors on frontal cortex. Our findings suggest that the decreased alpha-power in the frontal cortex for the PDA group may reflect a state of high excitability. Our results suggest a possible deficiency in top-down control processes of anxiety reflected by a low absolute alpha-power in the PDA group while watching the computer simulation and they highlight that prefrontal regions and frontal region nearby the temporal area are recruited during the exposure to anxiogenic stimuli. © 2013 Elsevier B.V. All rights reserved.

  18. Cryogenic, Absolute, High Pressure Sensor

    NASA Technical Reports Server (NTRS)

    Chapman, John J. (Inventor); Shams. Qamar A. (Inventor); Powers, William T. (Inventor)

    2001-01-01

    A pressure sensor is provided for cryogenic, high pressure applications. A highly doped silicon piezoresistive pressure sensor is bonded to a silicon substrate in an absolute pressure sensing configuration. The absolute pressure sensor is bonded to an aluminum nitride substrate. Aluminum nitride has appropriate coefficient of thermal expansion for use with highly doped silicon at cryogenic temperatures. A group of sensors, either two sensors on two substrates or four sensors on a single substrate are packaged in a pressure vessel.

  19. Absolute Income, Relative Income, and Happiness

    ERIC Educational Resources Information Center

    Ball, Richard; Chernova, Kateryna

    2008-01-01

    This paper uses data from the World Values Survey to investigate how an individual's self-reported happiness is related to (i) the level of her income in absolute terms, and (ii) the level of her income relative to other people in her country. The main findings are that (i) both absolute and relative income are positively and significantly…

  20. Antiausterity activity of arctigenin enantiomers: importance of (2R,3R)-absolute configuration.

    PubMed

    Awale, Suresh; Kato, Mamoru; Dibwe, Dya Fita; Li, Feng; Miyoshi, Chika; Esumi, Hiroyasu; Kadota, Shigetoshi; Tezuka, Yasuhiro

    2014-01-01

    From a MeOH extract of powdered roots of Wikstroemia indica, six dibenzyl-gamma-butyrolactone-type lignans with (2S,3S)-absolute configuration [(+)-arctigenin (1), (+)-matairesinol (2), (+)-trachelogenin (3), (+)-nortrachelogenin (4), (+)-hinokinin (5), and (+)-kusunokinin (6)] were isolated, whereas three dibenzyl-gamma-butyrolactone-type lignans with (2R,3R)-absolute configuration [(-)-arctigenin (1*), (-)-matairesinol (2*), (-)-trachelogenin (3*)] were isolated from Trachelospermum asiaticum. The in vitro preferential cytotoxic activity of the nine compounds was evaluated against human pancreatic PANC-1 cancer cells in nutrient-deprived medium (NDM), but none of the six lignans (1-6) with (2S,3S)-absolute configuration showed preferential cytotoxicity. On the other hand, three lignans (1*-3*) with (2R,3R)-absolute configuration exhibited preferential cytotoxicity in a concentration-dependent manner with PC50 values of 0.54, 6.82, and 5.85 microM, respectively. Furthermore, the effect of (-)- and (+)-arctigenin was evaluated against the activation of Akt, which is a key process in the tolerance to nutrition starvation. Interestingly, only (-)-arctigenin (1*) strongly suppressed the activation of Akt. These results indicate that the (2R,3R)-absolute configuration of (-)-enantiomers should be required for the preferential cytotoxicity through the inhibition of Akt activation.

  1. Universal Cosmic Absolute and Modern Science

    NASA Astrophysics Data System (ADS)

    Kostro, Ludwik

    The official Sciences, especially all natural sciences, respect in their researches the principle of methodic naturalism i.e. they consider all phenomena as entirely natural and therefore in their scientific explanations they do never adduce or cite supernatural entities and forces. The purpose of this paper is to show that Modern Science has its own self-existent, self-acting, and self-sufficient Natural All-in Being or Omni-Being i.e. the entire Nature as a Whole that justifies the scientific methodic naturalism. Since this Natural All-in Being is one and only It should be considered as the own scientifically justified Natural Absolute of Science and should be called, in my opinion, the Universal Cosmic Absolute of Modern Science. It will be also shown that the Universal Cosmic Absolute is ontologically enormously stratified and is in its ultimate i.e. in its most fundamental stratum trans-reistic and trans-personal. It means that in its basic stratum. It is neither a Thing or a Person although It contains in Itself all things and persons with all other sentient and conscious individuals as well, On the turn of the 20th century the Science has begun to look for a theory of everything, for a final theory, for a master theory. In my opinion the natural Universal Cosmic Absolute will constitute in such a theory the radical all penetrating Ultimate Basic Reality and will substitute step by step the traditional supernatural personal Absolute.

  2. Jasminum sambac flower absolutes from India and China--geographic variations.

    PubMed

    Braun, Norbert A; Sim, Sherina

    2012-05-01

    Seven Jasminum sambac flower absolutes from different locations in the southern Indian state of Tamil Nadu were analyzed using GC and GC-MS. Focus was placed on 41 key ingredients to investigate geographic variations in this species. These seven absolutes were compared with an Indian bud absolute and commercially available J. sambac flower absolutes from India and China. All absolutes showed broad variations for the 10 main ingredients between 8% and 96%. In addition, the odor of Indian and Chinese J. sambac flower absolutes were assessed.

  3. Determining the 13C(α, n)16O absolute cross section through the concurrent application of ANC and THM and astrophysical consequences for the s-process in AGB-LMSs.

    NASA Astrophysics Data System (ADS)

    Trippella, Oscar; La Cognata, Marco

    2018-01-01

    The 13C(α, n)16O reaction is considered to be the most important neutron source for the s-process main component in low-mass asymptotic giant branch stars. No direct experimental data exist at very low energies and measurements performed through direct techniques show inconsistent results, mostly in their absolute values. In this context, we reversed the usual normalization procedure combining two indirect approaches, the asymptotic normalization coefficient and the Trojan Horse Method, to unambiguously determine the absolute value of the 13C(α, n)16O astrophysical S(E)-factor in the most relevant energy-region for astrophysics. Adopting the new reaction rate for the n-source in the NEWTON s-process nucleosynthesis code, astrophysical calculations show only limited variations, less than 1%, for those nuclei whose production is considered to be totally due to slow neutron captures.

  4. Advancing Absolute Calibration for JWST and Other Applications

    NASA Astrophysics Data System (ADS)

    Rieke, George; Bohlin, Ralph; Boyajian, Tabetha; Carey, Sean; Casagrande, Luca; Deustua, Susana; Gordon, Karl; Kraemer, Kathleen; Marengo, Massimo; Schlawin, Everett; Su, Kate; Sloan, Greg; Volk, Kevin

    2017-10-01

    We propose to exploit the unique optical stability of the Spitzer telescope, along with that of IRAC, to (1) transfer the accurate absolute calibration obtained with MSX on very bright stars directly to two reference stars within the dynamic range of the JWST imagers (and of other modern instrumentation); (2) establish a second accurate absolute calibration based on the absolutely calibrated spectrum of the sun, transferred onto the astronomical system via alpha Cen A; and (3) provide accurate infrared measurements for the 11 (of 15) highest priority stars with no such data but with accurate interferometrically measured diameters, allowing us to optimize determinations of effective temperatures using the infrared flux method and thus to extend the accurate absolute calibration spectrally. This program is integral to plans for an accurate absolute calibration of JWST and will also provide a valuable Spitzer legacy.

  5. Absolute radiometric calibration of advanced remote sensing systems

    NASA Technical Reports Server (NTRS)

    Slater, P. N.

    1982-01-01

    The distinction between the uses of relative and absolute spectroradiometric calibration of remote sensing systems is discussed. The advantages of detector-based absolute calibration are described, and the categories of relative and absolute system calibrations are listed. The limitations and problems associated with three common methods used for the absolute calibration of remote sensing systems are addressed. Two methods are proposed for the in-flight absolute calibration of advanced multispectral linear array systems. One makes use of a sun-illuminated panel in front of the sensor, the radiance of which is monitored by a spectrally flat pyroelectric radiometer. The other uses a large, uniform, high-radiance reference ground surface. The ground and atmospheric measurements required as input to a radiative transfer program to predict the radiance level at the entrance pupil of the orbital sensor are discussed, and the ground instrumentation is described.

  6. Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model

    NASA Astrophysics Data System (ADS)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagrams and writing of textual descriptions. The UML notation and the software program, Star UML are used to support the design of e-Tendering. The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain. In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application. This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth. As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity

  7. Road Map For National Security Addendum on Structure and Process Analyses. Volume 1: Key Observations and Overarching Processes

    DTIC Science & Technology

    2000-01-01

    business of national security. The seven volumes contained herein analyze key organizations and processes throughout the Federal government, to include...Secretary of State (S) Chapter 2 – Under Secretary for Political Affairs (P) Chapter 3 – Under Secretary for Economic, Business and Agricultural Affairs...vulnerabilities of the evolving global economic infrastructure; E. Energy will continue to have a major strategic significance; F. All borders will be more

  8. Linking Comparisons of Absolute Gravimeters: A Proof of Concept for a new Global Absolute Gravity Reference System.

    NASA Astrophysics Data System (ADS)

    Wziontek, H.; Palinkas, V.; Falk, R.; Vaľko, M.

    2016-12-01

    Since decades, absolute gravimeters are compared on a regular basis on an international level, starting at the International Bureau for Weights and Measures (BIPM) in 1981. Usually, these comparisons are based on constant reference values deduced from all accepted measurements acquired during the comparison period. Temporal changes between comparison epochs are usually not considered. Resolution No. 2, adopted by IAG during the IUGG General Assembly in Prague 2015, initiates the establishment of a Global Absolute Gravity Reference System based on key comparisons of absolute gravimeters (AG) under the International Committee for Weights and Measures (CIPM) in order to establish a common level in the microGal range. A stable and unique reference frame can only be achieved, if different AG are taking part in different kind of comparisons. Systematic deviations between the respective comparison reference values can be detected, if the AG can be considered stable over time. The continuous operation of superconducting gravimeters (SG) on selected stations further supports the temporal link of comparison reference values by establishing a reference function over time. By a homogenous reprocessing of different comparison epochs and including AG and SG time series at selected stations, links between several comparisons will be established and temporal comparison reference functions will be derived. By this, comparisons on a regional level can be traced to back to the level of key comparisons, providing a reference for other absolute gravimeters. It will be proved and discussed, how such a concept can be used to support the future absolute gravity reference system.

  9. Iris Cryptography for Security Purpose

    NASA Astrophysics Data System (ADS)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  10. Real-time network security situation visualization and threat assessment based on semi-Markov process

    NASA Astrophysics Data System (ADS)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  11. Securing non-volatile memory regions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  12. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  13. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  14. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  15. 77 FR 52692 - NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-30

    ...-03] NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements... Technology (NIST), Commerce. ACTION: Notice and Request for Comments. SUMMARY: The National Institute of Standards and Technology (NIST) seeks additional comments on specific sections of Federal Information...

  16. Investigating Absolute Value: A Real World Application

    ERIC Educational Resources Information Center

    Kidd, Margaret; Pagni, David

    2009-01-01

    Making connections between various representations is important in mathematics. In this article, the authors discuss the numeric, algebraic, and graphical representations of sums of absolute values of linear functions. The initial explanations are accessible to all students who have experience graphing and who understand that absolute value simply…

  17. Stimulus probability effects in absolute identification.

    PubMed

    Kent, Christopher; Lamberts, Koen

    2016-05-01

    This study investigated the effect of stimulus presentation probability on accuracy and response times in an absolute identification task. Three schedules of presentation were used to investigate the interaction between presentation probability and stimulus position within the set. Data from individual participants indicated strong effects of presentation probability on both proportion correct and response times. The effects were moderated by the ubiquitous stimulus position effect. The accuracy and response time data were predicted by an exemplar-based model of perceptual cognition (Kent & Lamberts, 2005). The bow in discriminability was also attenuated when presentation probability for middle items was relatively high, an effect that will constrain future model development. The study provides evidence for item-specific learning in absolute identification. Implications for other theories of absolute identification are discussed. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. Managing Complex IT Security Processes with Value Based Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2009-01-01

    Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides amore » comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.« less

  19. Social Information Processing, Security of Attachment, and Emotion Regulation in Children with Learning Disabilities

    ERIC Educational Resources Information Center

    Bauminger, Nirit; Kimhi-Kind, Ilanit

    2008-01-01

    This study examined the contribution of attachment security and emotion regulation (ER) to the explanation of social information processing (SIP) in middle childhood boys with learning disabilities (LD) and without LD matched on age and grade level. Children analyzed four social vignettes using Dodge's SIP model and completed the Kerns security…

  20. A Conceptual Approach to Absolute Value Equations and Inequalities

    ERIC Educational Resources Information Center

    Ellis, Mark W.; Bryson, Janet L.

    2011-01-01

    The absolute value learning objective in high school mathematics requires students to solve far more complex absolute value equations and inequalities. When absolute value problems become more complex, students often do not have sufficient conceptual understanding to make any sense of what is happening mathematically. The authors suggest that the…

  1. Absolute pitch in a four-year-old boy with autism.

    PubMed

    Brenton, James N; Devries, Seth P; Barton, Christine; Minnich, Heike; Sokol, Deborah K

    2008-08-01

    Absolute pitch is the ability to identify the pitch of an isolated tone. We report on a 4-year-old boy with autism and absolute pitch, one of the youngest reported in the literature. Absolute pitch is thought to be attributable to a single gene, transmitted in an autosomal-dominant fashion. The association of absolute pitch with autism raises the speculation that this talent could be linked to a genetically distinct subset of children with autism. Further, the identification of absolute pitch in even young children with autism may lead to a lifelong skill.

  2. Determination of the absolute carrier-envelope phase by angle-resolved photoelectron spectra of Ar by intense circularly polarized few-cycle pulses

    NASA Astrophysics Data System (ADS)

    Fukahori, Shinichi; Ando, Toshiaki; Miura, Shun; Kanya, Reika; Yamanouchi, Kaoru; Rathje, Tim; Paulus, Gerhard G.

    2017-05-01

    The angle-resolved photoelectron spectra of Ar are recorded using intense circularly polarized near-infrared few-cycle laser pulses, and the effect of the depletion of Ar atoms by the ionization and the effect of the Coulombic potential are examined by the classical trajectory Monte Carlo simulations. On the basis of the comparison between the experimental and theoretical photoelectron spectra, a procedure for estimating the absolute carrier-envelope phase (CEP) of the few-cycle laser pulses interacting with atoms and molecules is proposed. It is confirmed that the absolute CEP can securely be estimated without any numerical calculations once the angular distribution of the yield of photoelectrons having the kinetic energy larger than 30 eV is measured with the peak laser intensity in the range between 1 ×1014 and 5 ×1014W /c m2 .

  3. The Absolute Spectrum Polarimeter (ASP)

    NASA Technical Reports Server (NTRS)

    Kogut, A. J.

    2010-01-01

    The Absolute Spectrum Polarimeter (ASP) is an Explorer-class mission to map the absolute intensity and linear polarization of the cosmic microwave background and diffuse astrophysical foregrounds over the full sky from 30 GHz to 5 THz. The principal science goal is the detection and characterization of linear polarization from an inflationary epoch in the early universe, with tensor-to-scalar ratio r much greater than 1O(raised to the power of { -3}) and Compton distortion y < 10 (raised to the power of{-6}). We describe the ASP instrument and mission architecture needed to detect the signature of an inflationary epoch in the early universe using only 4 semiconductor bolometers.

  4. The absolute disparity anomaly and the mechanism of relative disparities.

    PubMed

    Chopin, Adrien; Levi, Dennis; Knill, David; Bavelier, Daphne

    2016-06-01

    There has been a long-standing debate about the mechanisms underlying the perception of stereoscopic depth and the computation of the relative disparities that it relies on. Relative disparities between visual objects could be computed in two ways: (a) using the difference in the object's absolute disparities (Hypothesis 1) or (b) using relative disparities based on the differences in the monocular separations between objects (Hypothesis 2). To differentiate between these hypotheses, we measured stereoscopic discrimination thresholds for lines with different absolute and relative disparities. Participants were asked to judge the depth of two lines presented at the same distance from the fixation plane (absolute disparity) or the depth between two lines presented at different distances (relative disparity). We used a single stimulus method involving a unique memory component for both conditions, and no extraneous references were available. We also measured vergence noise using Nonius lines. Stereo thresholds were substantially worse for absolute disparities than for relative disparities, and the difference could not be explained by vergence noise. We attribute this difference to an absence of conscious readout of absolute disparities, termed the absolute disparity anomaly. We further show that the pattern of correlations between vergence noise and absolute and relative disparity acuities can be explained jointly by the existence of the absolute disparity anomaly and by the assumption that relative disparity information is computed from absolute disparities (Hypothesis 1).

  5. The absolute disparity anomaly and the mechanism of relative disparities

    PubMed Central

    Chopin, Adrien; Levi, Dennis; Knill, David; Bavelier, Daphne

    2016-01-01

    There has been a long-standing debate about the mechanisms underlying the perception of stereoscopic depth and the computation of the relative disparities that it relies on. Relative disparities between visual objects could be computed in two ways: (a) using the difference in the object's absolute disparities (Hypothesis 1) or (b) using relative disparities based on the differences in the monocular separations between objects (Hypothesis 2). To differentiate between these hypotheses, we measured stereoscopic discrimination thresholds for lines with different absolute and relative disparities. Participants were asked to judge the depth of two lines presented at the same distance from the fixation plane (absolute disparity) or the depth between two lines presented at different distances (relative disparity). We used a single stimulus method involving a unique memory component for both conditions, and no extraneous references were available. We also measured vergence noise using Nonius lines. Stereo thresholds were substantially worse for absolute disparities than for relative disparities, and the difference could not be explained by vergence noise. We attribute this difference to an absence of conscious readout of absolute disparities, termed the absolute disparity anomaly. We further show that the pattern of correlations between vergence noise and absolute and relative disparity acuities can be explained jointly by the existence of the absolute disparity anomaly and by the assumption that relative disparity information is computed from absolute disparities (Hypothesis 1). PMID:27248566

  6. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  7. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  8. Statistical process control based chart for information systems security

    NASA Astrophysics Data System (ADS)

    Khan, Mansoor S.; Cui, Lirong

    2015-07-01

    Intrusion detection systems have a highly significant role in securing computer networks and information systems. To assure the reliability and quality of computer networks and information systems, it is highly desirable to develop techniques that detect intrusions into information systems. We put forward the concept of statistical process control (SPC) in computer networks and information systems intrusions. In this article we propose exponentially weighted moving average (EWMA) type quality monitoring scheme. Our proposed scheme has only one parameter which differentiates it from the past versions. We construct the control limits for the proposed scheme and investigate their effectiveness. We provide an industrial example for the sake of clarity for practitioner. We give comparison of the proposed scheme with EWMA schemes and p chart; finally we provide some recommendations for the future work.

  9. Office of Command Security Total Quality Management Plan

    DTIC Science & Technology

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  10. 77 FR 13294 - Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... hash algorithms in many computer network applications. On February 11, 2011, NIST published a notice in... Information Security Management Act (FISMA) of 2002 (Pub. L. 107-347), the Secretary of Commerce is authorized to approve Federal Information Processing Standards (FIPS). NIST activities to develop computer...

  11. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less

  12. Introducing the Mean Absolute Deviation "Effect" Size

    ERIC Educational Resources Information Center

    Gorard, Stephen

    2015-01-01

    This paper revisits the use of effect sizes in the analysis of experimental and similar results, and reminds readers of the relative advantages of the mean absolute deviation as a measure of variation, as opposed to the more complex standard deviation. The mean absolute deviation is easier to use and understand, and more tolerant of extreme…

  13. Monolithically integrated absolute frequency comb laser system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wanke, Michael C.

    2016-07-12

    Rather than down-convert optical frequencies, a QCL laser system directly generates a THz frequency comb in a compact monolithically integrated chip that can be locked to an absolute frequency without the need of a frequency-comb synthesizer. The monolithic, absolute frequency comb can provide a THz frequency reference and tool for high-resolution broad band spectroscopy.

  14. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  15. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  16. Numerical model estimating the capabilities and limitations of the fast Fourier transform technique in absolute interferometry

    NASA Astrophysics Data System (ADS)

    Talamonti, James J.; Kay, Richard B.; Krebs, Danny J.

    1996-05-01

    A numerical model was developed to emulate the capabilities of systems performing noncontact absolute distance measurements. The model incorporates known methods to minimize signal processing and digital sampling errors and evaluates the accuracy limitations imposed by spectral peak isolation by using Hanning, Blackman, and Gaussian windows in the fast Fourier transform technique. We applied this model to the specific case of measuring the relative lengths of a compound Michelson interferometer. By processing computer-simulated data through our model, we project the ultimate precision for ideal data, and data containing AM-FM noise. The precision is shown to be limited by nonlinearities in the laser scan. absolute distance, interferometer.

  17. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  18. Lessons from Burundi’s Security Sector Reform Process

    DTIC Science & Technology

    2014-11-01

    Defense University,Africa Center for Strategic Studies,300 Fifth Avenue, Building 20 Fort McNair,Washington ,DC,20319-5066 8. PERFORMING ORGANIZATION...Fifth Avenue, Building 20 Fort McNair Washington, D.C. 20319-5066 Phone: + 1 202-685-7300 Website: www.africacenter.org AfricA Security briefS Director...Official Complicity and Impunity (New York: Human Rights Watch, March 2010). 4 Louis- Alexandre Berg, “Security Governance and the Recurrence of

  19. International Nuclear Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less

  20. A recycling index for food and health security: urban Taipei.

    PubMed

    Huang, Susana Tzy-Ying

    2010-01-01

    The modern food system has evolved into one with highly inefficient activities, producing waste at each step of the food pathway from growing to consumption and disposal. The present challenge is to improve recyclability in the food system as a fundamental need for food and health security. This paper develops a methodological approach for a Food Recycling Index (FRI) as a tool to assess recyclability in the food system, to identify opportunities to reduce waste production and environmental contamination, and to provide a self-assessment tool for participants in the food system. The urban Taipei framework was used to evaluate resource and nutrient flow within the food consumption and waste management processes of the food system. A stepwise approach for a FRI is described: (1) identification of the major inputs and outputs in the food chain; (2) classification of inputs and outputs into modules (energy, water, nutrients, and contaminants); (3) assignment of semi-quantitative scores for each module and food system process using a matrix; (4) assessment for recycling status and recyclability potential; (5) conversion of scores into sub-indices; (6) derivation of an aggregate FRI. A FRI of 1.24 was obtained on the basis of data for kitchen waste management in Taipei, a score which encompasses absolute and relative values for a comprehensive interpretation. It is apparent that a FRI could evolve into a broader ecosystem concept with health relevance. Community end-users and policy planners can adopt this approach to improve food and health security.

  1. A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

    PubMed Central

    Pangalos, George

    2001-01-01

    Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for

  2. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    PubMed

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  3. Integrated homeland security system with passive thermal imaging and advanced video analytics

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  4. The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.

    PubMed

    Shahri, Ahmad Bakhtiyari; Ismail, Zuraini; Mohanna, Shahram

    2016-11-01

    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.

  5. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  6. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form F-X, for appointment of... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers..., F-10 or F-80. Form F-X shall be filed with the Commission: (a) By any issuer registering securities...

  7. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers..., F-10 or F-80. Form F-X shall be filed with the Commission: (a) By any issuer registering securities...

  8. Using, Seeing, Feeling, and Doing Absolute Value for Deeper Understanding

    ERIC Educational Resources Information Center

    Ponce, Gregorio A.

    2008-01-01

    Using sticky notes and number lines, a hands-on activity is shared that anchors initial student thinking about absolute value. The initial point of reference should help students successfully evaluate numeric problems involving absolute value. They should also be able to solve absolute value equations and inequalities that are typically found in…

  9. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing

    NASA Astrophysics Data System (ADS)

    Newe, Thomas; O'Connell, Eoin; Meere, Damien; Yuan, Hongwei; Leen, Gabriel; O'Keeffe, Sinead; Lewis, Elfed

    2016-05-01

    Recent advancements in cloud computing technologies in the context of optical and optical fibre based systems are reported. The proliferation of real time and multi-channel based sensor systems represents significant growth in data volume. This coupled with a growing need for security presents many challenges and presents a huge opportunity for an evolutionary step in the widespread application of these sensing technologies. A tiered infrastructural system approach is adopted that is designed to facilitate the delivery of Optical Fibre-based "SENsing as a Service- SENaaS". Within this infrastructure, novel optical sensing platforms, deployed within different environments, are interfaced with a Cloud-based backbone infrastructure which facilitates the secure collection, storage and analysis of real-time data. Feedback systems, which harness this data to affect a change within the monitored location/environment/condition, are also discussed. The cloud based system presented here can also be used with chemical and physical sensors that require real-time data analysis, processing and feedback.

  10. Absolute nuclear material assay using count distribution (LAMBDA) space

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prasad, Mano K.; Snyderman, Neal J.; Rowland, Mark S.

    A method of absolute nuclear material assay of an unknown source comprising counting neutrons from the unknown source and providing an absolute nuclear material assay utilizing a model to optimally compare to the measured count distributions. In one embodiment, the step of providing an absolute nuclear material assay comprises utilizing a random sampling of analytically computed fission chain distributions to generate a continuous time-evolving sequence of event-counts by spreading the fission chain distribution in time.

  11. Planck absolute entropy of a rotating BTZ black hole

    NASA Astrophysics Data System (ADS)

    Riaz, S. M. Jawwad

    2018-04-01

    In this paper, the Planck absolute entropy and the Bekenstein-Smarr formula of the rotating Banados-Teitelboim-Zanelli (BTZ) black hole are presented via a complex thermodynamical system contributed by its inner and outer horizons. The redefined entropy approaches zero as the temperature of the rotating BTZ black hole tends to absolute zero, satisfying the Nernst formulation of a black hole. Hence, it can be regarded as the Planck absolute entropy of the rotating BTZ black hole.

  12. Absolute nuclear material assay using count distribution (LAMBDA) space

    DOEpatents

    Prasad, Manoj K [Pleasanton, CA; Snyderman, Neal J [Berkeley, CA; Rowland, Mark S [Alamo, CA

    2012-06-05

    A method of absolute nuclear material assay of an unknown source comprising counting neutrons from the unknown source and providing an absolute nuclear material assay utilizing a model to optimally compare to the measured count distributions. In one embodiment, the step of providing an absolute nuclear material assay comprises utilizing a random sampling of analytically computed fission chain distributions to generate a continuous time-evolving sequence of event-counts by spreading the fission chain distribution in time.

  13. Quantum image processing: A review of advances in its security technologies

    NASA Astrophysics Data System (ADS)

    Yan, Fei; Iliyasu, Abdullah M.; Le, Phuc Q.

    In this review, we present an overview of the advances made in quantum image processing (QIP) comprising of the image representations, the operations realizable on them, and the likely protocols and algorithms for their applications. In particular, we focus on recent progresses on QIP-based security technologies including quantum watermarking, quantum image encryption, and quantum image steganography. This review is aimed at providing readers with a succinct, yet adequate compendium of the progresses made in the QIP sub-area. Hopefully, this effort will stimulate further interest aimed at the pursuit of more advanced algorithms and experimental validations for available technologies and extensions to other domains.

  14. Optoelectronic device for the measurement of the absolute linear position in the micrometric displacement range

    NASA Astrophysics Data System (ADS)

    Morlanes, Tomas; de la Pena, Jose L.; Sanchez-Brea, Luis M.; Alonso, Jose; Crespo, Daniel; Saez-Landete, Jose B.; Bernabeu, Eusebio

    2005-07-01

    In this work, an optoelectronic device that provides the absolute position of a measurement element with respect to a pattern scale upon switch-on is presented. That means that there is not a need to perform any kind of transversal displacement after the startup of the system. The optoelectronic device is based on the process of light propagation passing through a slit. A light source with a definite size guarantees the relation of distances between the different elements that constitute our system and allows getting a particular optical intensity profile that can be measured by an electronic post-processing device providing the absolute location of the system with a resolution of 1 micron. The accuracy of this measuring device is restricted to the same limitations of any incremental position optical encoder.

  15. Smart security and securing data through watermarking

    NASA Astrophysics Data System (ADS)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  16. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  17. Novalis' Poetic Uncertainty: A "Bildung" with the Absolute

    ERIC Educational Resources Information Center

    Mika, Carl

    2016-01-01

    Novalis, the Early German Romantic poet and philosopher, had at the core of his work a mysterious depiction of the "absolute." The absolute is Novalis' name for a substance that defies precise knowledge yet calls for a tentative and sensitive speculation. How one asserts a truth, represents an object, and sets about encountering things…

  18. Population-based absolute risk estimation with survey data

    PubMed Central

    Kovalchik, Stephanie A.; Pfeiffer, Ruth M.

    2013-01-01

    Absolute risk is the probability that a cause-specific event occurs in a given time interval in the presence of competing events. We present methods to estimate population-based absolute risk from a complex survey cohort that can accommodate multiple exposure-specific competing risks. The hazard function for each event type consists of an individualized relative risk multiplied by a baseline hazard function, which is modeled nonparametrically or parametrically with a piecewise exponential model. An influence method is used to derive a Taylor-linearized variance estimate for the absolute risk estimates. We introduce novel measures of the cause-specific influences that can guide modeling choices for the competing event components of the model. To illustrate our methodology, we build and validate cause-specific absolute risk models for cardiovascular and cancer deaths using data from the National Health and Nutrition Examination Survey. Our applications demonstrate the usefulness of survey-based risk prediction models for predicting health outcomes and quantifying the potential impact of disease prevention programs at the population level. PMID:23686614

  19. Absolute marine gravimetry with matter-wave interferometry.

    PubMed

    Bidel, Y; Zahzam, N; Blanchard, C; Bonnin, A; Cadoret, M; Bresson, A; Rouxel, D; Lequentrec-Lalancette, M F

    2018-02-12

    Measuring gravity from an aircraft or a ship is essential in geodesy, geophysics, mineral and hydrocarbon exploration, and navigation. Today, only relative sensors are available for onboard gravimetry. This is a major drawback because of the calibration and drift estimation procedures which lead to important operational constraints. Atom interferometry is a promising technology to obtain onboard absolute gravimeter. But, despite high performances obtained in static condition, no precise measurements were reported in dynamic. Here, we present absolute gravity measurements from a ship with a sensor based on atom interferometry. Despite rough sea conditions, we obtained precision below 10 -5  m s -2 . The atom gravimeter was also compared with a commercial spring gravimeter and showed better performances. This demonstration opens the way to the next generation of inertial sensors (accelerometer, gyroscope) based on atom interferometry which should provide high-precision absolute measurements from a moving platform.

  20. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  1. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  2. The absolute dynamic ocean topography (ADOT)

    NASA Astrophysics Data System (ADS)

    Bosch, Wolfgang; Savcenko, Roman

    The sea surface slopes relative to the geoid (an equipotential surface) basically carry the in-formation on the absolute velocity field of the surface circulation. Pure oceanographic models may remain unspecific with respect to the absolute level of the ocean topography. In contrast, the geodetic approach to estimate the ocean topography as difference between sea level and the geoid gives by definition an absolute dynamic ocean topography (ADOT). This approach requires, however, a consistent treatment of geoid and sea surface heights, the first being usually derived from a band limited spherical harmonic series of the Earth gravity field and the second observed with much higher spectral resolution by satellite altimetry. The present contribution shows a procedure for estimating the ADOT along the altimeter profiles, preserving as much sea surface height details as the consistency w.r.t. the geoid heights will allow. The consistent treatment at data gaps and the coast is particular demanding and solved by a filter correction. The ADOT profiles are inspected for their innocent properties towards the coast and compared to external estimates of the ocean topography or the velocity field of the surface circulation as derived, for example, by ARGO floats.

  3. Absolute configuration of a chiral CHD group via neutron diffraction: confirmation of the absolute stereochemistry of the enzymatic formation of malic acid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bau, R.; Brewer, I.; Chiang, M.Y.

    Neutron diffraction has been used to monitor the absolute stereochemistry of an enzymatic reaction. (-)(2S)malic-3-d acid was prepared by the action of fumarase on fumaric acid in D/sub 2/O. After a large number of cations were screened, it was found that (+)(R)..cap alpha..-phenylethylamine forms the large crystals necessary for a neutron diffraction analysis. The subsequent structure determination showed that (+)(R)..cap alpha..-phenylethylammonium (-)(2S)malate-3-d has an absolute configuration of R at the CHD site. This result confirms the absolute stereochemistry of fumarate-to-malate transformation as catalyzed by the enzyme fumarase.

  4. GEMSS: privacy and security for a medical Grid.

    PubMed

    Middleton, S E; Herveg, J A M; Crazzolara, F; Marvin, D; Poullet, Y

    2005-01-01

    The GEMSS project is developing a secure Grid infrastructure through which six medical simulations services can be invoked. We examine the legal and security framework within which GEMSS operates. We provide a legal qualification to the operations performed upon patient data, in view of EU directive 95/46, when using medical applications on the GEMSS Grid. We identify appropriate measures to ensure security and describe the legal rationale behind our choice of security technology. Our legal analysis demonstrates there must be an identified controller (typically a hospital) of patient data. The controller must then choose a processor (in this context a Grid service provider) that provides sufficient guarantees with respect to the security of their technical and organizational data processing procedures. These guarantees must ensure a level of security appropriate to the risks, with due regard to the state of the art and the cost of their implementation. Our security solutions are based on a public key infrastructure (PKI), transport level security and end-to-end security mechanisms in line with the web service (WS Security, WS Trust and SecureConversation) security specifications. The GEMSS infrastructure ensures a degree of protection of patient data that is appropriate for the health care sector, and is in line with the European directives. We hope that GEMSS will become synonymous with high security data processing, providing a framework by which GEMSS service providers can provide the security guarantees required by hospitals with regard to the processing of patient data.

  5. Perimeter security for Minnesota correctional facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crist, D.; Spencer, D.D.

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned newmore » construction at other facilities.« less

  6. Absolute stellar photometry on moderate-resolution FPA images

    USGS Publications Warehouse

    Stone, T.C.

    2009-01-01

    An extensive database of star (and Moon) images has been collected by the ground-based RObotic Lunar Observatory (ROLO) as part of the US Geological Survey program for lunar calibration. The stellar data are used to derive nightly atmospheric corrections for the observations from extinction measurements, and absolute calibration of the ROLO sensors is based on observations of Vega and published reference flux and spectrum data. The ROLO telescopes were designed for imaging the Moon at moderate resolution, thus imposing some limitations for the stellar photometry. Attaining accurate stellar photometry with the ROLO image data has required development of specialized processing techniques. A key consideration is consistency in discriminating the star core signal from the off-axis point spread function. The analysis and processing methods applied to the ROLO stellar image database are described. ?? 2009 BIPM and IOP Publishing Ltd.

  7. Automated Data Processing Support of Investigation and Security Missions at the Defense Investigative Service

    DTIC Science & Technology

    1990-03-29

    This is our final report on the Audit of Automated Data Processing Support of Investigative and Security Missions at the Defense Investigative...Service for your information and use. Comments on a draft of this report were considered in preparing the final report. The audit was made from May through...October 1989. The objectives of the audit were to determine if the Defense Investigative Service (DIS) was effectively managing automated data

  8. The Absolute Magnitude of the Sun in Several Filters

    NASA Astrophysics Data System (ADS)

    Willmer, Christopher N. A.

    2018-06-01

    This paper presents a table with estimates of the absolute magnitude of the Sun and the conversions from vegamag to the AB and ST systems for several wide-band filters used in ground-based and space-based observatories. These estimates use the dustless spectral energy distribution (SED) of Vega, calibrated absolutely using the SED of Sirius, to set the vegamag zero-points and a composite spectrum of the Sun that coadds space-based observations from the ultraviolet to the near-infrared with models of the Solar atmosphere. The uncertainty of the absolute magnitudes is estimated by comparing the synthetic colors with photometric measurements of solar analogs and is found to be ∼0.02 mag. Combined with the uncertainty of ∼2% in the calibration of the Vega SED, the errors of these absolute magnitudes are ∼3%–4%. Using these SEDs, for three of the most utilized filters in extragalactic work the estimated absolute magnitudes of the Sun are M B = 5.44, M V = 4.81, and M K = 3.27 mag in the vegamag system and M B = 5.31, M V = 4.80, and M K = 5.08 mag in AB.

  9. Absolute calibration of sniffer probes on Wendelstein 7-X

    NASA Astrophysics Data System (ADS)

    Moseev, D.; Laqua, H. P.; Marsen, S.; Stange, T.; Braune, H.; Erckmann, V.; Gellert, F.; Oosterbeek, J. W.

    2016-08-01

    Here we report the first measurements of the power levels of stray radiation in the vacuum vessel of Wendelstein 7-X using absolutely calibrated sniffer probes. The absolute calibration is achieved by using calibrated sources of stray radiation and the implicit measurement of the quality factor of the Wendelstein 7-X empty vacuum vessel. Normalized absolute calibration coefficients agree with the cross-calibration coefficients that are obtained by the direct measurements, indicating that the measured absolute calibration coefficients and stray radiation levels in the vessel are valid. Close to the launcher, the stray radiation in the empty vessel reaches power levels up to 340 kW/m2 per MW injected beam power. Furthest away from the launcher, i.e., half a toroidal turn, still 90 kW/m2 per MW injected beam power is measured.

  10. Absolute calibration of sniffer probes on Wendelstein 7-X.

    PubMed

    Moseev, D; Laqua, H P; Marsen, S; Stange, T; Braune, H; Erckmann, V; Gellert, F; Oosterbeek, J W

    2016-08-01

    Here we report the first measurements of the power levels of stray radiation in the vacuum vessel of Wendelstein 7-X using absolutely calibrated sniffer probes. The absolute calibration is achieved by using calibrated sources of stray radiation and the implicit measurement of the quality factor of the Wendelstein 7-X empty vacuum vessel. Normalized absolute calibration coefficients agree with the cross-calibration coefficients that are obtained by the direct measurements, indicating that the measured absolute calibration coefficients and stray radiation levels in the vessel are valid. Close to the launcher, the stray radiation in the empty vessel reaches power levels up to 340 kW/m(2) per MW injected beam power. Furthest away from the launcher, i.e., half a toroidal turn, still 90 kW/m(2) per MW injected beam power is measured.

  11. Preparation of an oakmoss absolute with reduced allergenic potential.

    PubMed

    Ehret, C; Maupetit, P; Petrzilka, M; Klecak, G

    1992-06-01

    Synopsis Oakmoss absolute, an extract of the lichen Evernia prunastri, is known to cause allergenic skin reactions due to the presence of certain aromatic aldehydes such as atranorin, chloratranorin, ethyl hematommate and ethyl chlorohematommate. In this paper it is shown that treatment of Oakmoss absolute with amino acids such as lysine and/or leucine, lowers considerably the content of these allergenic constituents including atranol and chloratranol. The resulting Oakmoss absolute, which exhibits an excellent olfactive quality, was tested extensively in comparative studies on guinea pigs and on man. The results of the Guinea Pig Maximization Test (GPMT) and Human Repeated Insult Patch Test (HRIPT) indicate that, in comparison with the commercial test sample, the allergenicity of this new quality of Oakmoss absolute was considerably reduced, and consequently better skin tolerance of this fragrance for man was achieved.

  12. Physics of negative absolute temperatures.

    PubMed

    Abraham, Eitan; Penrose, Oliver

    2017-01-01

    Negative absolute temperatures were introduced into experimental physics by Purcell and Pound, who successfully applied this concept to nuclear spins; nevertheless, the concept has proved controversial: a recent article aroused considerable interest by its claim, based on a classical entropy formula (the "volume entropy") due to Gibbs, that negative temperatures violated basic principles of statistical thermodynamics. Here we give a thermodynamic analysis that confirms the negative-temperature interpretation of the Purcell-Pound experiments. We also examine the principal arguments that have been advanced against the negative temperature concept; we find that these arguments are not logically compelling, and moreover that the underlying "volume" entropy formula leads to predictions inconsistent with existing experimental results on nuclear spins. We conclude that, despite the counterarguments, negative absolute temperatures make good theoretical sense and did occur in the experiments designed to produce them.

  13. Absolute shape measurements using high-resolution optoelectronic holography methods

    NASA Astrophysics Data System (ADS)

    Furlong, Cosme; Pryputniewicz, Ryszard J.

    2000-01-01

    Characterization of surface shape and deformation is of primary importance in a number of testing and metrology applications related to the functionality, performance, and integrity of components. In this paper, a unique, compact, and versatile state-of-the-art fiber-optic-based optoelectronic holography (OEH) methodology is described. This description addresses apparatus and analysis algorithms, especially developed to perform measurements of both absolute surface shape and deformation. The OEH can be arranged in multiple configurations, which include the three-camera, three-illumination, and in-plane speckle correlation setups. With the OEH apparatus and analysis algorithms, absolute shape measurements can be made, using present setup, with a spatial resolution and accuracy of better than 30 and 10 micrometers , respectively, for volumes characterized by a 300-mm length. Optimizing the experimental setup and incorporating equipment, as it becomes available, having superior capabilities to the ones utilized in the present investigations can further increase resolution and accuracy in the measurements. The particular feature of this methodology is its capability to export the measurements data directly into CAD environments for subsequent processing, analysis, and definition of CAD/CAE models.

  14. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8... registered on Form F-7 (§ 249.37 of this chapter), F-8, F-9, F-10 or F-80. Form F-X shall be filed with the...

  15. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form F-X, for appointment of... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8... registered on Form F-7 (§ 249.37 of this chapter), F-8, F-9, F-10 or F-80. Form F-X shall be filed with the...

  16. Absolute gravimetry for monitoring geodynamics in Greenland.

    NASA Astrophysics Data System (ADS)

    Nielsen, E.; Strykowski, G.; Forsberg, R.

    2015-12-01

    Here are presented the preliminary results of the absolute gravity measurements done in Greenland by DTU Space with their A10 absolute gravimeter (the A10-019). The purpose, besides establishing and maintaining a national gravity network, is to study geodynamics.The absolute gravity measurements are juxtaposed with the permanent GNET GNSS stations. The first measurements were conducted in 2009 and a few sites have been re-visited. As of present is there a gravity value at 18 GNET sites.There are challenges in interpreting the measurements from Greenland and several signals has to be taken into account, besides the geodynamical signals originating from the changing load of the ice, there is also a clear signal of direct attraction from different masses. Here are presented the preliminary results of our measurements in Greenland and attempts explain them through modelling of the geodynamical signals and the direct attraction from the ocean and ice.

  17. Strongly nonlinear theory of rapid solidification near absolute stability

    NASA Astrophysics Data System (ADS)

    Kowal, Katarzyna N.; Altieri, Anthony L.; Davis, Stephen H.

    2017-10-01

    We investigate the nonlinear evolution of the morphological deformation of a solid-liquid interface of a binary melt under rapid solidification conditions near two absolute stability limits. The first of these involves the complete stabilization of the system to cellular instabilities as a result of large enough surface energy. We derive nonlinear evolution equations in several limits in this scenario and investigate the effect of interfacial disequilibrium on the nonlinear deformations that arise. In contrast to the morphological stability problem in equilibrium, in which only cellular instabilities appear and only one absolute stability boundary exists, in disequilibrium the system is prone to oscillatory instabilities and a second absolute stability boundary involving attachment kinetics arises. Large enough attachment kinetics stabilize the oscillatory instabilities. We derive a nonlinear evolution equation to describe the nonlinear development of the solid-liquid interface near this oscillatory absolute stability limit. We find that strong asymmetries develop with time. For uniform oscillations, the evolution equation for the interface reduces to the simple form f''+(βf')2+f =0 , where β is the disequilibrium parameter. Lastly, we investigate a distinguished limit near both absolute stability limits in which the system is prone to both cellular and oscillatory instabilities and derive a nonlinear evolution equation that captures the nonlinear deformations in this limit. Common to all these scenarios is the emergence of larger asymmetries in the resulting shapes of the solid-liquid interface with greater departures from equilibrium and larger morphological numbers. The disturbances additionally sharpen near the oscillatory absolute stability boundary, where the interface becomes deep-rooted. The oscillations are time-periodic only for small-enough initial amplitudes and their frequency depends on a single combination of physical parameters, including the

  18. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    PubMed

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  19. Absolute far-ultraviolet spectrophotometry of hot subluminous stars from Voyager

    NASA Technical Reports Server (NTRS)

    Holberg, J. B.; Ali, B.; Carone, T. E.; Polidan, R. S.

    1991-01-01

    Observations, obtained with the Voyager ultraviolet spectrometers, are presented of absolute fluxes for two well-known hot subluminous stars: BD + 28 deg 4211, an sdO, and G191 - B2B, a hot DA white dwarf. Complete absolute energy distributions for these two stars, from the Lyman limit at 912 A to 1 micron, are given. For BD + 28 deg 4211, a single power law closely represents the entire observed energy distribution. For G191 - B2B, a pure hydrogen model atmosphere provides an excellent match to the entire absolute energy distribution. Voyager absolute fluxes are discussed in relation to those reported from various sounding rocket experiments, including a recent rocket observation of BD + 28 deg 4211.

  20. From Hubble's NGSL to Absolute Fluxes

    NASA Technical Reports Server (NTRS)

    Heap, Sara R.; Lindler, Don

    2012-01-01

    Hubble's Next Generation Spectral Library (NGSL) consists of R-l000 spectra of 374 stars of assorted temperature, gravity, and metallicity. Each spectrum covers the wavelength range, 0.18-1.00 microns. The library can be viewed and/or downloaded from the website, http://archive.stsci.edu/prepds/stisngsll. Stars in the NGSL are now being used as absolute flux standards at ground-based observatories. However, the uncertainty in the absolute flux is about 2%, which does not meet the requirements of dark-energy surveys. We are therefore developing an observing procedure that should yield fluxes with uncertainties less than 1 % and will take part in an HST proposal to observe up to 15 stars using this new procedure.

  1. Where Is the Ulnar Styloid Process? Identification of the Absolute Location of the Ulnar Styloid Process Based on CT and Verification of Neutral Forearm Rotation on Lateral Radiographs of the Wrist.

    PubMed

    Shin, Seung-Han; Lee, Yong-Suk; Kang, Jin-Woo; Noh, Dong-Young; Jung, Joon-Yong; Chung, Yang-Guk

    2018-03-01

    The location of the ulnar styloid process can be confusing because the radius and the hand rotate around the ulna. The purpose of this study was to identify the absolute location of the ulnar styloid process, which is independent of forearm pronation or supination, to use it as a reference for neutral forearm rotation on lateral radiographs of the wrist. Computed tomography (CT) images of 23 forearms taken with elbow flexion of 70° to 90° were analyzed. The axial CT images were reconstructed to be perpendicular to the distal ulnar shaft. The absolute location of the ulnar styloid process in this study was defined as the position of the ulnar styloid process on the axial plane of the ulnar head relative to the long axis of the humeral shaft with the elbow set in the position for standard lateral radiographs of the wrist. To identify in which direction the ulnar styloid is located on the axial plane of the ulnar head, the angle between "the line of humeral long axis projected on the axial plane of the ulna" and "the line passing the center of the ulnar head and the center of the ulnar styloid" was measured (ulnar styloid direction angle). To identify how volarly or dorsally the ulnar styloid should appear on the true lateral view of the wrist, the ratio of "the volar-dorsal diameter of the ulnar head" and "the distance between the volar-most aspect of the ulnar head and the center of the ulnar styloid" was calculated (ulnar styloid location ratio). The mean ulnar styloid direction angle was 12° dorsally. The mean ulnar styloid location ratio was 1:0.55. The ulnar styloid is located at nearly the ulnar-most (the opposite side of the humerus with the elbow flexed) and slightly dorsal aspects of the ulnar head on the axial plane. It should appear almost midway (55% dorsally) from the ulnar head on the standard lateral view of the wrist in neutral forearm rotation. These location references could help clinicians determine whether the forearm is in neutral or rotated

  2. Absolute calibration of optical flats

    DOEpatents

    Sommargren, Gary E.

    2005-04-05

    The invention uses the phase shifting diffraction interferometer (PSDI) to provide a true point-by-point measurement of absolute flatness over the surface of optical flats. Beams exiting the fiber optics in a PSDI have perfect spherical wavefronts. The measurement beam is reflected from the optical flat and passed through an auxiliary optic to then be combined with the reference beam on a CCD. The combined beams include phase errors due to both the optic under test and the auxiliary optic. Standard phase extraction algorithms are used to calculate this combined phase error. The optical flat is then removed from the system and the measurement fiber is moved to recombine the two beams. The newly combined beams include only the phase errors due to the auxiliary optic. When the second phase measurement is subtracted from the first phase measurement, the absolute phase error of the optical flat is obtained.

  3. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    ERIC Educational Resources Information Center

    Mohammadi, Hadi

    2014-01-01

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…

  4. Mapping hemispheric symmetries, relative asymmetries, and absolute asymmetries underlying the auditory laterality effect.

    PubMed

    Westerhausen, René; Kompus, Kristiina; Hugdahl, Kenneth

    2014-01-01

    Functional hemispheric differences for speech and language processing have been traditionally studied by using verbal dichotic-listening paradigms. The commonly observed right-ear preference for the report of dichotically presented syllables is taken to reflect the left hemispheric dominance for speech processing. However, the results of recent functional imaging studies also show that both hemispheres - not only the left - are engaged by dichotic listening, suggesting a more complex relationship between behavioral laterality and functional hemispheric activation asymmetries. In order to more closely examine the hemispheric differences underlying dichotic-listening performance, we report an analysis of functional magnetic resonance imaging (fMRI) data of 104 right-handed subjects, for the first time combining an interhemispheric difference and conjunction analysis. This approach allowed for a distinction of homotopic brain regions which showed symmetrical (i.e., brain region significantly activated in both hemispheres and no activation difference between the hemispheres), relative asymmetrical (i.e., activated in both hemispheres but significantly stronger in one than the other hemisphere), and absolute asymmetrical activation patterns (i.e., activated only in one hemisphere and this activation is significantly stronger than in the other hemisphere). Symmetrical activation was found in large clusters encompassing temporal, parietal, inferior frontal, and medial superior frontal regions. Relative and absolute left-ward asymmetries were found in the posterior superior temporal gyrus, located adjacent to symmetrically activated areas, and creating a lateral-medial gradient from symmetrical towards absolute asymmetrical activation within the peri-Sylvian region. Absolute leftward asymmetry was also found in the post-central and medial superior frontal gyri, while rightward asymmetries were found in middle temporal and middle frontal gyri. We conclude that dichotic

  5. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  6. A Snapshot of the Electronic Transmission and Processing of Prescriptions project in the Iranian Social Security Organization

    PubMed Central

    Moghaddam, Ramin; Badredine, Hala

    2006-01-01

    Iranian Social Security Organization(ISSO) is going to enable the sharing of health related information in a secure environment by means of reliable data in the right time to improve health of insured people throughout the country. There are around 7000 pharmacy throughout the country that ISSO contracted with them in order to deliver seamless services to 30 million insured people. The management of the huge amount of prescriptions based on a scientific basis with considering the financial issues of rising the cost of medicaments certainley needs a sophisticated business process reeingineering using ICT ; the work that is going to be completed in the ISSO in next few months. PMID:17238655

  7. Probative value of absolute and relative judgments in eyewitness identification.

    PubMed

    Clark, Steven E; Erickson, Michael A; Breneman, Jesse

    2011-10-01

    It is well-accepted that eyewitness identification decisions based on relative judgments are less accurate than identification decisions based on absolute judgments. However, the theoretical foundation for this view has not been established. In this study relative and absolute judgments were compared through simulations of the WITNESS model (Clark, Appl Cogn Psychol 17:629-654, 2003) to address the question: Do suspect identifications based on absolute judgments have higher probative value than suspect identifications based on relative judgments? Simulations of the WITNESS model showed a consistent advantage for absolute judgments over relative judgments for suspect-matched lineups. However, simulations of same-foils lineups showed a complex interaction based on the accuracy of memory and the similarity relationships among lineup members.

  8. Determination of Absolute Zero Using a Computer-Based Laboratory

    ERIC Educational Resources Information Center

    Amrani, D.

    2007-01-01

    We present a simple computer-based laboratory experiment for evaluating absolute zero in degrees Celsius, which can be performed in college and undergraduate physical sciences laboratory courses. With a computer, absolute zero apparatus can help demonstrators or students to observe the relationship between temperature and pressure and use…

  9. Mechanisms of Power within a Community-Based Food Security Planning Process

    ERIC Educational Resources Information Center

    McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer; Habicht, Jean-Pierre

    2004-01-01

    A community food security movement has begun to address problems of hunger and food insecurity by utilizing a community-based approach. Although various models have been implemented, little empirical research has assessed how power operates within community-based food security initiatives. The purpose of this research was to determine how power…

  10. Computationally Aided Absolute Stereochemical Determination of Enantioenriched Amines.

    PubMed

    Zhang, Jun; Gholami, Hadi; Ding, Xinliang; Chun, Minji; Vasileiou, Chrysoula; Nehira, Tatsuo; Borhan, Babak

    2017-03-17

    A simple and efficient protocol for sensing the absolute stereochemistry and enantiomeric excess of chiral monoamines is reported. Preparation of the sample requires a single-step reaction of the 1,1'-(bromomethylene)dinaphthalene (BDN) with the chiral amine. Analysis of the exciton coupled circular dichroism generated from the BDN-derivatized chiral amine sample, along with comparison to conformational analysis performed computationally, yields the absolute stereochemistry of the parent chiral monoamine.

  11. Use of Absolute and Comparative Performance Feedback in Absolute and Comparative Judgments and Decisions

    ERIC Educational Resources Information Center

    Moore, Don A.; Klein, William M. P.

    2008-01-01

    Which matters more--beliefs about absolute ability or ability relative to others? This study set out to compare the effects of such beliefs on satisfaction with performance, self-evaluations, and bets on future performance. In Experiment 1, undergraduate participants were told they had answered 20% correct, 80% correct, or were not given their…

  12. Landsat-7 ETM+ radiometric stability and absolute calibration

    USGS Publications Warehouse

    Markham, B.L.; Barker, J.L.; Barsi, J.A.; Kaita, E.; Thome, K.J.; Helder, D.L.; Palluconi, Frank Don; Schott, J.R.; Scaramuzza, Pat; ,

    2002-01-01

    Launched in April 1999, the Landsat-7 ETM+ instrument is in its fourth year of operation. The quality of the acquired calibrated imagery continues to be high, especially with respect to its three most important radiometric performance parameters: reflective band instrument stability to better than ??1%, reflective band absolute calibration to better than ??5%, and thermal band absolute calibration to better than ??0.6 K. The ETM+ instrument has been the most stable of any of the Landsat instruments, in both the reflective and thermal channels. To date, the best on-board calibration source for the reflective bands has been the Full Aperture Solar Calibrator, which has indicated changes of at most -1.8% to -2.0% (95% C.I.) change per year in the ETM+ gain (band 4). However, this change is believed to be caused by changes in the solar diffuser panel, as opposed to a change in the instrument's gain. This belief is based partially on ground observations, which bound the changes in gain in band 4 at -0.7% to +1.5%. Also, ETM+ stability is indicated by the monitoring of desert targets. These image-based results for four Saharan and Arabian sites, for a collection of 35 scenes over the three years since launch, bound the gain change at -0.7% to +0.5% in band 4. Thermal calibration from ground observations revealed an offset error of +0.31 W/m 2 sr um soon after launch. This offset was corrected within the U. S. ground processing system at EROS Data Center on 21-Dec-00, and since then, the band 6 on-board calibration has indicated changes of at most +0.02% to +0.04% (95% C.I.) per year. The latest ground observations have detected no remaining offset error with an RMS error of ??0.6 K. The stability and absolute calibration of the Landsat-7 ETM+ sensor make it an ideal candidate to be used as a reference source for radiometric cross-calibrating to other land remote sensing satellite systems.

  13. A Special Application of Absolute Value Techniques in Authentic Problem Solving

    ERIC Educational Resources Information Center

    Stupel, Moshe

    2013-01-01

    There are at least five different equivalent definitions of the absolute value concept. In instances where the task is an equation or inequality with only one or two absolute value expressions, it is a worthy educational experience for learners to solve the task using each one of the definitions. On the other hand, if more than two absolute value…

  14. Structure elucidation and absolute stereochemistry of isomeric monoterpene chromane esters.

    PubMed

    Batista, João M; Batista, Andrea N L; Mota, Jonas S; Cass, Quezia B; Kato, Massuo J; Bolzani, Vanderlan S; Freedman, Teresa B; López, Silvia N; Furlan, Maysa; Nafie, Laurence A

    2011-04-15

    Six novel monoterpene chromane esters were isolated from the aerial parts of Peperomia obtusifolia (Piperaceae) using chiral chromatography. This is the first time that chiral chromane esters of this kind, ones with a tethered chiral terpene, have been isolated in nature. Due to their structural features, it is not currently possible to assess directly their absolute stereochemistry using any of the standard classical approaches, such as X-ray crystallography, NMR, optical rotation, or electronic circular dichroism (ECD). Herein we report the absolute configuration of these molecules, involving four chiral centers, using vibrational circular dichroism (VCD) and density functional theory (DFT) (B3LYP/6-31G*) calculations. This work further reinforces the capability of VCD to determine unambiguously the absolute configuration of structurally complex molecules in solution, without crystallization or derivatization, and demonstrates the sensitivity of VCD to specify the absolute configuration for just one among a number of chiral centers. We also demonstrate the sufficiency of using the so-called inexpensive basis set 6-31G* compared to the triple-ζ basis set TZVP for absolute configuration analysis of larger molecules using VCD. Overall, this work extends our knowledge of secondary metabolites in plants and provides a straightforward way to determine the absolute configuration of complex natural products involving a chiral parent moiety combined with a chiral terpene adduct.

  15. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  16. Moral absolutism and ectopic pregnancy.

    PubMed

    Kaczor, C

    2001-02-01

    If one accepts a version of absolutism that excludes the intentional killing of any innocent human person from conception to natural death, ectopic pregnancy poses vexing difficulties. Given that the embryonic life almost certainly will die anyway, how can one retain one's moral principle and yet adequately respond to a situation that gravely threatens the life of the mother and her future fertility? The four options of treatment most often discussed in the literature are non-intervention, salpingectomy (removal of tube with embryo), salpingostomy (removal of embryo alone), and use of methotrexate (MXT). In this essay, I review these four options and introduce a fifth (the milking technique). In order to assess these options in terms of the absolutism mentioned, it will also be necessary to discuss various accounts of the intention/foresight distinction. I conclude that salpingectomy, salpingostomy, and the milking technique are compatible with absolutist presuppositions, but not the use of methotrexate.

  17. High-resolution absolute position detection using a multiple grating

    NASA Astrophysics Data System (ADS)

    Schilling, Ulrich; Drabarek, Pawel; Kuehnle, Goetz; Tiziani, Hans J.

    1996-08-01

    To control electro-mechanical engines, high-resolution linear and rotary encoders are needed. Interferometric methods (grating interferometers) promise a resolution of a few nanometers, but have an ambiguity range of some microns. Incremental encoders increase the absolute measurement range by counting the signal periods starting from a defined initial point. In many applications, however, it is not possible to move to this initial point, so that absolute encoders have to be used. Absolute encoders generally have a scale with two or more tracks placed next to each other. Therefore, they use a two-dimensional grating structure to measure a one-dimensional position. We present a new method, which uses a one-dimensional structure to determine the position in one dimension. It is based on a grating with a large grating period up to some millimeters, having the same diffraction efficiency in several predefined diffraction orders (multiple grating). By combining the phase signals of the different diffraction orders, it is possible to establish the position in an absolute range of the grating period with a resolution like incremental grating interferometers. The principal functionality was demonstrated by applying the multiple grating in a heterodyne grating interferometer. The heterodyne frequency was generated by a frequency modulated laser in an unbalanced interferometer. In experimental measurements an absolute range of 8 mm was obtained while achieving a resolution of 10 nm.

  18. Between security and military identities: The case of Israeli security experts.

    PubMed

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  19. Enhanced rearrangement technique for secure data transmission: case study credit card process

    NASA Astrophysics Data System (ADS)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  20. Computer-Aided Sensor Development Focused on Security Issues.

    PubMed

    Bialas, Andrzej

    2016-05-26

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  1. The myth of secure computing.

    PubMed

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  2. Absolute and Relative Socioeconomic Health Inequalities across Age Groups

    PubMed Central

    van Zon, Sander K. R.; Bültmann, Ute; Mendes de Leon, Carlos F.; Reijneveld, Sijmen A.

    2015-01-01

    Background The magnitude of socioeconomic health inequalities differs across age groups. It is less clear whether socioeconomic health inequalities differ across age groups by other factors that are known to affect the relation between socioeconomic position and health, like the indicator of socioeconomic position, the health outcome, gender, and as to whether socioeconomic health inequalities are measured in absolute or in relative terms. The aim is to investigate whether absolute and relative socioeconomic health inequalities differ across age groups by indicator of socioeconomic position, health outcome and gender. Methods The study sample was derived from the baseline measurement of the LifeLines Cohort Study and consisted of 95,432 participants. Socioeconomic position was measured as educational level and household income. Physical and mental health were measured with the RAND-36. Age concerned eleven 5-years age groups. Absolute inequalities were examined by comparing means. Relative inequalities were examined by comparing Gini-coefficients. Analyses were performed for both health outcomes by both educational level and household income. Analyses were performed for all age groups, and stratified by gender. Results Absolute and relative socioeconomic health inequalities differed across age groups by indicator of socioeconomic position, health outcome, and gender. Absolute inequalities were most pronounced for mental health by household income. They were larger in younger than older age groups. Relative inequalities were most pronounced for physical health by educational level. Gini-coefficients were largest in young age groups and smallest in older age groups. Conclusions Absolute and relative socioeconomic health inequalities differed cross-sectionally across age groups by indicator of socioeconomic position, health outcome and gender. Researchers should critically consider the implications of choosing a specific age group, in addition to the indicator of

  3. Some things ought never be done: moral absolutes in clinical ethics.

    PubMed

    Pellegrino, Edmund D

    2005-01-01

    Moral absolutes have little or no moral standing in our morally diverse modern society. Moral relativism is far more palatable for most ethicists and to the public at large. Yet, when pressed, every moral relativist will finally admit that there are some things which ought never be done. It is the rarest of moral relativists that will take rape, murder, theft, child sacrifice as morally neutral choices. In general ethics, the list of those things that must never be done will vary from person to person. In clinical ethics, however, the nature of the physician-patient relationship is such that certain moral absolutes are essential to the attainment of the good of the patient - the end of the relationship itself. These are all derivatives of the first moral absolute of all morality: Do good and avoid evil. In the clinical encounter, this absolute entails several subsidiary absolutes - act for the good of the patient, do not kill, keep promises, protect the dignity of the patient, do not lie, avoid complicity with evil. Each absolute is intrinsic to the healing and helping ends of the clinical encounter.

  4. Absolute and relative educational inequalities in depression in Europe.

    PubMed

    Dudal, Pieter; Bracke, Piet

    2016-09-01

    To investigate (1) the size of absolute and relative educational inequalities in depression, (2) their variation between European countries, and (3) their relationship with underlying prevalence rates. Analyses are based on the European Social Survey, rounds three and six (N = 57,419). Depression is measured using the shortened Centre of Epidemiologic Studies Depression Scale. Education is coded by use of the International Standard Classification of Education. Country-specific logistic regressions are applied. Results point to an elevated risk of depressive symptoms among the lower educated. The cross-national patterns differ between absolute and relative measurements. For men, large relative inequalities are found for countries including Denmark and Sweden, but are accompanied by small absolute inequalities. For women, large relative and absolute inequalities are found in Belgium, Bulgaria, and Hungary. Results point to an empirical association between inequalities and the underlying prevalence rates. However, the strength of the association is only moderate. This research stresses the importance of including both measurements for comparative research and suggests the inclusion of the level of population health in research into inequalities in health.

  5. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  6. Design, implementation and migration of security systems as an extreme project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scharmer, Carol; Trujillo, David

    2010-08-01

    Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis - all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints. What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and expires at the end of the Fiscal Year? Whether driven by budget cycles, safety, or by management decree, many such projects begin with generic scopes and funding allocatedmore » based on a rapid management 'guestimate.' Then a Project Manager (PM) is assigned a project with a predefined and potentially limited scope, compressed schedule, and potentially insufficient funding. The PM is tasked to rapidly and cost effectively coordinate a requirements-based design, implementation, test, and turnover of a fully operational system to the customer, all while the customer is operating and maintaining an existing security system. Many project management manuals call this an impossible project that should not be attempted. However, security is serious business and the reality is that rapid deployment of proven systems via an 'Extreme Project' is sometimes necessary. Extreme Projects can be wildly successful but require a dedicated team of security professionals lead by an experienced project manager using a highly-tailored and agile project management process with management support at all levels, all combined with significant interface with the customer. This paper does not advocate such projects or condone eliminating the valuable analysis and project management techniques. Indeed, having worked on a well-planned project provides the basis for experienced team members to complete Extreme Projects. This paper does, however, provide insight into what it takes for

  7. Design implementation and migration of security systems as an extreme project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scharmer, Carol

    2010-10-01

    Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis - all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints. What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and expires at the end of the Fiscal Year? Whether driven by budget cycles, safety, or by management decree, many such projects begin with generic scopes and funding allocatedmore » based on a rapid management 'guestimate.' Then a Project Manager (PM) is assigned a project with a predefined and potentially limited scope, compressed schedule, and potentially insufficient funding. The PM is tasked to rapidly and cost effectively coordinate a requirements-based design, implementation, test, and turnover of a fully operational system to the customer, all while the customer is operating and maintaining an existing security system. Many project management manuals call this an impossible project that should not be attempted. However, security is serious business and the reality is that rapid deployment of proven systems via an 'Extreme Project' is sometimes necessary. Extreme Projects can be wildly successful but require a dedicated team of security professionals lead by an experienced project manager using a highly-tailored and agile project management process with management support at all levels, all combined with significant interface with the customer. This paper does not advocate such projects or condone eliminating the valuable analysis and project management techniques. Indeed, having worked on a well-planned project provides the basis for experienced team members to complete Extreme Projects. This paper does, however, provide insight into what it takes for

  8. Relativistic Absolutism in Moral Education.

    ERIC Educational Resources Information Center

    Vogt, W. Paul

    1982-01-01

    Discusses Emile Durkheim's "Moral Education: A Study in the Theory and Application of the Sociology of Education," which holds that morally healthy societies may vary in culture and organization but must possess absolute rules of moral behavior. Compares this moral theory with current theory and practice of American educators. (MJL)

  9. Social Security at the Crossroads.

    ERIC Educational Resources Information Center

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  10. Cyber-security Considerations for Real-Time Physiological Status Monitoring: Threats, Goals, and Use Cases

    DTIC Science & Technology

    2016-11-01

    low- power RF transmissions used by the OBAN system. B. Threat Analysis Methodology To analyze the risk presented by a particular threat we use a... power efficiency5 and in the absolute worst case a compromise of the wireless channel could result in death. Fitness trackers on the other hand are...analysis is intended to inform the development of secure RT-PSM architectures. I. INTRODUCTION The development of very low- power computing devices and

  11. Parallel Processable Cryptographic Methods with Unbounded Practical Security.

    ERIC Educational Resources Information Center

    Rothstein, Jerome

    Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…

  12. Determining absolute protein numbers by quantitative fluorescence microscopy.

    PubMed

    Verdaasdonk, Jolien Suzanne; Lawrimore, Josh; Bloom, Kerry

    2014-01-01

    Biological questions are increasingly being addressed using a wide range of quantitative analytical tools to examine protein complex composition. Knowledge of the absolute number of proteins present provides insights into organization, function, and maintenance and is used in mathematical modeling of complex cellular dynamics. In this chapter, we outline and describe three microscopy-based methods for determining absolute protein numbers--fluorescence correlation spectroscopy, stepwise photobleaching, and ratiometric comparison of fluorescence intensity to known standards. In addition, we discuss the various fluorescently labeled proteins that have been used as standards for both stepwise photobleaching and ratiometric comparison analysis. A detailed procedure for determining absolute protein number by ratiometric comparison is outlined in the second half of this chapter. Counting proteins by quantitative microscopy is a relatively simple yet very powerful analytical tool that will increase our understanding of protein complex composition. © 2014 Elsevier Inc. All rights reserved.

  13. Security and Privacy in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less

  14. Establishing Ion Ratio Thresholds Based on Absolute Peak Area for Absolute Protein Quantification using Protein Cleavage Isotope Dilution Mass Spectrometry

    PubMed Central

    Loziuk, Philip L.; Sederoff, Ronald R.; Chiang, Vincent L.; Muddiman, David C.

    2014-01-01

    Quantitative mass spectrometry has become central to the field of proteomics and metabolomics. Selected reaction monitoring is a widely used method for the absolute quantification of proteins and metabolites. This method renders high specificity using several product ions measured simultaneously. With growing interest in quantification of molecular species in complex biological samples, confident identification and quantitation has been of particular concern. A method to confirm purity or contamination of product ion spectra has become necessary for achieving accurate and precise quantification. Ion abundance ratio assessments were introduced to alleviate some of these issues. Ion abundance ratios are based on the consistent relative abundance (RA) of specific product ions with respect to the total abundance of all product ions. To date, no standardized method of implementing ion abundance ratios has been established. Thresholds by which product ion contamination is confirmed vary widely and are often arbitrary. This study sought to establish criteria by which the relative abundance of product ions can be evaluated in an absolute quantification experiment. These findings suggest that evaluation of the absolute ion abundance for any given transition is necessary in order to effectively implement RA thresholds. Overall, the variation of the RA value was observed to be relatively constant beyond an absolute threshold ion abundance. Finally, these RA values were observed to fluctuate significantly over a 3 year period, suggesting that these values should be assessed as close as possible to the time at which data is collected for quantification. PMID:25154770

  15. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    PubMed

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  16. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

    PubMed Central

    Moghaddasi, Hamid; Kamkarhaghighi, Mehran

    2016-01-01

    Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823

  17. Determination of Absolute Configuration of Secondary Alcohols Using Thin-Layer Chromatography

    PubMed Central

    Wagner, Alexander J.; Rychnovsky, Scott D.

    2013-01-01

    A new implementation of the Competing Enantioselective Conversion (CEC) method was developed to qualitatively determine the absolute configuration of enantioenriched secondary alcohols using thin-layer chromatography. The entire process for the method requires approximately 60 min and utilizes micromole quantities of the secondary alcohol being tested. A number of synthetically relevant secondary alcohols are presented. Additionally, 1H NMR spectroscopy was conducted on all samples to provide evidence of reaction conversion that supports the qualitative method presented herein. PMID:23593963

  18. Essential Oils, Part VI: Sandalwood Oil, Ylang-Ylang Oil, and Jasmine Absolute.

    PubMed

    de Groot, Anton C; Schmidt, Erich

    In this article, some aspects of sandalwood oil, ylang-ylang oil, and jasmine absolute are discussed including their botanical origin, uses of the plants and the oils and absolute, chemical composition, contact allergy to and allergic contact dermatitis from these essential oils and absolute, and their causative allergenic ingredients.

  19. Droplet Digital Enzyme-Linked Oligonucleotide Hybridization Assay for Absolute RNA Quantification.

    PubMed

    Guan, Weihua; Chen, Liben; Rane, Tushar D; Wang, Tza-Huei

    2015-09-03

    We present a continuous-flow droplet-based digital Enzyme-Linked Oligonucleotide Hybridization Assay (droplet digital ELOHA) for sensitive detection and absolute quantification of RNA molecules. Droplet digital ELOHA incorporates direct hybridization and single enzyme reaction via the formation of single probe-RNA-probe (enzyme) complex on magnetic beads. It enables RNA detection without reverse transcription and PCR amplification processes. The magnetic beads are subsequently encapsulated into a large number of picoliter-sized droplets with enzyme substrates in a continuous-flow device. This device is capable of generating droplets at high-throughput. It also integrates in-line enzymatic incubation and detection of fluorescent products. Our droplet digital ELOHA is able to accurately quantify (differentiate 40% difference) as few as ~600 RNA molecules in a 1 mL sample (equivalent to 1 aM or lower) without molecular replication. The absolute quantification ability of droplet digital ELOHA is demonstrated with the analysis of clinical Neisseria gonorrhoeae 16S rRNA to show its potential value in real complex samples.

  20. Droplet Digital Enzyme-Linked Oligonucleotide Hybridization Assay for Absolute RNA Quantification

    PubMed Central

    Guan, Weihua; Chen, Liben; Rane, Tushar D.; Wang, Tza-Huei

    2015-01-01

    We present a continuous-flow droplet-based digital Enzyme-Linked Oligonucleotide Hybridization Assay (droplet digital ELOHA) for sensitive detection and absolute quantification of RNA molecules. Droplet digital ELOHA incorporates direct hybridization and single enzyme reaction via the formation of single probe-RNA-probe (enzyme) complex on magnetic beads. It enables RNA detection without reverse transcription and PCR amplification processes. The magnetic beads are subsequently encapsulated into a large number of picoliter-sized droplets with enzyme substrates in a continuous-flow device. This device is capable of generating droplets at high-throughput. It also integrates in-line enzymatic incubation and detection of fluorescent products. Our droplet digital ELOHA is able to accurately quantify (differentiate 40% difference) as few as ~600 RNA molecules in a 1 mL sample (equivalent to 1 aM or lower) without molecular replication. The absolute quantification ability of droplet digital ELOHA is demonstrated with the analysis of clinical Neisseria gonorrhoeae 16S rRNA to show its potential value in real complex samples. PMID:26333806

  1. Droplet Digital Enzyme-Linked Oligonucleotide Hybridization Assay for Absolute RNA Quantification

    NASA Astrophysics Data System (ADS)

    Guan, Weihua; Chen, Liben; Rane, Tushar D.; Wang, Tza-Huei

    2015-09-01

    We present a continuous-flow droplet-based digital Enzyme-Linked Oligonucleotide Hybridization Assay (droplet digital ELOHA) for sensitive detection and absolute quantification of RNA molecules. Droplet digital ELOHA incorporates direct hybridization and single enzyme reaction via the formation of single probe-RNA-probe (enzyme) complex on magnetic beads. It enables RNA detection without reverse transcription and PCR amplification processes. The magnetic beads are subsequently encapsulated into a large number of picoliter-sized droplets with enzyme substrates in a continuous-flow device. This device is capable of generating droplets at high-throughput. It also integrates in-line enzymatic incubation and detection of fluorescent products. Our droplet digital ELOHA is able to accurately quantify (differentiate 40% difference) as few as ~600 RNA molecules in a 1 mL sample (equivalent to 1 aM or lower) without molecular replication. The absolute quantification ability of droplet digital ELOHA is demonstrated with the analysis of clinical Neisseria gonorrhoeae 16S rRNA to show its potential value in real complex samples.

  2. Can climate models be tuned to simulate the global mean absolute temperature correctly?

    NASA Astrophysics Data System (ADS)

    Duan, Q.; Shi, Y.; Gong, W.

    2016-12-01

    The Inter-government Panel on Climate Change (IPCC) has already issued five assessment reports (ARs), which include the simulation of the past climate and the projection of the future climate under various scenarios. The participating models can simulate reasonably well the trend in global mean temperature change, especially of the last 150 years. However, there is a large, constant discrepancy in terms of global mean absolute temperature simulations over this period. This discrepancy remained in the same range between IPCC-AR4 and IPCC-AR5, which amounts to about 3oC between the coldest model and the warmest model. This discrepancy has great implications to the land processes, particularly the processes related to the cryosphere, and casts doubts over if land-atmosphere-ocean interactions are correctly considered in those models. This presentation aims to explore if this discrepancy can be reduced through model tuning. We present an automatic model calibration strategy to tune the parameters of a climate model so the simulated global mean absolute temperature would match the observed data over the last 150 years. An intermediate complexity model known as LOVECLIM is used in the study. This presentation will show the preliminary results.

  3. Temporal Dynamics of Microbial Rhodopsin Fluorescence Reports Absolute Membrane Voltage

    PubMed Central

    Hou, Jennifer H.; Venkatachalam, Veena; Cohen, Adam E.

    2014-01-01

    Plasma membrane voltage is a fundamentally important property of a living cell; its value is tightly coupled to membrane transport, the dynamics of transmembrane proteins, and to intercellular communication. Accurate measurement of the membrane voltage could elucidate subtle changes in cellular physiology, but existing genetically encoded fluorescent voltage reporters are better at reporting relative changes than absolute numbers. We developed an Archaerhodopsin-based fluorescent voltage sensor whose time-domain response to a stepwise change in illumination encodes the absolute membrane voltage. We validated this sensor in human embryonic kidney cells. Measurements were robust to variation in imaging parameters and in gene expression levels, and reported voltage with an absolute accuracy of 10 mV. With further improvements in membrane trafficking and signal amplitude, time-domain encoding of absolute voltage could be applied to investigate many important and previously intractable bioelectric phenomena. PMID:24507604

  4. Computer-Aided Sensor Development Focused on Security Issues

    PubMed Central

    Bialas, Andrzej

    2016-01-01

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research. PMID:27240360

  5. 242Pu absolute neutron-capture cross section measurement

    NASA Astrophysics Data System (ADS)

    Buckner, M. Q.; Wu, C. Y.; Henderson, R. A.; Bucher, B.; Chyzh, A.; Bredeweg, T. A.; Baramsai, B.; Couture, A.; Jandel, M.; Mosby, S.; O'Donnell, J. M.; Ullmann, J. L.

    2017-09-01

    The absolute neutron-capture cross section of 242Pu was measured at the Los Alamos Neutron Science Center using the Detector for Advanced Neutron-Capture Experiments array along with a compact parallel-plate avalanche counter for fission-fragment detection. During target fabrication, a small amount of 239Pu was added to the active target so that the absolute scale of the 242Pu(n,γ) cross section could be set according to the known 239Pu(n,f) resonance at En,R = 7.83 eV. The relative scale of the 242Pu(n,γ) cross section covers four orders of magnitude for incident neutron energies from thermal to ≈ 40 keV. The cross section reported in ENDF/B-VII.1 for the 242Pu(n,γ) En,R = 2.68 eV resonance was found to be 2.4% lower than the new absolute 242Pu(n,γ) cross section.

  6. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  7. Between security and military identities: The case of Israeli security experts

    PubMed Central

    Grassiani, Erella

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228

  8. [Prognostic value of absolute monocyte count in chronic lymphocytic leukaemia].

    PubMed

    Szerafin, László; Jakó, János; Riskó, Ferenc

    2015-04-01

    The low peripheral absolute lymphocyte and high monocyte count have been reported to correlate with poor clinical outcome in various lymphomas and other cancers. However, a few data known about the prognostic value of absolute monocyte count in chronic lymphocytic leukaemia. The aim of the authors was to investigate the impact of absolute monocyte count measured at the time of diagnosis in patients with chronic lymphocytic leukaemia on the time to treatment and overal survival. Between January 1, 2005 and December 31, 2012, 223 patients with newly-diagnosed chronic lymphocytic leukaemia were included. The rate of patients needing treatment, time to treatment, overal survival and causes of mortality based on Rai stages, CD38, ZAP-70 positivity and absolute monocyte count were analyzed. Therapy was necessary in 21.1%, 57.4%, 88.9%, 88.9% and 100% of patients in Rai stage 0, I, II, III an IV, respectively; in 61.9% and 60.8% of patients exhibiting CD38 and ZAP-70 positivity, respectively; and in 76.9%, 21.2% and 66.2% of patients if the absolute monocyte count was <0.25 G/l, between 0.25-0.75 G/l and >0.75 G/l, respectively. The median time to treatment and the median overal survival were 19.5, 65, and 35.5 months; and 41.5, 65, and 49.5 months according to the three groups of monocyte counts. The relative risk of beginning the therapy was 1.62 (p<0.01) in patients with absolute monocyte count <0.25 G/l or >0.75 G/l, as compared to those with 0.25-0.75 G/l, and the risk of overal survival was 2.41 (p<0.01) in patients with absolute monocyte count lower than 0.25 G/l as compared to those with higher than 0.25 G/l. The relative risks remained significant in Rai 0 patients, too. The leading causes of mortality were infections (41.7%) and the chronic lymphocytic leukaemia (58.3%) in patients with low monocyte count, while tumours (25.9-35.3%) and other events (48.1 and 11.8%) occurred in patients with medium or high monocyte counts. Patients with low and high monocyte

  9. Securing Information with Complex Optical Encryption Networks

    DTIC Science & Technology

    2015-08-11

    Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military

  10. Confidence-Accuracy Calibration in Absolute and Relative Face Recognition Judgments

    ERIC Educational Resources Information Center

    Weber, Nathan; Brewer, Neil

    2004-01-01

    Confidence-accuracy (CA) calibration was examined for absolute and relative face recognition judgments as well as for recognition judgments from groups of stimuli presented simultaneously or sequentially (i.e., simultaneous or sequential mini-lineups). When the effect of difficulty was controlled, absolute and relative judgments produced…

  11. Methods of Organizational Information Security

    NASA Astrophysics Data System (ADS)

    Martins, José; Dos Santos, Henrique

    The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.

  12. Reliable absolute analog code retrieval approach for 3D measurement

    NASA Astrophysics Data System (ADS)

    Yu, Shuang; Zhang, Jing; Yu, Xiaoyang; Sun, Xiaoming; Wu, Haibin; Chen, Deyun

    2017-11-01

    The wrapped phase of phase-shifting approach can be unwrapped by using Gray code, but both the wrapped phase error and Gray code decoding error can result in period jump error, which will lead to gross measurement error. Therefore, this paper presents a reliable absolute analog code retrieval approach. The combination of unequal-period Gray code and phase shifting patterns at high frequencies are used to obtain high-frequency absolute analog code, and at low frequencies, the same unequal-period combination patterns are used to obtain the low-frequency absolute analog code. Next, the difference between the two absolute analog codes was employed to eliminate period jump errors, and a reliable unwrapped result can be obtained. Error analysis was used to determine the applicable conditions, and this approach was verified through theoretical analysis. The proposed approach was further verified experimentally. Theoretical analysis and experimental results demonstrate that the proposed approach can perform reliable analog code unwrapping.

  13. Auditory working memory predicts individual differences in absolute pitch learning.

    PubMed

    Van Hedger, Stephen C; Heald, Shannon L M; Koch, Rachelle; Nusbaum, Howard C

    2015-07-01

    Absolute pitch (AP) is typically defined as the ability to label an isolated tone as a musical note in the absence of a reference tone. At first glance the acquisition of AP note categories seems like a perceptual learning task, since individuals must assign a category label to a stimulus based on a single perceptual dimension (pitch) while ignoring other perceptual dimensions (e.g., loudness, octave, instrument). AP, however, is rarely discussed in terms of domain-general perceptual learning mechanisms. This is because AP is typically assumed to depend on a critical period of development, in which early exposure to pitches and musical labels is thought to be necessary for the development of AP precluding the possibility of adult acquisition of AP. Despite this view of AP, several previous studies have found evidence that absolute pitch category learning is, to an extent, trainable in a post-critical period adult population, even if the performance typically achieved by this population is below the performance of a "true" AP possessor. The current studies attempt to understand the individual differences in learning to categorize notes using absolute pitch cues by testing a specific prediction regarding cognitive capacity related to categorization - to what extent does an individual's general auditory working memory capacity (WMC) predict the success of absolute pitch category acquisition. Since WMC has been shown to predict performance on a wide variety of other perceptual and category learning tasks, we predict that individuals with higher WMC should be better at learning absolute pitch note categories than individuals with lower WMC. Across two studies, we demonstrate that auditory WMC predicts the efficacy of learning absolute pitch note categories. These results suggest that a higher general auditory WMC might underlie the formation of absolute pitch categories for post-critical period adults. Implications for understanding the mechanisms that underlie the

  14. Neural evidence for a multifaceted model of attachment security.

    PubMed

    Canterberry, Melanie; Gillath, Omri

    2013-06-01

    The sense of attachment security has been linked with a host of beneficial outcomes related to personal and relational well-being. Moreover, research has demonstrated that the sense of attachment security can be enhanced via cognitive priming techniques. Studies using such techniques have shown that security priming results with similar outcomes as dispositional attachment security. The way security priming leads to these effects, however, is yet to be unveiled. Using fMRI we took one step in that direction and examined the neural mechanisms underlying enhanced attachment security. Participants were exposed to explicit and implicit security- and insecurity-related words. Security priming led to co-occurring activation in brain areas reflective of cognitive, affective, and behavioral processes (e.g., medial frontal cortex, parahippocampus, BA 6). There were activation differences based on attachment style. This research serves as an important step in mapping out the security process and supports a conceptualization of security as part of a behavioral system with multiple components. Copyright © 2012 Elsevier B.V. All rights reserved.

  15. Method and apparatus for two-dimensional absolute optical encoding

    NASA Technical Reports Server (NTRS)

    Leviton, Douglas B. (Inventor)

    2004-01-01

    This invention presents a two-dimensional absolute optical encoder and a method for determining position of an object in accordance with information from the encoder. The encoder of the present invention comprises a scale having a pattern being predetermined to indicate an absolute location on the scale, means for illuminating the scale, means for forming an image of the pattern; and detector means for outputting signals derived from the portion of the image of the pattern which lies within a field of view of the detector means, the field of view defining an image reference coordinate system, and analyzing means, receiving the signals from the detector means, for determining the absolute location of the object. There are two types of scale patterns presented in this invention: grid type and starfield type.

  16. New design and facilities for the International Database for Absolute Gravity Measurements (AGrav): A support for the Establishment of a new Global Absolute Gravity Reference System

    NASA Astrophysics Data System (ADS)

    Wziontek, Hartmut; Falk, Reinhard; Bonvalot, Sylvain; Rülke, Axel

    2017-04-01

    After about 10 years of successful joint operation by BGI and BKG, the International Database for Absolute Gravity Measurements "AGrav" (see references hereafter) was under a major revision. The outdated web interface was replaced by a responsive, high level web application framework based on Python and built on top of Pyramid. Functionality was added, like interactive time series plots or a report generator and the interactive map-based station overview was updated completely, comprising now clustering and the classification of stations. Furthermore, the database backend was migrated to PostgreSQL for better support of the application framework and long-term availability. As comparisons of absolute gravimeters (AG) become essential to realize a precise and uniform gravity standard, the database was extended to document the results on international and regional level, including those performed at monitoring stations equipped with SGs. By this it will be possible to link different AGs and to trace their equivalence back to the key comparisons under the auspices of International Committee for Weights and Measures (CIPM) as the best metrological realization of the absolute gravity standard. In this way the new AGrav database accommodates the demands of the new Global Absolute Gravity Reference System as recommended by the IAG Resolution No. 2 adopted in Prague 2015. The new database will be presented with focus on the new user interface and new functionality, calling all institutions involved in absolute gravimetry to participate and contribute with their information to built up a most complete picture of high precision absolute gravimetry and improve its visibility. A Digital Object Identifier (DOI) will be provided by BGI to contributors to give a better traceability and facilitate the referencing of their gravity surveys. Links and references: BGI mirror site : http://bgi.obs-mip.fr/data-products/Gravity-Databases/Absolute-Gravity-data/ BKG mirror site: http

  17. U.S. Geological Survey experience with the residual absolutes method

    NASA Astrophysics Data System (ADS)

    Worthington, E. William; Matzka, Jürgen

    2017-10-01

    The U.S. Geological Survey (USGS) Geomagnetism Program has developed and tested the residual method of absolutes, with the assistance of the Danish Technical University's (DTU) Geomagnetism Program. Three years of testing were performed at College Magnetic Observatory (CMO), Fairbanks, Alaska, to compare the residual method with the null method. Results show that the two methods compare very well with each other and both sets of baseline data were used to process the 2015 definitive data. The residual method will be implemented at the other USGS high-latitude geomagnetic observatories in the summer of 2017 and 2018.

  18. Absolute measurement of hadronic branching fractions of the Ds+ meson.

    PubMed

    Alexander, J P; Berkelman, K; Cassel, D G; Duboscq, J E; Ehrlich, R; Fields, L; Gibbons, L; Gray, R; Gray, S W; Hartill, D L; Heltsley, B K; Hertz, D; Jones, C D; Kandaswamy, J; Kreinick, D L; Kuznetsov, V E; Mahlke-Krüger, H; Mohapatra, D; Onyisi, P U E; Patterson, J R; Peterson, D; Riley, D; Ryd, A; Sadoff, A J; Shi, X; Stroiney, S; Sun, W M; Wilksen, T; Athar, S B; Patel, R; Yelton, J; Rubin, P; Eisenstein, B I; Karliner, I; Mehrabyan, S; Lowrey, N; Selen, M; White, E J; Wiss, J; Mitchell, R E; Shepherd, M R; Besson, D; Pedlar, T K; Cronin-Hennessy, D; Gao, K Y; Hietala, J; Kubota, Y; Klein, T; Lang, B W; Poling, R; Scott, A W; Zweber, P; Dobbs, S; Metreveli, Z; Seth, K K; Tomaradze, A; Libby, J; Powell, A; Wilkinson, G; Ecklund, K M; Love, W; Savinov, V; Lopez, A; Mendez, H; Ramirez, J; Ge, J Y; Miller, D H; Sanghi, B; Shipsey, I P J; Xin, B; Adams, G S; Anderson, M; Cummings, J P; Danko, I; Hu, D; Moziak, B; Napolitano, J; He, Q; Insler, J; Muramatsu, H; Park, C S; Thorndike, E H; Yang, F; Artuso, M; Blusk, S; Khalil, S; Li, J; Mountain, R; Nisar, S; Randrianarivony, K; Sultana, N; Skwarnicki, T; Stone, S; Wang, J C; Zhang, L M; Bonvicini, G; Cinabro, D; Dubrovin, M; Lincoln, A; Rademacker, J; Asner, D M; Edwards, K W; Naik, P; Briere, R A; Ferguson, T; Tatishvili, G; Vogel, H; Watkins, M E; Rosner, J L

    2008-04-25

    The branching fractions of D(s)(+/-) meson decays serve to normalize many measurements of processes involving charm quarks. Using 298 pb(-1) of e(+)e(-) collisions recorded at a center of mass energy of 4.17 GeV, we determine absolute branching fractions for eight D(s)(+/-) decays with a double tag technique. In particular we determine the branching fraction B(D(s)(+)-->K(-)K(+}pi(+))=(5.50+/-0.23+/-0.16)%, where the uncertainties are statistical and systematic, respectively. We also provide partial branching fractions for kinematic subsets of the K(-)K(+)pi(+) decay mode.

  19. Absolute Measurement of Hadronic Branching Fractions of the Ds+ Meson

    NASA Astrophysics Data System (ADS)

    Alexander, J. P.; Berkelman, K.; Cassel, D. G.; Duboscq, J. E.; Ehrlich, R.; Fields, L.; Gibbons, L.; Gray, R.; Gray, S. W.; Hartill, D. L.; Heltsley, B. K.; Hertz, D.; Jones, C. D.; Kandaswamy, J.; Kreinick, D. L.; Kuznetsov, V. E.; Mahlke-Krüger, H.; Mohapatra, D.; Onyisi, P. U. E.; Patterson, J. R.; Peterson, D.; Riley, D.; Ryd, A.; Sadoff, A. J.; Shi, X.; Stroiney, S.; Sun, W. M.; Wilksen, T.; Athar, S. B.; Patel, R.; Yelton, J.; Rubin, P.; Eisenstein, B. I.; Karliner, I.; Mehrabyan, S.; Lowrey, N.; Selen, M.; White, E. J.; Wiss, J.; Mitchell, R. E.; Shepherd, M. R.; Besson, D.; Pedlar, T. K.; Cronin-Hennessy, D.; Gao, K. Y.; Hietala, J.; Kubota, Y.; Klein, T.; Lang, B. W.; Poling, R.; Scott, A. W.; Zweber, P.; Dobbs, S.; Metreveli, Z.; Seth, K. K.; Tomaradze, A.; Libby, J.; Powell, A.; Wilkinson, G.; Ecklund, K. M.; Love, W.; Savinov, V.; Lopez, A.; Mendez, H.; Ramirez, J.; Ge, J. Y.; Miller, D. H.; Sanghi, B.; Shipsey, I. P. J.; Xin, B.; Adams, G. S.; Anderson, M.; Cummings, J. P.; Danko, I.; Hu, D.; Moziak, B.; Napolitano, J.; He, Q.; Insler, J.; Muramatsu, H.; Park, C. S.; Thorndike, E. H.; Yang, F.; Artuso, M.; Blusk, S.; Khalil, S.; Li, J.; Mountain, R.; Nisar, S.; Randrianarivony, K.; Sultana, N.; Skwarnicki, T.; Stone, S.; Wang, J. C.; Zhang, L. M.; Bonvicini, G.; Cinabro, D.; Dubrovin, M.; Lincoln, A.; Rademacker, J.; Asner, D. M.; Edwards, K. W.; Naik, P.; Briere, R. A.; Ferguson, T.; Tatishvili, G.; Vogel, H.; Watkins, M. E.; Rosner, J. L.

    2008-04-01

    The branching fractions of Ds± meson decays serve to normalize many measurements of processes involving charm quarks. Using 298pb-1 of e+e- collisions recorded at a center of mass energy of 4.17 GeV, we determine absolute branching fractions for eight Ds± decays with a double tag technique. In particular we determine the branching fraction B(Ds+→K-K+π+)=(5.50±0.23±0.16)%, where the uncertainties are statistical and systematic, respectively. We also provide partial branching fractions for kinematic subsets of the K-K+π+ decay mode.

  20. Anchors weigh more than power: why absolute powerlessness liberates negotiators to achieve better outcomes.

    PubMed

    Schaerer, Michael; Swaab, Roderick I; Galinsky, Adam D

    2015-02-01

    The current research shows that having no power can be better than having a little power. Negotiators prefer having some power (weak negotiation alternatives) to having no power (no alternatives). We challenge this belief that having any alternative is beneficial by demonstrating that weak alternatives create low anchors that reduce the value of first offers. In contrast, having no alternatives is liberating because there is no anchor to weigh down first offers. In our experiments, negotiators with no alternatives felt less powerful but made higher first offers and secured superior outcomes compared with negotiators who had weak alternatives. We established the role of anchoring through mediation by first offers and through moderation by showing that weak alternatives no longer led to worse outcomes when negotiators focused on a countervailing anchor or when negotiators faced an opponent with a strong alternative. These results demonstrate that anchors can have larger effects than feelings of power. Absolute powerlessness can be psychologically liberating. © The Author(s) 2014.

  1. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness

  2. 237Np absolute delayed neutron yield measurements

    NASA Astrophysics Data System (ADS)

    Doré, D.; Ledoux, X.; Nolte, R.; Gagnon-Moisan, F.; Thulliez, L.; Litaize, O.; Roettger, S.; Serot, O.

    2017-09-01

    237Np absolute delayed neutron yields have been measured at different incident neutron energies from 1.5 to 16 MeV. The experiment was performed at the Physikalisch-Technische Bundesanstalt (PTB) facility where the Van de Graaff accelerator and the cyclotron CV28 delivered 9 different neutron energy beams using p+T, d+D and d+T reactions. The detection system is made up of twelve 3He tubes inserted into a polyethylene cylinder. In this paper, the experimental setup and the data analysis method are described. The evolution of the absolute DN yields as a function of the neutron incident beam energies are presented and compared to experimental data found in the literature and data from the libraries.

  3. An absolute measure for a key currency

    NASA Astrophysics Data System (ADS)

    Oya, Shunsuke; Aihara, Kazuyuki; Hirata, Yoshito

    It is generally considered that the US dollar and the euro are the key currencies in the world and in Europe, respectively. However, there is no absolute general measure for a key currency. Here, we investigate the 24-hour periodicity of foreign exchange markets using a recurrence plot, and define an absolute measure for a key currency based on the strength of the periodicity. Moreover, we analyze the time evolution of this measure. The results show that the credibility of the US dollar has not decreased significantly since the Lehman shock, when the Lehman Brothers bankrupted and influenced the economic markets, and has increased even relatively better than that of the euro and that of the Japanese yen.

  4. ITIL{sup ®} and information security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-03-10

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework.

  5. Non-Invasive Method of Determining Absolute Intracranial Pressure

    NASA Technical Reports Server (NTRS)

    Yost, William T. (Inventor); Cantrell, John H., Jr. (Inventor); Hargens, Alan E. (Inventor)

    2004-01-01

    A method is presented for determining absolute intracranial pressure (ICP) in a patient. Skull expansion is monitored while changes in ICP are induced. The patient's blood pressure is measured when skull expansion is approximately zero. The measured blood pressure is indicative of a reference ICP value. Subsequently, the method causes a known change in ICP and measured the change in skull expansion associated therewith. The absolute ICP is a function of the reference ICP value, the known change in ICP and its associated change in skull expansion; and a measured change in skull expansion.

  6. Using software security analysis to verify the secure socket layer (SSL) protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2004-01-01

    nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.

  7. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  8. A highly accurate absolute gravimetric network for Albania, Kosovo and Montenegro

    NASA Astrophysics Data System (ADS)

    Ullrich, Christian; Ruess, Diethard; Butta, Hubert; Qirko, Kristaq; Pavicevic, Bozidar; Murat, Meha

    2016-04-01

    The objective of this project is to establish a basic gravity network in Albania, Kosovo and Montenegro to enable further investigations in geodetic and geophysical issues. Therefore the first time in history absolute gravity measurements were performed in these countries. The Norwegian mapping authority Kartverket is assisting the national mapping authorities in Kosovo (KCA) (Kosovo Cadastral Agency - Agjencia Kadastrale e Kosovës), Albania (ASIG) (Autoriteti Shtetëror i Informacionit Gjeohapësinor) and in Montenegro (REA) (Real Estate Administration of Montenegro - Uprava za nekretnine Crne Gore) in improving the geodetic frameworks. The gravity measurements are funded by Kartverket. The absolute gravimetric measurements were performed from BEV (Federal Office of Metrology and Surveying) with the absolute gravimeter FG5-242. As a national metrology institute (NMI) the Metrology Service of the BEV maintains the national standards for the realisation of the legal units of measurement and ensures their international equivalence and recognition. Laser and clock of the absolute gravimeter were calibrated before and after the measurements. The absolute gravimetric survey was carried out from September to October 2015. Finally all 8 scheduled stations were successfully measured: there are three stations located in Montenegro, two stations in Kosovo and three stations in Albania. The stations are distributed over the countries to establish a gravity network for each country. The vertical gradients were measured at all 8 stations with the relative gravimeter Scintrex CG5. The high class quality of some absolute gravity stations can be used for gravity monitoring activities in future. The measurement uncertainties of the absolute gravity measurements range around 2.5 micro Gal at all stations (1 microgal = 10-8 m/s2). In Montenegro the large gravity difference of 200 MilliGal between station Zabljak and Podgorica can be even used for calibration of relative gravimeters

  9. Chemical composition of French mimosa absolute oil.

    PubMed

    Perriot, Rodolphe; Breme, Katharina; Meierhenrich, Uwe J; Carenini, Elise; Ferrando, Georges; Baldovini, Nicolas

    2010-02-10

    Since decades mimosa (Acacia dealbata) absolute oil has been used in the flavor and perfume industry. Today, it finds an application in over 80 perfumes, and its worldwide industrial production is estimated five tons per year. Here we report on the chemical composition of French mimosa absolute oil. Straight-chain analogues from C6 to C26 with different functional groups (hydrocarbons, esters, aldehydes, diethyl acetals, alcohols, and ketones) were identified in the volatile fraction. Most of them are long-chain molecules: (Z)-heptadec-8-ene, heptadecane, nonadecane, and palmitic acid are the most abundant, and constituents such as 2-phenethyl alcohol, methyl anisate, and ethyl palmitate are present in smaller amounts. The heavier constituents were mainly triterpenoids such as lupenone and lupeol, which were identified as two of the main components. (Z)-Heptadec-8-ene, lupenone, and lupeol were quantified by GC-MS in SIM mode using external standards and represents 6%, 20%, and 7.8% (w/w) of the absolute oil. Moreover, odorant compounds were extracted by SPME and analyzed by GC-sniffing leading to the perception of 57 odorant zones, of which 37 compounds were identified by their odorant description, mass spectrum, retention index, and injection of the reference compound.

  10. Measurement of absolute gravity acceleration in Firenze

    NASA Astrophysics Data System (ADS)

    de Angelis, M.; Greco, F.; Pistorio, A.; Poli, N.; Prevedelli, M.; Saccorotti, G.; Sorrentino, F.; Tino, G. M.

    2011-01-01

    This paper reports the results from the accurate measurement of the acceleration of gravity g taken at two separate premises in the Polo Scientifico of the University of Firenze (Italy). In these laboratories, two separate experiments aiming at measuring the Newtonian constant and testing the Newtonian law at short distances are in progress. Both experiments require an independent knowledge on the local value of g. The only available datum, pertaining to the italian zero-order gravity network, was taken more than 20 years ago at a distance of more than 60 km from the study site. Gravity measurements were conducted using an FG5 absolute gravimeter, and accompanied by seismic recordings for evaluating the noise condition at the site. The absolute accelerations of gravity at the two laboratories are (980 492 160.6 ± 4.0) μGal and (980 492 048.3 ± 3.0) μGal for the European Laboratory for Non-Linear Spectroscopy (LENS) and Dipartimento di Fisica e Astronomia, respectively. Other than for the two referenced experiments, the data here presented will serve as a benchmark for any future study requiring an accurate knowledge of the absolute value of the acceleration of gravity in the study region.

  11. Absolute angular encoder based on optical diffraction

    NASA Astrophysics Data System (ADS)

    Wu, Jian; Zhou, Tingting; Yuan, Bo; Wang, Liqiang

    2015-08-01

    A new encoding method for absolute angular encoder based on optical diffraction was proposed in the present study. In this method, an encoder disc is specially designed that a series of elements are uniformly spaced in one circle and each element is consisted of four diffraction gratings, which are tilted in the directions of 30°, 60°, -60° and -30°, respectively. The disc is illuminated by a coherent light and the diffractive signals are received. The positions of diffractive spots are used for absolute encoding and their intensities are for subdivision, which is different from the traditional optical encoder based on transparent/opaque binary principle. Since the track's width in the disc is not limited in the diffraction pattern, it provides a new way to solve the contradiction between the size and resolution, which is good for minimization of encoder. According to the proposed principle, the diffraction pattern disc with a diameter of 40 mm was made by lithography in the glass substrate. A prototype of absolute angular encoder with a resolution of 20" was built up. Its maximum error was tested as 78" by comparing with a small angle measuring system based on laser beam deflection.

  12. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  13. Reader variability in breast density estimation from full-field digital mammograms: the effect of image postprocessing on relative and absolute measures.

    PubMed

    Keller, Brad M; Nathan, Diane L; Gavenonis, Sara C; Chen, Jinbo; Conant, Emily F; Kontos, Despina

    2013-05-01

    Mammographic breast density, a strong risk factor for breast cancer, may be measured as either a relative percentage of dense (ie, radiopaque) breast tissue or as an absolute area from either raw (ie, "for processing") or vendor postprocessed (ie, "for presentation") digital mammograms. Given the increasing interest in the incorporation of mammographic density in breast cancer risk assessment, the purpose of this study is to determine the inherent reader variability in breast density assessment from raw and vendor-processed digital mammograms, because inconsistent estimates could to lead to misclassification of an individual woman's risk for breast cancer. Bilateral, mediolateral-oblique view, raw, and processed digital mammograms of 81 women were retrospectively collected for this study (N = 324 images). Mammographic percent density and absolute dense tissue area estimates for each image were obtained from two radiologists using a validated, interactive software tool. The variability of interreader agreement was not found to be affected by the image presentation style (ie, raw or processed, F-test: P > .5). Interreader estimates of relative and absolute breast density are strongly correlated (Pearson r > 0.84, P < .001) but systematically different (t-test, P < .001) between the two readers. Our results show that mammographic density may be assessed with equal reliability from either raw or vendor postprocessed images. Furthermore, our results suggest that the primary source of density variability comes from the subjectivity of the individual reader in assessing the absolute amount of dense tissue present in the breast, indicating the need to use standardized tools to mitigate this effect. Copyright © 2013 AUR. Published by Elsevier Inc. All rights reserved.

  14. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  15. Secure Skyline Queries on Cloud Platform.

    PubMed

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  16. Secure Skyline Queries on Cloud Platform

    PubMed Central

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-01-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710

  17. Absolute Radiometric Calibration of EUNIS-06

    NASA Technical Reports Server (NTRS)

    Thomas, R. J.; Rabin, D. M.; Kent, B. J.; Paustian, W.

    2007-01-01

    The Extreme-Ultraviolet Normal-Incidence Spectrometer (EUNIS) is a soundingrocket payload that obtains imaged high-resolution spectra of individual solar features, providing information about the Sun's corona and upper transition region. Shortly after its successful initial flight last year, a complete end-to-end calibration was carried out to determine the instrument's absolute radiometric response over its Longwave bandpass of 300 - 370A. The measurements were done at the Rutherford-Appleton Laboratory (RAL) in England, using the same vacuum facility and EUV radiation source used in the pre-flight calibrations of both SOHO/CDS and Hinode/EIS, as well as in three post-flight calibrations of our SERTS sounding rocket payload, the precursor to EUNIS. The unique radiation source provided by the Physikalisch-Technische Bundesanstalt (PTB) had been calibrated to an absolute accuracy of 7% (l-sigma) at 12 wavelengths covering our bandpass directly against the Berlin electron storage ring BESSY, which is itself a primary radiometric source standard. Scans of the EUNIS aperture were made to determine the instrument's absolute spectral sensitivity to +- 25%, considering all sources of error, and demonstrate that EUNIS-06 was the most sensitive solar E W spectrometer yet flown. The results will be matched against prior calibrations which relied on combining measurements of individual optical components, and on comparisons with theoretically predicted 'insensitive' line ratios. Coordinated observations were made during the EUNIS-06 flight by SOHO/CDS and EIT that will allow re-calibrations of those instruments as well. In addition, future EUNIS flights will provide similar calibration updates for TRACE, Hinode/EIS, and STEREO/SECCHI/EUVI.

  18. Laser interferometry method for absolute measurement of the acceleration of gravity

    NASA Technical Reports Server (NTRS)

    Hudson, O. K.

    1971-01-01

    Gravimeter permits more accurate and precise absolute measurement of g without reference to Potsdam values as absolute standards. Device is basically Michelson laser beam interferometer in which one arm is mass fitted with corner cube reflector.

  19. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  20. A novel approach for human whole transcriptome analysis based on absolute gene expression of microarray data.

    PubMed

    Bikel, Shirley; Jacobo-Albavera, Leonor; Sánchez-Muñoz, Fausto; Cornejo-Granados, Fernanda; Canizales-Quinteros, Samuel; Soberón, Xavier; Sotelo-Mundo, Rogerio R; Del Río-Navarro, Blanca E; Mendoza-Vargas, Alfredo; Sánchez, Filiberto; Ochoa-Leyva, Adrian

    2017-01-01

    , these pathways were related to the typical functions of leukocytes cells, such as antigen processing and presentation and natural killer cell mediated cytotoxicity. We also applied this method to obtain the absolute gene expression threshold in already published microarray data of liver cells, where the top 5% expressed genes showed an enrichment of typical KEGG pathways for liver cells. Our results suggest that the three selected genes of the Y chromosome can be used to calculate an absolute gene expression threshold, allowing a transcriptome profiling of microarray data without the need of an additional reference experiment. Our approach based on the establishment of a threshold for absolute gene expression analysis will allow a new way to analyze thousands of microarrays from public databases. This allows the study of different human diseases without the need of having additional samples for relative expression experiments.

  1. A novel approach for human whole transcriptome analysis based on absolute gene expression of microarray data

    PubMed Central

    Bikel, Shirley; Jacobo-Albavera, Leonor; Sánchez-Muñoz, Fausto; Cornejo-Granados, Fernanda; Canizales-Quinteros, Samuel; Soberón, Xavier; Sotelo-Mundo, Rogerio R.; del Río-Navarro, Blanca E.; Mendoza-Vargas, Alfredo; Sánchez, Filiberto

    2017-01-01

    significantly enriched. Interestingly, these pathways were related to the typical functions of leukocytes cells, such as antigen processing and presentation and natural killer cell mediated cytotoxicity. We also applied this method to obtain the absolute gene expression threshold in already published microarray data of liver cells, where the top 5% expressed genes showed an enrichment of typical KEGG pathways for liver cells. Our results suggest that the three selected genes of the Y chromosome can be used to calculate an absolute gene expression threshold, allowing a transcriptome profiling of microarray data without the need of an additional reference experiment. Discussion Our approach based on the establishment of a threshold for absolute gene expression analysis will allow a new way to analyze thousands of microarrays from public databases. This allows the study of different human diseases without the need of having additional samples for relative expression experiments. PMID:29230367

  2. Absolute Coefficients and the Graphical Representation of Airfoil Characteristics

    NASA Technical Reports Server (NTRS)

    Munk, Max

    1921-01-01

    It is argued that there should be an agreement as to what conventions to use in determining absolute coefficients used in aeronautics and in how to plot those coefficients. Of particular importance are the absolute coefficients of lift and drag. The author argues for the use of the German method over the kind in common use in the United States and England, and for the Continental over the usual American and British method of graphically representing the characteristics of an airfoil. The author notes that, on the whole, it appears that the use of natural absolute coefficients in a polar diagram is the logical method for presentation of airfoil characteristics, and that serious consideration should be given to the advisability of adopting this method in all countries, in order to advance uniformity and accuracy in the science of aeronautics.

  3. Peripheral absolute threshold spectral sensitivity in retinitis pigmentosa.

    PubMed Central

    Massof, R W; Johnson, M A; Finkelstein, D

    1981-01-01

    Dark-adapted spectral sensitivities were measured in the peripheral retinas of 38 patients diagnosed as having typical retinitis pigmentosa (RP) and in 3 normal volunteers. The patients included those having autosomal dominant and autosomal recessive inheritance patterns. Results were analysed by comparisons with the CIE standard scotopic spectral visibility function and with Judd's modification of the photopic spectral visibility function, with consideration of contributions from changes in spectral transmission of preretinal media. The data show 3 general patterns. One group of patients had absolute threshold spectral sensitivities that were fit by Judd's photopic visibility curve. Absolute threshold spectral sensitivities for a second group of patients were fit by a normal scotopic spectral visibility curve. The third group of patients had absolute threshold spectral sensitivities that were fit by a combination of scotopic and photopic spectral visibility curves. The autosomal dominant and autosomal recessive modes of inheritance were represented in each group of patients. These data indicate that RP patients have normal rod and/or cone spectral sensitivities, and support the subclassification of patients described previously by Massof and Finkelstein. PMID:7459312

  4. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    PubMed

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  5. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  6. Effect of Organizational Factors on Information Security Implementations

    ERIC Educational Resources Information Center

    Perez, Rafael G.

    2013-01-01

    The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…

  7. First Absolutely Calibrated Localized Measurements of Ion Velocity in the MST in Locked and Rotating Plasmas

    NASA Astrophysics Data System (ADS)

    Baltzer, M.; Craig, D.; den Hartog, D. J.; Nornberg, M. D.; Munaretto, S.

    2015-11-01

    An Ion Doppler Spectrometer (IDS) is used on MST for high time-resolution passive and active measurements of impurity ion emission. Absolutely calibrated measurements of flow are difficult because the spectrometer records data within 0.3 nm of the C+5 line of interest, and commercial calibration lamps do not produce lines in this narrow range . A novel optical system was designed to absolutely calibrate the IDS. The device uses an UV LED to produce a broad emission curve in the desired region. A Fabry-Perot etalon filters this light, cutting transmittance peaks into the pattern of the LED emission. An optical train of fused silica lenses focuses the light into the IDS with f/4. A holographic diffuser blurs the light cone to increase homogeneity. Using this light source, the absolute Doppler shift of ion emissions can be measured in MST plasmas. In combination with charge exchange recombination spectroscopy, localized ion velocities can now be measured. Previously, a time-averaged measurement along the chord bisecting the poloidal plane was used to calibrate the IDS; the quality of these central chord calibrations can be characterized with our absolute calibration. Calibration errors may also be quantified and minimized by optimizing the curve-fitting process. Preliminary measurements of toroidal velocity in locked and rotating plasmas will be shown. This work has been supported by the US DOE.

  8. Absolute flux density calibrations of radio sources: 2.3 GHz

    NASA Technical Reports Server (NTRS)

    Freiley, A. J.; Batelaan, P. D.; Bathker, D. A.

    1977-01-01

    A detailed description of a NASA/JPL Deep Space Network program to improve S-band gain calibrations of large aperture antennas is reported. The program is considered unique in at least three ways; first, absolute gain calibrations of high quality suppressed-sidelobe dual mode horns first provide a high accuracy foundation to the foundation to the program. Second, a very careful transfer calibration technique using an artificial far-field coherent-wave source was used to accurately obtain the gain of one large (26 m) aperture. Third, using the calibrated large aperture directly, the absolute flux density of five selected galactic and extragalactic natural radio sources was determined with an absolute accuracy better than 2 percent, now quoted at the familiar 1 sigma confidence level. The follow-on considerations to apply these results to an operational network of ground antennas are discussed. It is concluded that absolute gain accuracies within + or - 0.30 to 0.40 db are possible, depending primarily on the repeatability (scatter) in the field data from Deep Space Network user stations.

  9. Prospective relations between family conflict and adolescent maladjustment: security in the family system as a mediating process.

    PubMed

    Cummings, E Mark; Koss, Kalsea J; Davies, Patrick T

    2015-04-01

    Conflict in specific family systems (e.g., interparental, parent-child) has been implicated in the development of a host of adjustment problems in adolescence, but little is known about the impact of family conflict involving multiple family systems. Furthermore, questions remain about the effects of family conflict on symptoms of specific disorders and adjustment problems and the processes mediating these effects. The present study prospectively examines the impact of family conflict and emotional security about the family system on adolescent symptoms of specific disorders and adjustment problems, including the development of symptoms of anxiety, depression, conduct problems, and peer problems. Security in the family system was examined as a mediator of these relations. Participants included 295 mother-father-adolescent families (149 girls) participating across three annual time points (grades 7-9). Including auto-regressive controls for initial levels of emotional insecurity and multiple adjustment problems (T1), higher-order emotional insecurity about the family system (T2) mediated relations between T1 family conflict and T3 peer problems, anxiety, and depressive symptoms. Further analyses supported specific patterns of emotional security/insecurity (i.e., security, disengagement, preoccupation) as mediators between family conflict and specific domains of adolescent adjustment. Family conflict was thus found to prospectively predict the development of symptoms of multiple specific adjustment problems, including symptoms of depression, anxiety, conduct problems, and peer problems, by elevating in in adolescent's emotional insecurity about the family system. The clinical implications of these findings are considered.

  10. Assessing epistemic sophistication by considering domain-specific absolute and multiplicistic beliefs separately.

    PubMed

    Peter, Johannes; Rosman, Tom; Mayer, Anne-Kathrin; Leichner, Nikolas; Krampen, Günter

    2016-06-01

    Particularly in higher education, not only a view of science as a means of finding absolute truths (absolutism), but also a view of science as generally tentative (multiplicism) can be unsophisticated and obstructive for learning. Most quantitative epistemic belief inventories neglect this and understand epistemic sophistication as disagreement with absolute statements. This article suggests considering absolutism and multiplicism as separate dimensions. Following our understanding of epistemic sophistication as a cautious and reluctant endorsement of both positions, we assume evaluativism (a contextually adaptive view of knowledge as personally constructed and evidence-based) to be reflected by low agreement with both generalized absolute and generalized multiplicistic statements. Three studies with a total sample size of N = 416 psychology students were conducted. A domain-specific inventory containing both absolute and multiplicistic statements was developed. Expectations were tested by exploratory factor analysis, confirmatory factor analysis, and correlational analyses. Results revealed a two-factor solution with an absolute and a multiplicistic factor. Criterion validity of both factors was confirmed. Cross-sectional analyses revealed that agreement to generalized multiplicistic statements decreases with study progress. Moreover, consistent with our understanding of epistemic sophistication as a reluctant attitude towards generalized epistemic statements, evidence for a negative relationship between epistemic sophistication and need for cognitive closure was found. We recommend including multiplicistic statements into epistemic belief questionnaires and considering them as a separate dimension, especially when investigating individuals in later stages of epistemic development (i.e., in higher education). © 2015 The British Psychological Society.

  11. A new method to calibrate the absolute sensitivity of a soft X-ray streak camera

    NASA Astrophysics Data System (ADS)

    Yu, Jian; Liu, Shenye; Li, Jin; Yang, Zhiwen; Chen, Ming; Guo, Luting; Yao, Li; Xiao, Shali

    2016-12-01

    In this paper, we introduce a new method to calibrate the absolute sensitivity of a soft X-ray streak camera (SXRSC). The calibrations are done in the static mode by using a small laser-produced X-ray source. A calibrated X-ray CCD is used as a secondary standard detector to monitor the X-ray source intensity. In addition, two sets of holographic flat-field grating spectrometers are chosen as the spectral discrimination systems of the SXRSC and the X-ray CCD. The absolute sensitivity of the SXRSC is obtained by comparing the signal counts of the SXRSC to the output counts of the X-ray CCD. Results show that the calibrated spectrum covers the range from 200 eV to 1040 eV. The change of the absolute sensitivity in the vicinity of the K-edge of the carbon can also be clearly seen. The experimental values agree with the calculated values to within 29% error. Compared with previous calibration methods, the proposed method has several advantages: a wide spectral range, high accuracy, and simple data processing. Our calibration results can be used to make quantitative X-ray flux measurements in laser fusion research.

  12. Determination of the absolute binding free energies of HIV-1 protease inhibitors using non-equilibrium molecular dynamics simulations

    NASA Astrophysics Data System (ADS)

    Ngo, Son Tung; Nguyen, Minh Tung; Nguyen, Minh Tho

    2017-05-01

    The absolute binding free energy of an inhibitor to HIV-1 Protease (PR) was determined throughout evaluation of the non-bonded interaction energy difference between the two bound and unbound states of the inhibitor and surrounding molecules by the fast pulling of ligand (FPL) process using non-equilibrium molecular dynamics (NEMD) simulations. The calculated free energy difference terms help clarifying the nature of the binding. Theoretical binding affinities are in good correlation with experimental data, with R = 0.89. The paradigm used is able to rank two inhibitors having the maximum difference of ∼1.5 kcal/mol in absolute binding free energies.

  13. Anatomy of a Security Operations Center

    NASA Technical Reports Server (NTRS)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  14. Overview of Computer Security Certification and Accreditation. Final Report.

    ERIC Educational Resources Information Center

    Ruthberg, Zella G.; Neugent, William

    Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…

  15. Stimulus Probability Effects in Absolute Identification

    ERIC Educational Resources Information Center

    Kent, Christopher; Lamberts, Koen

    2016-01-01

    This study investigated the effect of stimulus presentation probability on accuracy and response times in an absolute identification task. Three schedules of presentation were used to investigate the interaction between presentation probability and stimulus position within the set. Data from individual participants indicated strong effects of…

  16. Absolute gravity measurements in California

    NASA Astrophysics Data System (ADS)

    Zumberge, M. A.; Sasagawa, G.; Kappus, M.

    1986-08-01

    An absolute gravity meter that determines the local gravitational acceleration by timing a freely falling mass with a laser interferometer has been constructed. The instrument has made measurements at 11 sites in California, four in Nevada, and one in France. The uncertainty in the results is typically 10 microgal. Repeated measurements have been made at several of the sites; only one shows a substantial change in gravity.

  17. Climate Change, Nutrition and Food Security in Sub-Saharan Africa

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2010-01-01

    Food security and nutrition in sub-Saharan Africa have long been affected by variations in the weather. Vulnerability to these hazards, along with economic shocks and an adverse political environment, is often uneven in a community. Some individuals and households are more susceptible to emergencies or crises than others, and thus determining who is most vulnerable are and how they are responding to a shock or crises is essential to understand the impact on food security. Daily, quantitative and global observations derived from satellite remote sensing instruments can contribute to understanding how food production has declined due to drought, flood or other weather-related hazard, but it can say nothing about the likelihood that the people living in that area are suffering food insecurity as a result. As Amartya Sen argued, a famine can occur even when there is an absolute surplus of food in a region. Thus organizations like the US Agency for International Development's Famine Early Warning Systems Network (FEWS NET) work to integrate biophysical and socio-economic indicators together with on-the ground assessments to estimate the food security consequences of a variety of events. Climate change is likely to restructure local, regional and global agricultural systems and commodity markets. Although remote sensing information has been used to identify seasonal production declines for the past two decades, new ways of using the data will need to be developed in order to understand, document and respond to the impact of climate change on food security as it is manifested in shorter term shocks. In this article, the contribution of remote sensing is explained, along with the other factors that affect food security

  18. Network Security Validation Using Game Theory

    NASA Astrophysics Data System (ADS)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  19. Standardization approaches in absolute quantitative proteomics with mass spectrometry.

    PubMed

    Calderón-Celis, Francisco; Encinar, Jorge Ruiz; Sanz-Medel, Alfredo

    2017-07-31

    Mass spectrometry-based approaches have enabled important breakthroughs in quantitative proteomics in the last decades. This development is reflected in the better quantitative assessment of protein levels as well as to understand post-translational modifications and protein complexes and networks. Nowadays, the focus of quantitative proteomics shifted from the relative determination of proteins (ie, differential expression between two or more cellular states) to absolute quantity determination, required for a more-thorough characterization of biological models and comprehension of the proteome dynamism, as well as for the search and validation of novel protein biomarkers. However, the physico-chemical environment of the analyte species affects strongly the ionization efficiency in most mass spectrometry (MS) types, which thereby require the use of specially designed standardization approaches to provide absolute quantifications. Most common of such approaches nowadays include (i) the use of stable isotope-labeled peptide standards, isotopologues to the target proteotypic peptides expected after tryptic digestion of the target protein; (ii) use of stable isotope-labeled protein standards to compensate for sample preparation, sample loss, and proteolysis steps; (iii) isobaric reagents, which after fragmentation in the MS/MS analysis provide a final detectable mass shift, can be used to tag both analyte and standard samples; (iv) label-free approaches in which the absolute quantitative data are not obtained through the use of any kind of labeling, but from computational normalization of the raw data and adequate standards; (v) elemental mass spectrometry-based workflows able to provide directly absolute quantification of peptides/proteins that contain an ICP-detectable element. A critical insight from the Analytical Chemistry perspective of the different standardization approaches and their combinations used so far for absolute quantitative MS-based (molecular and

  20. Towards absolute laser spectroscopic CO2 isotope ratio measurements

    NASA Astrophysics Data System (ADS)

    Anyangwe Nwaboh, Javis; Werhahn, Olav; Ebert, Volker

    2017-04-01

    Knowledge of isotope composition of carbon dioxide (CO2) in the atmosphere is necessary to identify sources and sinks of this key greenhouse gas. In the last years, laser spectroscopic techniques such as cavity ring-down spectroscopy (CRDS) and tunable diode laser absorption spectroscopy (TDLAS) have been shown to perform accurate isotope ratio measurements for CO2 and other gases like water vapour (H2O) [1,2]. Typically, isotope ratios are reported in literature referring to reference materials provided by e.g. the International Atomic Energy Agency (IAEA). However, there could be some benefit if field deployable absolute isotope ratio measurement methods were developed to address issues such as exhausted reference material like the Pee Dee Belemnite (PDB) standard. Absolute isotope ratio measurements would be particularly important for situations where reference materials do not even exist. Here, we present CRDS and TDLAS-based absolute isotope ratios (13C/12C ) in atmospheric CO2. We demonstrate the capabilities of the used methods by measuring CO2 isotope ratios in gas standards. We compare our results to values reported for the isotope certified gas standards. Guide to the expression of uncertainty in measurement (GUM) compliant uncertainty budgets on the CRDS and TDLAS absolute isotope ratio measurements are presented, and traceability is addressed. We outline the current impediments in realizing high accuracy absolute isotope ratio measurements using laser spectroscopic methods, propose solutions and the way forward. Acknowledgement Parts of this work have been carried out within the European Metrology Research Programme (EMRP) ENV52 project-HIGHGAS. The EMRP is jointly funded by the EMRP participating countries within EURAMET and the European Union. References [1] B. Kühnreich, S. Wagner, J. C. Habig,·O. Möhler, H. Saathoff, V. Ebert, Appl. Phys. B 119:177-187 (2015). [2] E. Kerstel, L. Gianfrani, Appl. Phys. B 92, 439-449 (2008).

  1. A comprehensive Network Security Risk Model for process control networks.

    PubMed

    Henry, Matthew H; Haimes, Yacov Y

    2009-02-01

    The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.

  2. Effect of Absolute From Hibiscus syriacus L. Flower on Wound Healing in Keratinocytes

    PubMed Central

    Yoon, Seok Won; Lee, Kang Pa; Kim, Do-Yoon; Hwang, Dae Il; Won, Kyung-Jong; Lee, Dae Won; Lee, Hwan Myung

    2017-01-01

    Background: Proliferation and migration of keratinocytes are essential for the repair of cutaneous wounds. Hibiscus syriacus L. has been used in Asian medicine; however, research on keratinocytes is inadequate. Objective: To establish the dermatological properties of absolute from Hibiscus syriacus L. flower (HSF) and to provide fundamental research for alternative medicine. Materials and Methods: We identified the composition of HSF absolute using gas chromatography-mass spectrometry analysis. We also examined the effect of HSF absolute in HaCaT cells using the XTT assay, Boyden chamber assay, sprout-out growth assay, and western blotting. We conducted an in-vivo wound healing assay in rat tail-skin. Results: Ten major active compounds were identified from HSF absolute. As determined by the XTT assay, Boyden chamber assay, and sprout-out growth assay results, HSF absolute exhibited similar effects as that of epidermal growth factor on the proliferation and migration patterns of keratinocytes (HaCaT cells), which were significantly increased after HSF absolute treatment. The expression levels of the phosphorylated signaling proteins relevant to proliferation, including extracellular signal-regulated kinase 1/2 (Erk 1/2) and Akt, were also determined by western blot analysis. Conclusion: These results of our in-vitro and ex-vivo studies indicate that HSF absolute induced cell growth and migration of HaCaT cells by phosphorylating both Erk 1/2 and Akt. Moreover, we confirmed the wound-healing effect of HSF on injury of the rat tail-skin. Therefore, our results suggest that HSF absolute is promising for use in cosmetics and alternative medicine. SUMMARY Hisbiscus syriacus L. flower absolute increases HaCaT cell migration and proliferation.Hisbiscus syriacus L. flower absolute regulates phosphorylation of ERK 1/2 and Akt in HaCaT cell.Treatment with Hisbiscus syriacus L. flower induced sprout outgrowth.The wound in the tail-skin of rat was reduced by Hisbiscus syriacus

  3. Effect of Absolute From Hibiscus syriacus L. Flower on Wound Healing in Keratinocytes.

    PubMed

    Yoon, Seok Won; Lee, Kang Pa; Kim, Do-Yoon; Hwang, Dae Il; Won, Kyung-Jong; Lee, Dae Won; Lee, Hwan Myung

    2017-01-01

    Proliferation and migration of keratinocytes are essential for the repair of cutaneous wounds. Hibiscus syriacus L. has been used in Asian medicine; however, research on keratinocytes is inadequate. To establish the dermatological properties of absolute from Hibiscus syriacus L. flower (HSF) and to provide fundamental research for alternative medicine. We identified the composition of HSF absolute using gas chromatography-mass spectrometry analysis. We also examined the effect of HSF absolute in HaCaT cells using the XTT assay, Boyden chamber assay, sprout-out growth assay, and western blotting. We conducted an in-vivo wound healing assay in rat tail-skin. Ten major active compounds were identified from HSF absolute. As determined by the XTT assay, Boyden chamber assay, and sprout-out growth assay results, HSF absolute exhibited similar effects as that of epidermal growth factor on the proliferation and migration patterns of keratinocytes (HaCaT cells), which were significantly increased after HSF absolute treatment. The expression levels of the phosphorylated signaling proteins relevant to proliferation, including extracellular signal-regulated kinase 1/2 (Erk 1/2) and Akt, were also determined by western blot analysis. These results of our in-vitro and ex-vivo studies indicate that HSF absolute induced cell growth and migration of HaCaT cells by phosphorylating both Erk 1/2 and Akt. Moreover, we confirmed the wound-healing effect of HSF on injury of the rat tail-skin. Therefore, our results suggest that HSF absolute is promising for use in cosmetics and alternative medicine. Hisbiscus syriacus L. flower absolute increases HaCaT cell migration and proliferation. Hisbiscus syriacus L. flower absolute regulates phosphorylation of ERK 1/2 and Akt in HaCaT cell.Treatment with Hisbiscus syriacus L. flower induced sprout outgrowth.The wound in the tail-skin of rat was reduced by Hisbiscus syriacus L. flower absolute Abbreviations used: HSF: Hibiscus syriacus L. flower

  4. National Computer Security Conference Proceedings (11th): A Postscript: Computer Security--Into the Future, 17-20 October 1988

    DTIC Science & Technology

    1988-10-20

    The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced

  5. The fading American dream: Trends in absolute income mobility since 1940.

    PubMed

    Chetty, Raj; Grusky, David; Hell, Maximilian; Hendren, Nathaniel; Manduca, Robert; Narang, Jimmy

    2017-04-28

    We estimated rates of "absolute income mobility"-the fraction of children who earn more than their parents-by combining data from U.S. Census and Current Population Survey cross sections with panel data from de-identified tax records. We found that rates of absolute mobility have fallen from approximately 90% for children born in 1940 to 50% for children born in the 1980s. Increasing Gross Domestic Product (GDP) growth rates alone cannot restore absolute mobility to the rates experienced by children born in the 1940s. However, distributing current GDP growth more equally across income groups as in the 1940 birth cohort would reverse more than 70% of the decline in mobility. These results imply that reviving the "American dream" of high rates of absolute mobility would require economic growth that is shared more broadly across the income distribution. Copyright © 2017, American Association for the Advancement of Science.

  6. NASA Automatic Information Security Handbook

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This handbook details the Automated Information Security (AIS) management process for NASA. Automated information system security is becoming an increasingly important issue for all NASA managers and with rapid advancements in computer and network technologies and the demanding nature of space exploration and space research have made NASA increasingly dependent on automated systems to store, process, and transmit vast amounts of mission support information, hence the need for AIS systems and management. This handbook provides the consistent policies, procedures, and guidance to assure that an aggressive and effective AIS programs is developed, implemented, and sustained at all NASA organizations and NASA support contractors.

  7. 34 CFR 648.33 - What priorities and absolute preferences does the Secretary establish?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 3 2011-07-01 2011-07-01 false What priorities and absolute preferences does the... AREAS OF NATIONAL NEED How Does the Secretary Make an Award? § 648.33 What priorities and absolute... area of national need and gives absolute preference to one or more of the general disciplines and sub...

  8. 34 CFR 648.33 - What priorities and absolute preferences does the Secretary establish?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false What priorities and absolute preferences does the... AREAS OF NATIONAL NEED How Does the Secretary Make an Award? § 648.33 What priorities and absolute... area of national need and gives absolute preference to one or more of the general disciplines and sub...

  9. U.S. Geological Survey experience with the residual absolutes method

    USGS Publications Warehouse

    Worthington, E. William; Matzka, Jurgen

    2017-01-01

    The U.S. Geological Survey (USGS) Geomagnetism Program has developed and tested the residual method of absolutes, with the assistance of the Danish Technical University's (DTU) Geomagnetism Program. Three years of testing were performed at College Magnetic Observatory (CMO), Fairbanks, Alaska, to compare the residual method with the null method. Results show that the two methods compare very well with each other and both sets of baseline data were used to process the 2015 definitive data. The residual method will be implemented at the other USGS high-latitude geomagnetic observatories in the summer of 2017 and 2018.

  10. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  11. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  12. Security Requirements Management in Software Product Line Engineering

    NASA Astrophysics Data System (ADS)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  13. Absolute branching fraction measurements of exclusive D+ semileptonic decays.

    PubMed

    Huang, G S; Miller, D H; Pavlunin, V; Sanghi, B; Shipsey, I P J; Adams, G S; Chasse, M; Cravey, M; Cummings, J P; Danko, I; Napolitano, J; He, Q; Muramatsu, H; Park, C S; Park, W; Thorndike, E H; Coan, T E; Gao, Y S; Liu, F; Artuso, M; Boulahouache, C; Blusk, S; Butt, J; Dambasuren, E; Dorjkhaidav, O; Li, J; Menaa, N; Mountain, R; Nandakumar, R; Randrianarivony, K; Redjimi, R; Sia, R; Skwarnicki, T; Stone, S; Wang, J C; Zhang, K; Csorna, S E; Bonvicini, G; Cinabro, D; Dubrovin, M; Briere, R A; Chen, G P; Chen, J; Ferguson, T; Tatishvili, G; Vogel, H; Watkins, M E; Rosner, J L; Adam, N E; Alexander, J P; Berkelman, K; Cassel, D G; Crede, V; Duboscq, J E; Ecklund, K M; Ehrlich, R; Fields, L; Gibbons, L; Gittelman, B; Gray, R; Gray, S W; Hartill, D L; Heltsley, B K; Hertz, D; Hsu, L; Jones, C D; Kandaswamy, J; Kreinick, D L; Kuznetsov, V E; Mahlke-Krüger, H; Meyer, T O; Onyisi, P U E; Patterson, J R; Peterson, D; Phillips, E A; Pivarski, J; Riley, D; Ryd, A; Sadoff, A J; Schwarthoff, H; Shi, X; Shepherd, M R; Stroiney, S; Sun, W M; Urner, D; Weaver, K M; Wilksen, T; Weinberger, M; Athar, S B; Avery, P; Breva-Newell, L; Patel, R; Potlia, V; Stoeck, H; Yelton, J; Rubin, P; Cawlfield, C; Eisenstein, B I; Gollin, G D; Karliner, I; Kim, D; Lowrey, N; Naik, P; Sedlack, C; Selen, M; Williams, J; Wiss, J; Edwards, K W; Besson, D; Pedlar, T K; Cronin-Hennessy, D; Gao, K Y; Gong, D T; Hietala, J; Kubota, Y; Klein, T; Lang, B W; Li, S Z; Poling, R; Scott, A W; Smith, A; Dobbs, S; Metreveli, Z; Seth, K K; Tomaradze, A; Zweber, P; Ernst, J; Mahmood, A H; Severini, H; Asner, D M; Dytman, S A; Love, W; Mehrabyan, S; Mueller, J A; Savinov, V; Li, Z; Lopez, A; Mendez, H; Ramirez, J

    2005-10-28

    Using data collected at the psi(3770) resonance with the CLEO-c detector at the Cornell e+e- storage ring, we present improved measurements of the absolute branching fractions of D+decays to K0e+ve, pi0e+ve, K*0e+ve, and p0e+ve, and the first observation and absolute branching fraction measurement of D+ --> omega e+ve. We also report the most precise tests to date of isospin invariance in semileptonic D0 and D+ decays.

  14. Quantum technology and cryptology for information security

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2007-04-01

    Cryptology and information security are set to play a more prominent role in the near future. In this regard, quantum communication and cryptography offer new opportunities to tackle ICT security. Quantum Information Processing and Communication (QIPC) is a scientific field where new conceptual foundations and techniques are being developed. They promise to play an important role in the future of information Security. It is therefore essential to have a cross-fertilizing development between quantum technology and cryptology in order to address the security challenges of the emerging quantum era. In this article, we discuss the impact of quantum technology on the current as well as future crypto-techniques. We then analyse the assumptions on which quantum computers may operate. Then we present our vision for the distribution of security attributes using a novel form of trust based on Heisenberg's uncertainty; and, building highly secure quantum networks based on the clear transmission of single photons and/or bundles of photons able to withstand unauthorized reading as a result of secure protocols based on the observations of quantum mechanics. We argue how quantum cryptographic systems need to be developed that can take advantage of the laws of physics to provide long-term security based on solid assumptions. This requires a structured integration effort to deploy quantum technologies within the existing security infrastructure. Finally, we conclude that classical cryptographic techniques need to be redesigned and upgraded in view of the growing threat of cryptanalytic attacks posed by quantum information processing devices leading to the development of post-quantum cryptography.

  15. Investigation of radio astronomy image processing techniques for use in the passive millimetre-wave security screening environment

    NASA Astrophysics Data System (ADS)

    Taylor, Christopher T.; Hutchinson, Simon; Salmon, Neil A.; Wilkinson, Peter N.; Cameron, Colin D.

    2014-06-01

    Image processing techniques can be used to improve the cost-effectiveness of future interferometric Passive MilliMetre Wave (PMMW) imagers. The implementation of such techniques will allow for a reduction in the number of collecting elements whilst ensuring adequate image fidelity is maintained. Various techniques have been developed by the radio astronomy community to enhance the imaging capability of sparse interferometric arrays. The most prominent are Multi- Frequency Synthesis (MFS) and non-linear deconvolution algorithms, such as the Maximum Entropy Method (MEM) and variations of the CLEAN algorithm. This investigation focuses on the implementation of these methods in the defacto standard for radio astronomy image processing, the Common Astronomy Software Applications (CASA) package, building upon the discussion presented in Taylor et al., SPIE 8362-0F. We describe the image conversion process into a CASA suitable format, followed by a series of simulations that exploit the highlighted deconvolution and MFS algorithms assuming far-field imagery. The primary target application used for this investigation is an outdoor security scanner for soft-sided Heavy Goods Vehicles. A quantitative analysis of the effectiveness of the aforementioned image processing techniques is presented, with thoughts on the potential cost-savings such an approach could yield. Consideration is also given to how the implementation of these techniques in CASA might be adapted to operate in a near-field target environment. This may enable a much wider usability by the imaging community outside of radio astronomy and thus would be directly relevant to portal screening security systems in the microwave and millimetre wave bands.

  16. The effect of modeled absolute timing variability and relative timing variability on observational learning.

    PubMed

    Grierson, Lawrence E M; Roberts, James W; Welsher, Arthur M

    2017-05-01

    There is much evidence to suggest that skill learning is enhanced by skill observation. Recent research on this phenomenon indicates a benefit of observing variable/erred demonstrations. In this study, we explore whether it is variability within the relative organization or absolute parameterization of a movement that facilitates skill learning through observation. To do so, participants were randomly allocated into groups that observed a model with no variability, absolute timing variability, relative timing variability, or variability in both absolute and relative timing. All participants performed a four-segment movement pattern with specific absolute and relative timing goals prior to and following the observational intervention, as well as in a 24h retention test and transfers tests that featured new relative and absolute timing goals. Absolute timing error indicated that all groups initially acquired the absolute timing, maintained their performance at 24h retention, and exhibited performance deterioration in both transfer tests. Relative timing error revealed that the observation of no variability and relative timing variability produced greater performance at the post-test, 24h retention and relative timing transfer tests, but for the no variability group, deteriorated at absolute timing transfer test. The results suggest that the learning of absolute timing following observation unfolds irrespective of model variability. However, the learning of relative timing benefits from holding the absolute features constant, while the observation of no variability partially fails in transfer. We suggest learning by observing no variability and variable/erred models unfolds via similar neural mechanisms, although the latter benefits from the additional coding of information pertaining to movements that require a correction. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. A New Gimmick for Assigning Absolute Configuration.

    ERIC Educational Resources Information Center

    Ayorinde, F. O.

    1983-01-01

    A five-step procedure is provided to help students in making the assignment absolute configuration less bothersome. Examples for both single (2-butanol) and multi-chiral carbon (3-chloro-2-butanol) molecules are included. (JN)

  18. Absolute Equilibrium Entropy

    NASA Technical Reports Server (NTRS)

    Shebalin, John V.

    1997-01-01

    The entropy associated with absolute equilibrium ensemble theories of ideal, homogeneous, fluid and magneto-fluid turbulence is discussed and the three-dimensional fluid case is examined in detail. A sigma-function is defined, whose minimum value with respect to global parameters is the entropy. A comparison is made between the use of global functions sigma and phase functions H (associated with the development of various H-theorems of ideal turbulence). It is shown that the two approaches are complimentary though conceptually different: H-theorems show that an isolated system tends to equilibrium while sigma-functions allow the demonstration that entropy never decreases when two previously isolated systems are combined. This provides a more complete picture of entropy in the statistical mechanics of ideal fluids.

  19. Absolute instabilities of travelling wave solutions in a Keller-Segel model

    NASA Astrophysics Data System (ADS)

    Davis, P. N.; van Heijster, P.; Marangell, R.

    2017-11-01

    We investigate the spectral stability of travelling wave solutions in a Keller-Segel model of bacterial chemotaxis with a logarithmic chemosensitivity function and a constant, sublinear, and linear consumption rate. Linearising around the travelling wave solutions, we locate the essential and absolute spectrum of the associated linear operators and find that all travelling wave solutions have parts of the essential spectrum in the right half plane. However, we show that in the case of constant or sublinear consumption there exists a range of parameters such that the absolute spectrum is contained in the open left half plane and the essential spectrum can thus be weighted into the open left half plane. For the constant and sublinear consumption rate models we also determine critical parameter values for which the absolute spectrum crosses into the right half plane, indicating the onset of an absolute instability of the travelling wave solution. We observe that this crossing always occurs off of the real axis.

  20. Advances in the Metrology of Absolute Value Assignments to Isotopic Reference Materials: Consequences from the Avogadro Project

    NASA Astrophysics Data System (ADS)

    Vocke, Robert; Rabb, Savelas

    2015-04-01

    All isotope amount ratios (hereafter referred to as isotope ratios) produced and measured on any mass spectrometer are biased. This unfortunate situation results mainly from the physical processes in the source area where ions are produced. Because the ionized atoms in poly-isotopic elements have different masses, such processes are typically mass dependent and lead to what is commonly referred to as mass fractionation (for thermal ionization and electron impact sources) and mass bias (for inductively coupled plasma sources.) This biasing process produces a measured isotope ratio that is either larger or smaller than the "true" ratio in the sample. This has led to the development of numerous fractionation "laws" that seek to correct for these effects, many of which are not based on the physical processes giving rise to the biases. The search for tighter and reproducible precisions has led to two isotope ratio measurement systems that exist side-by-side. One still seeks to measure "absolute" isotope ratios while the other utilizes an artifact based measurement system called a delta-scale. The common element between these two measurement systems is the utilization of isotope reference materials (iRMs). These iRMs are used to validate a fractionation "law" in the former case and function as a scale anchor in the latter. Many value assignments of iRMs are based on "best measurements" by the original groups producing the reference material, a not entirely satisfactory approach. Other iRMs, with absolute isotope ratio values, have been produced by calibrated measurements following the Atomic Weight approach (AW) pioneered by NBS nearly 50 years ago. Unfortunately, the AW is not capable of calibrating the new generation of iRMs to sufficient precision. So how do we get iRMs with isotope ratios of sufficient precision and without bias? Such a focus is not to denigrate the extremely precise delta-scale measurements presently being made on non-traditional and tradition

  1. Prospective Relations between Family Conflict and Adolescent Maladjustment: Security in the Family System as a Mediating Process

    PubMed Central

    Cummings, E. Mark; Koss, Kalsea J.; Davies, Patrick T.

    2018-01-01

    Conflict in specific family systems (e.g., interparental, parent-child) has been implicated in the development of a host of adjustment problems in adolescence, but little is known about the impact of family conflict involving multiple family systems. Furthermore, questions remain about the effects of family conflict on symptoms of specific disorders and adjustment problems and the processes mediating these effects. The present study prospectively examines the impact of family conflict and emotional security about the family system on adolescent symptoms of specific disorders and adjustment problems, including the development of symptoms of anxiety, depression, conduct problems, and peer problems. Security in the family system was examined as a mediator of these relations. Participants included 295 mother-father-adolescent families (149 girls) participating across three annual time points (grades 7–9). Including auto-regressive controls for initial levels of emotional insecurity and multiple adjustment problems (T1), higher-order emotional insecurity about the family system (T2) mediated relations between T1 family conflict and T3 peer problems, anxiety, and depressive symptoms. Further analyses supported specific patterns of emotional security/insecurity (i.e., security, disengagement, preoccupation) as mediators between family conflict and specific domains of adolescent adjustment. Family conflict was thus found to prospectively predict the development of symptoms of multiple specific adjustment problems, including symptoms of depression, anxiety, conduct problems, and peer problems, by elevating in in adolescent’s emotional insecurity about the family system. The clinical implications of these findings are considered. PMID:25131144

  2. Proposal for a Security Management in Cloud Computing for Health Care

    PubMed Central

    Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources. PMID:24701137

  3. Proposal for a security management in cloud computing for health care.

    PubMed

    Haufe, Knut; Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  4. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  5. Information Security – Guidance for Manually Completing the Information Security Awareness Training

    EPA Pesticide Factsheets

    The purpose of this guidance is to provide an alternative manual process for disseminating EPA Information Security Awareness Training (ISAT) materials and collecting results from EPA users who elect to complete the ISAT manually.

  6. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  7. Effect of anions or foods on absolute bioavailability of calcium from calcium salts in mice by pharmacokinetics.

    PubMed

    Ueda, Yukari; Taira, Zenei

    2013-01-01

    We studied the absolute bioavailability of calcium from calcium L-lactate in mice using pharmacokinetics, and reviewed the absolute bioavailability of calcium from three other calcium salts in mice previously studied: calcium chloride, calcium acetate, and calcium ascorbate. The results showed that calcium metabolism is linear between intravenous administration of 15 mg/kg and 30 mg/kg, and is not affected by anions. Results after oral calcium administration of 150 mg/kg showed that the intestinal absorption process was significantly different among the four calcium salts. The rank of absolute bioavailability of calcium was calcium ascorbate > calcium L-lactate ≥ calcium acetate > calcium chloride. The mean residence time (MRTab) of calcium from calcium ascorbate (32.2 minutes) in the intestinal tract was much longer than that from calcium L-lactate (9.5 minutes), calcium acetate (15.0 minutes) and calcium chloride (13.6 minutes). Furthermore, the foods di-D-fructo-furanose-1,2':2,3'-dianhydride, sudachi (Citrus sudachi) juice, and moromi-su (a Japanese vinegar) increased the absolute bioavailability of calcium from calcium chloride by 2.46-fold, 2.86-fold, and 1.23-fold, respectively, and prolonged MRTab by 48.5 minutes, 43.1 minutes, and 44.9 minutes, respectively. In conclusion, the prolonged MRTab of calcium in the intestinal tract by anion or food might cause the increased absorbability of calcium.

  8. Effect of anions or foods on absolute bioavailability of calcium from calcium salts in mice by pharmacokinetics

    PubMed Central

    Ueda, Yukari; Taira, Zenei

    2013-01-01

    We studied the absolute bioavailability of calcium from calcium L-lactate in mice using pharmacokinetics, and reviewed the absolute bioavailability of calcium from three other calcium salts in mice previously studied: calcium chloride, calcium acetate, and calcium ascorbate. The results showed that calcium metabolism is linear between intravenous administration of 15 mg/kg and 30 mg/kg, and is not affected by anions. Results after oral calcium administration of 150 mg/kg showed that the intestinal absorption process was significantly different among the four calcium salts. The rank of absolute bioavailability of calcium was calcium ascorbate > calcium L-lactate ≥ calcium acetate > calcium chloride. The mean residence time (MRTab) of calcium from calcium ascorbate (32.2 minutes) in the intestinal tract was much longer than that from calcium L-lactate (9.5 minutes), calcium acetate (15.0 minutes) and calcium chloride (13.6 minutes). Furthermore, the foods di-D-fructo-furanose-1,2′:2,3′-dianhydride, sudachi (Citrus sudachi) juice, and moromi-su (a Japanese vinegar) increased the absolute bioavailability of calcium from calcium chloride by 2.46-fold, 2.86-fold, and 1.23-fold, respectively, and prolonged MRTab by 48.5 minutes, 43.1 minutes, and 44.9 minutes, respectively. In conclusion, the prolonged MRTab of calcium in the intestinal tract by anion or food might cause the increased absorbability of calcium. PMID:27186137

  9. NIST Stars: Absolute Spectrophotometric Calibration of Vega and Sirius

    NASA Astrophysics Data System (ADS)

    Deustua, Susana; Woodward, John T.; Rice, Joseph P.; Brown, Steven W.; Maxwell, Stephen E.; Alberding, Brian G.; Lykke, Keith R.

    2018-01-01

    Absolute flux calibration of standard stars, traceable to SI (International System of Units) standards, is essential for 21st century astrophysics. Dark energy investigations that rely on observations of Type Ia supernovae and precise photometric redshifts of weakly lensed galaxies require a minimum accuracy of 0.5 % in the absolute color calibration. Studies that aim to address fundamental stellar astrophysics also benefit. In the era of large telescopes and all sky surveys well-calibrated standard stars that do not saturate and that are available over the whole sky are needed. Significant effort has been expended to obtain absolute measurements of the fundamental standards Vega and Sirius (and other stars) in the visible and near infrared, achieving total uncertainties between1% and 3%, depending on wavelength, that do not meet the needed accuracy. The NIST Stars program aims to determine the top-of-the-atmosphere absolute spectral irradiance of bright stars to an uncertainty less than 1% from a ground-based observatory. NIST Stars has developed a novel, fully SI-traceable laboratory calibration strategy that will enable achieving the desired accuracy. This strategy has two key components. The first is the SI-traceable calibration of the entire instrument system, and the second is the repeated spectroscopic measurement of the target star throughout the night. We will describe our experimental strategy, present preliminary results for Vega and Sirius and an end-to-end uncertainty budget

  10. Absolute and relative emissions analysis in practical combustion systems—effect of water vapor condensation

    NASA Astrophysics Data System (ADS)

    Richter, J. P.; Mollendorf, J. C.; DesJardin, P. E.

    2016-11-01

    Accurate knowledge of the absolute combustion gas composition is necessary in the automotive, aircraft, processing, heating and air conditioning industries where emissions reduction is a major concern. Those industries use a variety of sensor technologies. Many of these sensors are used to analyze the gas by pumping a sample through a system of tubes to reach a remote sensor location. An inherent characteristic with this type of sampling strategy is that the mixture state changes as the sample is drawn towards the sensor. Specifically, temperature and humidity changes can be significant, resulting in a very different gas mixture at the sensor interface compared with the in situ location (water vapor dilution effect). Consequently, the gas concentrations obtained from remotely sampled gas analyzers can be significantly different than in situ values. In this study, inherent errors associated with sampled combustion gas concentration measurements are explored, and a correction methodology is presented to determine the absolute gas composition from remotely measured gas species concentrations. For in situ (wet) measurements a heated zirconium dioxide (ZrO2) oxygen sensor (Bosch LSU 4.9) is used to measure the absolute oxygen concentration. This is used to correct the remotely sampled (dry) measurements taken with an electrochemical sensor within the remote analyzer (Testo 330-2LL). In this study, such a correction is experimentally validated for a specified concentration of carbon monoxide (5020 ppmv).

  11. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  12. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  13. Absolute branching fraction measurements of exclusive D0 semileptonic decays.

    PubMed

    Coan, T E; Gao, Y S; Liu, F; Artuso, M; Boulahouache, C; Blusk, S; Butt, J; Dambasuren, E; Dorjkhaidav, O; Li, J; Menaa, N; Mountain, R; Nandakumar, R; Redjimi, R; Sia, R; Skwarnicki, T; Stone, S; Wang, J C; Zhang, K; Csorna, S E; Bonvicini, G; Cinabro, D; Dubrovin, M; Briere, R A; Chen, G P; Chen, J; Ferguson, T; Tatishvili, G; Vogel, H; Watkins, M E; Rosner, J L; Adam, N E; Alexander, J P; Berkelman, K; Cassel, D G; Crede, V; Duboscq, J E; Ecklund, K M; Ehrlich, R; Fields, L; Gibbons, L; Gittelman, B; Gray, R; Gray, S W; Hartill, D L; Heltsley, B K; Hertz, D; Hsu, L; Jones, C D; Kandaswamy, J; Kreinick, D L; Kuznetsov, V E; Mahlke-Krüger, H; Meyer, T O; Onyisi, P U E; Patterson, J R; Peterson, D; Pivarski, J; Phillips, E A; Riley, D; Ryd, A; Sadoff, A J; Schwarthoff, H; Shepherd, M R; Stroiney, S; Sun, W M; Urner, D; Wilksen, T; Weinberger, M; Athar, S B; Avery, P; Breva-Newell, L; Patel, R; Potlia, V; Stoeck, H; Yelton, J; Rubin, P; Cawlfield, C; Eisenstein, B I; Gollin, G D; Karliner, I; Kim, D; Lowrey, N; Naik, P; Sedlack, C; Selen, M; Williams, J; Wiss, J; Edwards, K W; Besson, D; Pedlar, T K; Cronin-Hennessy, D; Gao, K Y; Gong, D T; Kubota, Y; Klein, T; Lang, B W; Li, S Z; Poling, R; Scott, A W; Smith, A; Dobbs, S; Metreveli, Z; Seth, K K; Tomaradze, A; Zweber, P; Ernst, J; Mahmood, A H; Severini, H; Asner, D M; Dytman, S A; Love, W; Mehrabyan, S; Mueller, J A; Savinov, V; Li, Z; Lopez, A; Mendez, H; Ramirez, J; Huang, G S; Miller, D H; Pavlunin, V; Sanghi, B; Shibata, E I; Shipsey, I P J; Adams, G S; Chasse, M; Cravey, M; Cummings, J P; Danko, I; Napolitano, J; He, Q; Muramatsu, H; Park, C S; Park, W; Thorndike, E H

    2005-10-28

    With the first data sample collected by the CLEO-c detector at the psi(3770) resonance we have studied four exclusive semileptonic decays of the D0 meson. Our results include the first observation and absolute branching fraction measurement for D0 --> p-e+ve and improved measurements of the absolute branching fractions for D0 decays to K-e+ve, pi-e+ve, and K*-e+ve.

  14. Improvements in absolute seismometer sensitivity calibration using local earth gravity measurements

    USGS Publications Warehouse

    Anthony, Robert E.; Ringler, Adam; Wilson, David

    2018-01-01

    The ability to determine both absolute and relative seismic amplitudes is fundamentally limited by the accuracy and precision with which scientists are able to calibrate seismometer sensitivities and characterize their response. Currently, across the Global Seismic Network (GSN), errors in midband sensitivity exceed 3% at the 95% confidence interval and are the least‐constrained response parameter in seismic recording systems. We explore a new methodology utilizing precise absolute Earth gravity measurements to determine the midband sensitivity of seismic instruments. We first determine the absolute sensitivity of Kinemetrics EpiSensor accelerometers to 0.06% at the 99% confidence interval by inverting them in a known gravity field at the Albuquerque Seismological Laboratory (ASL). After the accelerometer is calibrated, we install it in its normal configuration next to broadband seismometers and subject the sensors to identical ground motions to perform relative calibrations of the broadband sensors. Using this technique, we are able to determine the absolute midband sensitivity of the vertical components of Nanometrics Trillium Compact seismometers to within 0.11% and Streckeisen STS‐2 seismometers to within 0.14% at the 99% confidence interval. The technique enables absolute calibrations from first principles that are traceable to National Institute of Standards and Technology (NIST) measurements while providing nearly an order of magnitude more precision than step‐table calibrations.

  15. Absolute photoionization cross-section of the methyl radical.

    PubMed

    Taatjes, Craig A; Osborn, David L; Selby, Talitha M; Meloni, Giovanni; Fan, Haiyan; Pratt, Stephen T

    2008-10-02

    The absolute photoionization cross-section of the methyl radical has been measured using two completely independent methods. The CH3 photoionization cross-section was determined relative to that of acetone and methyl vinyl ketone at photon energies of 10.2 and 11.0 eV by using a pulsed laser-photolysis/time-resolved synchrotron photoionization mass spectrometry method. The time-resolved depletion of the acetone or methyl vinyl ketone precursor and the production of methyl radicals following 193 nm photolysis are monitored simultaneously by using time-resolved synchrotron photoionization mass spectrometry. Comparison of the initial methyl signal with the decrease in precursor signal, in combination with previously measured absolute photoionization cross-sections of the precursors, yields the absolute photoionization cross-section of the methyl radical; sigma(CH3)(10.2 eV) = (5.7 +/- 0.9) x 10(-18) cm(2) and sigma(CH3)(11.0 eV) = (6.0 +/- 2.0) x 10(-18) cm(2). The photoionization cross-section for vinyl radical determined by photolysis of methyl vinyl ketone is in good agreement with previous measurements. The methyl radical photoionization cross-section was also independently measured relative to that of the iodine atom by comparison of ionization signals from CH3 and I fragments following 266 nm photolysis of methyl iodide in a molecular-beam ion-imaging apparatus. These measurements gave a cross-section of (5.4 +/- 2.0) x 10(-18) cm(2) at 10.460 eV, (5.5 +/- 2.0) x 10(-18) cm(2) at 10.466 eV, and (4.9 +/- 2.0) x 10(-18) cm(2) at 10.471 eV. The measurements allow relative photoionization efficiency spectra of methyl radical to be placed on an absolute scale and will facilitate quantitative measurements of methyl concentrations by photoionization mass spectrometry.

  16. Absolute Stability Analysis of a Phase Plane Controlled Spacecraft

    NASA Technical Reports Server (NTRS)

    Jang, Jiann-Woei; Plummer, Michael; Bedrossian, Nazareth; Hall, Charles; Jackson, Mark; Spanos, Pol

    2010-01-01

    Many aerospace attitude control systems utilize phase plane control schemes that include nonlinear elements such as dead zone and ideal relay. To evaluate phase plane control robustness, stability margin prediction methods must be developed. Absolute stability is extended to predict stability margins and to define an abort condition. A constrained optimization approach is also used to design flex filters for roll control. The design goal is to optimize vehicle tracking performance while maintaining adequate stability margins. Absolute stability is shown to provide satisfactory stability constraints for the optimization.

  17. Assessing the Security of Connected Diabetes Devices.

    PubMed

    Out, Dirk-Jan; Tettero, Olaf

    2017-03-01

    This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.

  18. Intracortical myelination in musicians with absolute pitch: Quantitative morphometry using 7-T MRI.

    PubMed

    Kim, Seung-Goo; Knösche, Thomas R

    2016-10-01

    Absolute pitch (AP) is known as the ability to recognize and label the pitch chroma of a given tone without external reference. Known brain structures and functions related to AP are mainly of macroscopic aspects. To shed light on the underlying neural mechanism of AP, we investigated the intracortical myeloarchitecture in musicians with and without AP using the quantitative mapping of the longitudinal relaxation rates with ultra-high-field magnetic resonance imaging at 7 T. We found greater intracortical myelination for AP musicians in the anterior region of the supratemporal plane, particularly the medial region of the right planum polare (PP). In the same region of the right PP, we also found a positive correlation with a behavioral index of AP performance. In addition, we found a positive correlation with a frequency discrimination threshold in the anterolateral Heschl's gyrus in the right hemisphere, demonstrating distinctive neural processes of absolute recognition and relative discrimination of pitch. Regarding possible effects of local myelination in the cortex and the known importance of the anterior superior temporal gyrus/sulcus for the identification of auditory objects, we argue that pitch chroma may be processed as an identifiable object property in AP musicians. Hum Brain Mapp 37:3486-3501, 2016. © 2016 Wiley Periodicals, Inc. © 2016 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc.

  19. A secured e-tendering modeling using misuse case approach

    NASA Astrophysics Data System (ADS)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.

  20. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lopez, Juan; Liefer, Nathan C.; Busho, Colin R.

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML)more » and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.« less

  1. Time-series modeling and prediction of global monthly absolute temperature for environmental decision making

    NASA Astrophysics Data System (ADS)

    Ye, Liming; Yang, Guixia; Van Ranst, Eric; Tang, Huajun

    2013-03-01

    A generalized, structural, time series modeling framework was developed to analyze the monthly records of absolute surface temperature, one of the most important environmental parameters, using a deterministicstochastic combined (DSC) approach. Although the development of the framework was based on the characterization of the variation patterns of a global dataset, the methodology could be applied to any monthly absolute temperature record. Deterministic processes were used to characterize the variation patterns of the global trend and the cyclic oscillations of the temperature signal, involving polynomial functions and the Fourier method, respectively, while stochastic processes were employed to account for any remaining patterns in the temperature signal, involving seasonal autoregressive integrated moving average (SARIMA) models. A prediction of the monthly global surface temperature during the second decade of the 21st century using the DSC model shows that the global temperature will likely continue to rise at twice the average rate of the past 150 years. The evaluation of prediction accuracy shows that DSC models perform systematically well against selected models of other authors, suggesting that DSC models, when coupled with other ecoenvironmental models, can be used as a supplemental tool for short-term (˜10-year) environmental planning and decision making.

  2. Intracortical myelination in musicians with absolute pitch: Quantitative morphometry using 7‐T MRI

    PubMed Central

    Knösche, Thomas R.

    2016-01-01

    Abstract Absolute pitch (AP) is known as the ability to recognize and label the pitch chroma of a given tone without external reference. Known brain structures and functions related to AP are mainly of macroscopic aspects. To shed light on the underlying neural mechanism of AP, we investigated the intracortical myeloarchitecture in musicians with and without AP using the quantitative mapping of the longitudinal relaxation rates with ultra‐high‐field magnetic resonance imaging at 7 T. We found greater intracortical myelination for AP musicians in the anterior region of the supratemporal plane, particularly the medial region of the right planum polare (PP). In the same region of the right PP, we also found a positive correlation with a behavioral index of AP performance. In addition, we found a positive correlation with a frequency discrimination threshold in the anterolateral Heschl's gyrus in the right hemisphere, demonstrating distinctive neural processes of absolute recognition and relative discrimination of pitch. Regarding possible effects of local myelination in the cortex and the known importance of the anterior superior temporal gyrus/sulcus for the identification of auditory objects, we argue that pitch chroma may be processed as an identifiable object property in AP musicians. Hum Brain Mapp 37:3486–3501, 2016. © 2016 Wiley Periodicals, Inc. PMID:27160707

  3. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  4. Absolute Points for Multiple Assignment Problems

    ERIC Educational Resources Information Center

    Adlakha, V.; Kowalski, K.

    2006-01-01

    An algorithm is presented to solve multiple assignment problems in which a cost is incurred only when an assignment is made at a given cell. The proposed method recursively searches for single/group absolute points to identify cells that must be loaded in any optimal solution. Unlike other methods, the first solution is the optimal solution. The…

  5. The PMA Catalogue: 420 million positions and absolute proper motions

    NASA Astrophysics Data System (ADS)

    Akhmetov, V. S.; Fedorov, P. N.; Velichko, A. B.; Shulga, V. M.

    2017-07-01

    We present a catalogue that contains about 420 million absolute proper motions of stars. It was derived from the combination of positions from Gaia DR1 and 2MASS, with a mean difference of epochs of about 15 yr. Most of the systematic zonal errors inherent in the 2MASS Catalogue were eliminated before deriving the absolute proper motions. The absolute calibration procedure (zero-pointing of the proper motions) was carried out using about 1.6 million positions of extragalactic sources. The mean formal error of the absolute calibration is less than 0.35 mas yr-1. The derived proper motions cover the whole celestial sphere without gaps for a range of stellar magnitudes from 8 to 21 mag. In the sky areas where the extragalactic sources are invisible (the avoidance zone), a dedicated procedure was used that transforms the relative proper motions into absolute ones. The rms error of proper motions depends on stellar magnitude and ranges from 2-5 mas yr-1 for stars with 10 mag < G < 17 mag to 5-10 mas yr-1 for faint ones. The present catalogue contains the Gaia DR1 positions of stars for the J2015 epoch. The system of the PMA proper motions does not depend on the systematic errors of the 2MASS positions, and in the range from 14 to 21 mag represents an independent realization of a quasi-inertial reference frame in the optical and near-infrared wavelength range. The Catalogue also contains stellar magnitudes taken from the Gaia DR1 and 2MASS catalogues. A comparison of the PMA proper motions of stars with similar data from certain recent catalogues has been undertaken.

  6. Development and validation of a cerebral oximeter capable of absolute accuracy.

    PubMed

    MacLeod, David B; Ikeda, Keita; Vacchiano, Charles; Lobbestael, Aaron; Wahr, Joyce A; Shaw, Andrew D

    2012-12-01

    Cerebral oximetry may be a valuable monitor, but few validation data are available, and most report the change from baseline rather than absolute accuracy, which may be affected by individuals whose oximetric values are outside the expected range. The authors sought to develop and validate a cerebral oximeter capable of absolute accuracy. An in vivo research study. A university human physiology laboratory. Healthy human volunteers were enrolled in calibration and validation studies of 2 cerebral oximetric sensors, the Nonin 8000CA and 8004CA. The 8000CA validation study identified 5 individuals with atypical cerebral oxygenation values; their data were used to design the 8004CA sensor, which subsequently underwent calibration and validation. Volunteers were taken through a stepwise hypoxia protocol to a minimum saturation of peripheral oxygen. Arteriovenous saturation (70% jugular bulb venous saturation and 30% arterial saturation) at 6 hypoxic plateaus was used as the reference value for the cerebral oximeter. Absolute accuracy was defined using a combination of the bias and precision of the paired saturations (A(RMS)). In the validation study for the 8000CA sensor (n = 9, 106 plateaus), relative accuracy was an A(RMS) of 2.7, with an absolute accuracy of 8.1, meeting the criteria for a relative (trend) monitor, but not an absolute monitor. In the validation study for the 8004CA sensor (n = 11, 119 plateaus), the A(RMS) of the 8004CA was 4.1, meeting the prespecified success criterion of <5.0. The Nonin cerebral oximeter using the 8004CA sensor can provide absolute data on regional cerebral saturation compared with arteriovenous saturation, even in subjects previously shown to have values outside the normal population distribution curves. Copyright © 2012 Elsevier Inc. All rights reserved.

  7. Cyber security best practices for the nuclear industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  8. Assessing the Security of Connected Diabetes Devices

    PubMed Central

    Out, Dirk-Jan; Tettero, Olaf

    2017-01-01

    This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190

  9. Transportation Security Administration in Defense of the National Aviation Infrastructure

    DTIC Science & Technology

    2009-02-12

    evidence suggests a hole exists within our airport security process. That hole may be caused by an over-reliance on technology and a blatant disregard of...environment enables BDOs to operate with increased effectiveness.11 Technology. Three major tools sit at the airport security technology forefront...Through Covert Testing of TSA’s Passenger Screening Process, GAO‐08‐48T, 15 Nov 07, 2. 16 Orlando News, “TSA Workers Skipping Orlando Airport Security Causes

  10. Absolute and convective instabilities in combined Couette-Poiseuille flow past a neo-Hookean solid

    NASA Astrophysics Data System (ADS)

    Patne, Ramkarn; Shankar, V.

    2017-12-01

    Temporal and spatio-temporal stability analyses are carried out to characterize the occurrence of convective and absolute instabilities in combined Couette-Poiseuille flow of a Newtonian fluid past a deformable, neo-Hookean solid layer in the creeping-flow limit. Plane Couette flow of a Newtonian fluid past a neo-Hookean solid becomes temporally unstable in the inertia-less limit when the parameter Γ = V η/(GR) exceeds a critical value. Here, V is the velocity of the top plate, η is the fluid viscosity, G is the shear modulus of the solid layer, and R is the fluid layer thickness. The Kupfer-Bers method is employed to demarcate regions of absolute and convective instabilities in the Γ-H parameter space, where H is the ratio of solid to fluid thickness in the system. For certain ranges of the thickness ratio H, we find that the flow could be absolutely unstable, and the critical Γ required for absolute instability is very close to that for temporal instability, thus making the flow absolutely unstable at the onset of temporal instability. In some cases, there is a gap in the parameter Γ between the temporal and absolute instability boundaries. The present study thus shows that absolute instabilities are possible, even at very low Reynolds numbers in flow past deformable solid surfaces. The presence of absolute instabilities could potentially be exploited in the enhancement of mixing at low Reynolds numbers in flow through channels with deformable solid walls.

  11. A vibration correction method for free-fall absolute gravimeters

    NASA Astrophysics Data System (ADS)

    Qian, J.; Wang, G.; Wu, K.; Wang, L. J.

    2018-02-01

    An accurate determination of gravitational acceleration, usually approximated as 9.8 m s-2, has been playing an important role in the areas of metrology, geophysics, and geodetics. Absolute gravimetry has been experiencing rapid developments in recent years. Most absolute gravimeters today employ a free-fall method to measure gravitational acceleration. Noise from ground vibration has become one of the most serious factors limiting measurement precision. Compared to vibration isolators, the vibration correction method is a simple and feasible way to reduce the influence of ground vibrations. A modified vibration correction method is proposed and demonstrated. A two-dimensional golden section search algorithm is used to search for the best parameters of the hypothetical transfer function. Experiments using a T-1 absolute gravimeter are performed. It is verified that for an identical group of drop data, the modified method proposed in this paper can achieve better correction effects with much less computation than previous methods. Compared to vibration isolators, the correction method applies to more hostile environments and even dynamic platforms, and is expected to be used in a wider range of applications.

  12. An absolute photometric system at 10 and 20 microns

    NASA Technical Reports Server (NTRS)

    Rieke, G. H.; Lebofsky, M. J.; Low, F. J.

    1985-01-01

    Two new direct calibrations at 10 and 20 microns are presented in which terrestrial flux standards are referred to infrared standard stars. These measurements give both good agreement and higher accuracy when compared with previous direct calibrations. As a result, the absolute calibrations at 10 and 20 microns have now been determined with accuracies of 3 and 8 percent, respectively. A variety of absolute calibrations based on extrapolation of stellar spectra from the visible to 10 microns are reviewed. Current atmospheric models of A-type stars underestimate their fluxes by about 10 percent at 10 microns, whereas models of solar-type stars agree well with the direct calibrations. The calibration at 20 microns can probably be determined to about 5 percent by extrapolation from the more accurate result at 10 microns. The photometric system at 10 and 20 microns is updated to reflect the new absolute calibration, to base its zero point directly on the colors of A0 stars, and to improve the accuracy in the comparison of the standard stars.

  13. Wide-field absolute transverse blood flow velocity mapping in vessel centerline

    NASA Astrophysics Data System (ADS)

    Wu, Nanshou; Wang, Lei; Zhu, Bifeng; Guan, Caizhong; Wang, Mingyi; Han, Dingan; Tan, Haishu; Zeng, Yaguang

    2018-02-01

    We propose a wide-field absolute transverse blood flow velocity measurement method in vessel centerline based on absorption intensity fluctuation modulation effect. The difference between the light absorption capacities of red blood cells and background tissue under low-coherence illumination is utilized to realize the instantaneous and average wide-field optical angiography images. The absolute fuzzy connection algorithm is used for vessel centerline extraction from the average wide-field optical angiography. The absolute transverse velocity in the vessel centerline is then measured by a cross-correlation analysis according to instantaneous modulation depth signal. The proposed method promises to contribute to the treatment of diseases, such as those related to anemia or thrombosis.

  14. On determining absolute entropy without quantum theory or the third law of thermodynamics

    NASA Astrophysics Data System (ADS)

    Steane, Andrew M.

    2016-04-01

    We employ classical thermodynamics to gain information about absolute entropy, without recourse to statistical methods, quantum mechanics or the third law of thermodynamics. The Gibbs-Duhem equation yields various simple methods to determine the absolute entropy of a fluid. We also study the entropy of an ideal gas and the ionization of a plasma in thermal equilibrium. A single measurement of the degree of ionization can be used to determine an unknown constant in the entropy equation, and thus determine the absolute entropy of a gas. It follows from all these examples that the value of entropy at absolute zero temperature does not need to be assigned by postulate, but can be deduced empirically.

  15. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  16. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  17. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  18. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  19. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  20. Fingerprints of flower absolutes using supercritical fluid chromatography hyphenated with high resolution mass spectrometry.

    PubMed

    Santerre, Cyrille; Vallet, Nadine; Touboul, David

    2018-06-02

    Supercritical fluid chromatography hyphenated with high resolution mass spectrometry (SFC-HRMS) was developed for fingerprint analysis of different flower absolutes commonly used in cosmetics field, especially in perfumes. Supercritical fluid chromatography-atmospheric pressure photoionization-high resolution mass spectrometry (SFC-APPI-HRMS) technique was employed to identify the components of the fingerprint. The samples were separated with a porous graphitic carbon (PGC) Hypercarb™ column (100 mm × 2.1 mm, 3 μm) by gradient elution using supercritical CO 2 and ethanol (0.0-20.0 min (2-30% B), 20.0-25.0 min (30% B), 25.0-26.0 min (30-2% B) and 26.0-30.0 min (2% B)) as mobile phase at a flow rate of 1.5 mL/min. In order to compare the SFC fingerprints between five different flower absolutes: Jasminum grandiflorum absolutes, Jasminum sambac absolutes, Narcissus jonquilla absolutes, Narcissus poeticus absolutes, Lavandula angustifolia absolutes from different suppliers and batches, the chemometric procedure including principal component analysis (PCA) was applied to classify the samples according to their genus and their species. Consistent results were obtained to show that samples could be successfully discriminated. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. Telling in-tune from out-of-tune: widespread evidence for implicit absolute intonation.

    PubMed

    Van Hedger, Stephen C; Heald, Shannon L M; Huang, Alex; Rutstein, Brooke; Nusbaum, Howard C

    2017-04-01

    Absolute pitch (AP) is the rare ability to name or produce an isolated musical note without the aid of a reference note. One skill thought to be unique to AP possessors is the ability to provide absolute intonation judgments (e.g., classifying an isolated note as "in-tune" or "out-of-tune"). Recent work has suggested that absolute intonation perception among AP possessors is not crystallized in a critical period of development, but is dynamically maintained by the listening environment, in which the vast majority of Western music is tuned to a specific cultural standard. Given that all listeners of Western music are constantly exposed to this specific cultural tuning standard, our experiments address whether absolute intonation perception extends beyond AP possessors. We demonstrate that non-AP listeners are able to accurately judge the intonation of completely isolated notes. Both musicians and nonmusicians showed evidence for absolute intonation recognition when listening to familiar timbres (piano and violin). When testing unfamiliar timbres (triangle and inverted sine waves), only musicians showed weak evidence of absolute intonation recognition (Experiment 2). Overall, these results highlight a previously unknown similarity between AP and non-AP possessors' long-term musical note representations, including evidence of sensitivity to frequency.

  2. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  3. How regularity representations of short sound patterns that are based on relative or absolute pitch information establish over time: An EEG study

    PubMed Central

    Schröger, Erich; Grimm, Sabine

    2017-01-01

    The recognition of sound patterns in speech or music (e.g., a melody that is played in different keys) requires knowledge about pitch relations between successive sounds. We investigated the formation of regularity representations for sound patterns in an event-related potential (ERP) study. A pattern, which consisted of six concatenated 50 ms tone segments differing in fundamental frequency, was presented 1, 2, 3, 6, or 12 times and then replaced by another pattern by randomly changing the pitch of the tonal segments (roving standard paradigm). In an absolute repetition condition, patterns were repeated identically, whereas in a transposed condition, only the pitch relations of the tonal segments of the patterns were repeated, while the entire patterns were shifted up or down in pitch. During ERP measurement participants were not informed about the pattern repetition rule, but were instructed to discriminate rarely occurring targets of lower or higher sound intensity. EPRs for pattern changes (mismatch negativity, MMN; and P3a) and for pattern repetitions (repetition positivity, RP) revealed that the auditory system is able to rapidly extract regularities from unfamiliar complex sound patterns even when absolute pitch varies. Yet, enhanced RP and P3a amplitudes, and improved behavioral performance measured in a post-hoc test, in the absolute as compared with the transposed condition suggest that it is more difficult to encode patterns without absolute pitch information. This is explained by dissociable processing of standards and deviants as well as a back propagation mechanism to early sensory processing stages, which is effective after less repetitions of a standard stimulus for absolute pitch. PMID:28472146

  4. How regularity representations of short sound patterns that are based on relative or absolute pitch information establish over time: An EEG study.

    PubMed

    Bader, Maria; Schröger, Erich; Grimm, Sabine

    2017-01-01

    The recognition of sound patterns in speech or music (e.g., a melody that is played in different keys) requires knowledge about pitch relations between successive sounds. We investigated the formation of regularity representations for sound patterns in an event-related potential (ERP) study. A pattern, which consisted of six concatenated 50 ms tone segments differing in fundamental frequency, was presented 1, 2, 3, 6, or 12 times and then replaced by another pattern by randomly changing the pitch of the tonal segments (roving standard paradigm). In an absolute repetition condition, patterns were repeated identically, whereas in a transposed condition, only the pitch relations of the tonal segments of the patterns were repeated, while the entire patterns were shifted up or down in pitch. During ERP measurement participants were not informed about the pattern repetition rule, but were instructed to discriminate rarely occurring targets of lower or higher sound intensity. EPRs for pattern changes (mismatch negativity, MMN; and P3a) and for pattern repetitions (repetition positivity, RP) revealed that the auditory system is able to rapidly extract regularities from unfamiliar complex sound patterns even when absolute pitch varies. Yet, enhanced RP and P3a amplitudes, and improved behavioral performance measured in a post-hoc test, in the absolute as compared with the transposed condition suggest that it is more difficult to encode patterns without absolute pitch information. This is explained by dissociable processing of standards and deviants as well as a back propagation mechanism to early sensory processing stages, which is effective after less repetitions of a standard stimulus for absolute pitch.

  5. Absolute vacuum ultraviolet photoabsorption cross section studies of atomic and molecular species: Techniques and observational data

    NASA Technical Reports Server (NTRS)

    Judge, D. L.; Wu, C. Y. R.

    1990-01-01

    Absorption of a high energy photon (greater than 6 eV) by an isolated molecule results in the formation of highly excited quasi-discrete or continuum states which evolve through a wide range of direct and indirect photochemical processes. These are: photoionization and autoionization, photodissociation and predissociation, and fluorescence. The ultimate goal is to understand the dynamics of the excitation and decay processes and to quantitatively measure the absolute partial cross sections for all processes which occur in photoabsorption. Typical experimental techniques and the status of observational results of particular interest to solar system observations are presented.

  6. Alternative security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weston, B.H.

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  7. Improved Absolute Radiometric Calibration of a UHF Airborne Radar

    NASA Technical Reports Server (NTRS)

    Chapin, Elaine; Hawkins, Brian P.; Harcke, Leif; Hensley, Scott; Lou, Yunling; Michel, Thierry R.; Moreira, Laila; Muellerschoen, Ronald J.; Shimada, Joanne G.; Tham, Kean W.; hide

    2015-01-01

    The AirMOSS airborne SAR operates at UHF and produces fully polarimetric imagery. The AirMOSS radar data are used to produce Root Zone Soil Moisture (RZSM) depth profiles. The absolute radiometric accuracy of the imagery, ideally of better than 0.5 dB, is key to retrieving RZSM, especially in wet soils where the backscatter as a function of soil moisture function tends to flatten out. In this paper we assess the absolute radiometric uncertainty in previously delivered data, describe a method to utilize Built In Test (BIT) data to improve the radiometric calibration, and evaluate the improvement from applying the method.

  8. Absolute metrology for space interferometers

    NASA Astrophysics Data System (ADS)

    Salvadé, Yves; Courteville, Alain; Dändliker, René

    2017-11-01

    The crucial issue of space-based interferometers is the laser interferometric metrology systems to monitor with very high accuracy optical path differences. Although classical high-resolution laser interferometers using a single wavelength are well developed, this type of incremental interferometer has a severe drawback: any interruption of the interferometer signal results in the loss of the zero reference, which requires a new calibration, starting at zero optical path difference. We propose in this paper an absolute metrology system based on multiplewavelength interferometry.

  9. Absolute and Convective Instability of a Liquid Jet in Microgravity

    NASA Technical Reports Server (NTRS)

    Lin, Sung P.; Vihinen, I.; Honohan, A.; Hudman, Michael D.

    1996-01-01

    The transition from convective to absolute instability is observed in the 2.2 second drop tower of the NASA Lewis Research Center. In convective instability the disturbance grows spatially as it is convected downstream. In absolute instability the disturbance propagates both downstream and upstream, and manifests itself as an expanding sphere. The transition Reynolds numbers are determined for two different Weber numbers by use of Glycerin and a Silicone oil. Preliminary comparisons with theory are made.

  10. Study of the optimum level of electrode placement for the evaluation of absolute lung resistivity with the Mk3.5 EIT system.

    PubMed

    Nebuya, S; Noshiro, M; Yonemoto, A; Tateno, S; Brown, B H; Smallwood, R H; Milnes, P

    2006-05-01

    Inter-subject variability has caused the majority of previous electrical impedance tomography (EIT) techniques to focus on the derivation of relative or difference measures of in vivo tissue resistivity. Implicit in these techniques is the requirement for a reference or previously defined data set. This study assesses the accuracy and optimum electrode placement strategy for a recently developed method which estimates an absolute value of organ resistivity without recourse to a reference data set. Since this measurement of tissue resistivity is absolute, in Ohm metres, it should be possible to use EIT measurements for the objective diagnosis of lung diseases such as pulmonary oedema and emphysema. However, the stability and reproducibility of the method have not yet been investigated fully. To investigate these problems, this study used a Sheffield Mk3.5 system which was configured to operate with eight measurement electrodes. As a result of this study, the absolute resistivity measurement was found to be insensitive to the electrode level between 4 and 5 cm above the xiphoid process. The level of the electrode plane was varied between 2 cm and 7 cm above the xiphoid process. Absolute lung resistivity in 18 normal subjects (age 22.6 +/- 4.9, height 169.1 +/- 5.7 cm, weight 60.6 +/- 4.5 kg, body mass index 21.2 +/- 1.6: mean +/- standard deviation) was measured during both normal and deep breathing for 1 min. Three sets of measurements were made over a period of several days on each of nine of the normal male subjects. No significant differences in absolute lung resistivity were found, either during normal tidal breathing between the electrode levels of 4 and 5 cm (9.3 +/- 2.4 Omega m, 9.6 +/- 1.9 Omega m at 4 and 5 cm, respectively: mean +/- standard deviation) or during deep breathing between the electrode levels of 4 and 5 cm (10.9 +/- 2.9 Omega m and 11.1 +/- 2.3 Omega m, respectively: mean +/- standard deviation). However, the differences in absolute lung

  11. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  12. System and method for calibrating a rotary absolute position sensor

    NASA Technical Reports Server (NTRS)

    Davis, Donald R. (Inventor); Permenter, Frank Noble (Inventor); Radford, Nicolaus A (Inventor)

    2012-01-01

    A system includes a rotary device, a rotary absolute position (RAP) sensor generating encoded pairs of voltage signals describing positional data of the rotary device, a host machine, and an algorithm. The algorithm calculates calibration parameters usable to determine an absolute position of the rotary device using the encoded pairs, and is adapted for linearly-mapping an ellipse defined by the encoded pairs to thereby calculate the calibration parameters. A method of calibrating the RAP sensor includes measuring the rotary position as encoded pairs of voltage signals, linearly-mapping an ellipse defined by the encoded pairs to thereby calculate the calibration parameters, and calculating an absolute position of the rotary device using the calibration parameters. The calibration parameters include a positive definite matrix (A) and a center point (q) of the ellipse. The voltage signals may include an encoded sine and cosine of a rotary angle of the rotary device.

  13. Optimization of airport security lanes

    NASA Astrophysics Data System (ADS)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  14. Security Economics and European Policy

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  15. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  16. Security systems engineering overview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less

  17. Linear ultrasonic motor for absolute gravimeter.

    PubMed

    Jian, Yue; Yao, Zhiyuan; Silberschmidt, Vadim V

    2017-05-01

    Thanks to their compactness and suitability for vacuum applications, linear ultrasonic motors are considered as substitutes for classical electromagnetic motors as driving elements in absolute gravimeters. Still, their application is prevented by relatively low power output. To overcome this limitation and provide better stability, a V-type linear ultrasonic motor with a new clamping method is proposed for a gravimeter. In this paper, a mechanical model of stators with flexible clamping components is suggested, according to a design criterion for clamps of linear ultrasonic motors. After that, an effect of tangential and normal rigidity of the clamping components on mechanical output is studied. It is followed by discussion of a new clamping method with sufficient tangential rigidity and a capability to facilitate pre-load. Additionally, a prototype of the motor with the proposed clamping method was fabricated and the performance tests in vertical direction were implemented. Experimental results show that the suggested motor has structural stability and high dynamic performance, such as no-load speed of 1.4m/s and maximal thrust of 43N, meeting the requirements for absolute gravimeters. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Secure distribution for high resolution remote sensing images

    NASA Astrophysics Data System (ADS)

    Liu, Jin; Sun, Jing; Xu, Zheng Q.

    2010-09-01

    The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.

  19. Elderly poverty and Supplemental Security Income.

    PubMed

    Nicholas, Joyce; Wiseman, Michael

    2009-01-01

    In the United States, poverty is generally assessed on the basis of income, as reported in the Current Population Survey's (CPS's) Annual Social and Economic Supplement (ASEC), using an official poverty standard established in the 1960s. The prevalence of receipt of means-tested transfers is underreported in the CPS, with uncertain consequences for the measurement of poverty rates by both the official standard and by using alternative "relative" measures linked to the contemporaneous income distribution. The article reports results estimating the prevalence of poverty in 2002. We complete this effort by using a version of the 2003 CPS/ASEC for which a substantial majority (76 percent) of respondents have individual records matching administrative data from the Social Security Administration on earnings and receipt of income from the Old-Age, Survivors, and Disability Insurance and Supplemental Security Income (SSI) programs. Adjustment of the CPS income data with administrative data substantially improves coverage of SSI receipt. The consequence for general poverty is sensitive to the merge procedures employed, but under both sets of merge procedures considered, the estimated poverty rate among all elderly persons and among elderly SSI recipients is substantially less than rates estimated using the unadjusted CPS. The effect of the administrative adjustment is less significant for perception of relative poverty than for absolute poverty. We emphasize the effect of these adjustments on perception of poverty among the elderly in general and elderly SSI recipients in particular.

  20. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    NASA Astrophysics Data System (ADS)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  1. Robust control design with real parameter uncertainty using absolute stability theory. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    How, Jonathan P.; Hall, Steven R.

    1993-01-01

    The purpose of this thesis is to investigate an extension of mu theory for robust control design by considering systems with linear and nonlinear real parameter uncertainties. In the process, explicit connections are made between mixed mu and absolute stability theory. In particular, it is shown that the upper bounds for mixed mu are a generalization of results from absolute stability theory. Both state space and frequency domain criteria are developed for several nonlinearities and stability multipliers using the wealth of literature on absolute stability theory and the concepts of supply rates and storage functions. The state space conditions are expressed in terms of Riccati equations and parameter-dependent Lyapunov functions. For controller synthesis, these stability conditions are used to form an overbound of the H2 performance objective. A geometric interpretation of the equivalent frequency domain criteria in terms of off-axis circles clarifies the important role of the multiplier and shows that both the magnitude and phase of the uncertainty are considered. A numerical algorithm is developed to design robust controllers that minimize the bound on an H2 cost functional and satisfy an analysis test based on the Popov stability multiplier. The controller and multiplier coefficients are optimized simultaneously, which avoids the iteration and curve-fitting procedures required by the D-K procedure of mu synthesis. Several benchmark problems and experiments on the Middeck Active Control Experiment at M.I.T. demonstrate that these controllers achieve good robust performance and guaranteed stability bounds.

  2. Absolute surface reconstruction by slope metrology and photogrammetry

    NASA Astrophysics Data System (ADS)

    Dong, Yue

    Developing the manufacture of aspheric and freeform optical elements requires an advanced metrology method which is capable of inspecting these elements with arbitrary freeform surfaces. In this dissertation, a new surface measurement scheme is investigated for such a purpose, which is to measure the absolute surface shape of an object under test through its surface slope information obtained by photogrammetric measurement. A laser beam propagating toward the object reflects on its surface while the vectors of the incident and reflected beams are evaluated from the four spots they leave on the two parallel transparent windows in front of the object. The spots' spatial coordinates are determined by photogrammetry. With the knowledge of the incident and reflected beam vectors, the local slope information of the object surface is obtained through vector calculus and finally yields the absolute object surface profile by a reconstruction algorithm. An experimental setup is designed and the proposed measuring principle is experimentally demonstrated by measuring the absolute surface shape of a spherical mirror. The measurement uncertainty is analyzed, and efforts for improvement are made accordingly. In particular, structured windows are designed and fabricated to generate uniform scattering spots left by the transmitted laser beams. Calibration of the fringe reflection instrument, another typical surface slope measurement method, is also reported in the dissertation. Finally, a method for uncertainty analysis of a photogrammetry measurement system by optical simulation is investigated.

  3. An evaluation of the accuracy of geomagnetic data obtained from an unattended, automated, quasi-absolute station

    USGS Publications Warehouse

    Herzog, D.C.

    1990-01-01

    A comparison is made of geomagnetic calibration data obtained from a high-sensitivity proton magnetometer enclosed within an orthogonal bias coil system, with data obtained from standard procedures at a mid-latitude U.S. Geological Survey magnetic observatory using a quartz horizontal magnetometer, a Ruska magnetometer, and a total field magnetometer. The orthogonal coil arrangement is used with the proton magnetometer to provide Deflected-Inclination-Deflected-Declination (DIDD) data from which quasi-absolute values of declination, horizontal intensity, and vertical intensity can be derived. Vector magnetometers provide the ordinate values to yield baseline calibrations for both the DIDD and standard observatory processes. Results obtained from a prototype system over a period of several months indicate that the DIDD unit can furnish adequate absolute field values for maintaining observatory calibration data, thus providing baseline control for unattended, remote stations. ?? 1990.

  4. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...

  5. A novel capacitive absolute positioning sensor based on time grating with nanometer resolution

    NASA Astrophysics Data System (ADS)

    Pu, Hongji; Liu, Hongzhong; Liu, Xiaokang; Peng, Kai; Yu, Zhicheng

    2018-05-01

    The present work proposes a novel capacitive absolute positioning sensor based on time grating. The sensor includes a fine incremental-displacement measurement component combined with a coarse absolute-position measurement component to obtain high-resolution absolute positioning measurements. A single row type sensor was proposed to achieve fine displacement measurement, which combines the two electrode rows of a previously proposed double-row type capacitive displacement sensor based on time grating into a single row. To achieve absolute positioning measurement, the coarse measurement component is designed as a single-row type displacement sensor employing a single spatial period over the entire measurement range. In addition, this component employs a rectangular induction electrode and four groups of orthogonal discrete excitation electrodes with half-sinusoidal envelope shapes, which were formed by alternately extending the rectangular electrodes of the fine measurement component. The fine and coarse measurement components are tightly integrated to form a compact absolute positioning sensor. A prototype sensor was manufactured using printed circuit board technology for testing and optimization of the design in conjunction with simulations. Experimental results show that the prototype sensor achieves a ±300 nm measurement accuracy with a 1 nm resolution over a displacement range of 200 mm when employing error compensation. The proposed sensor is an excellent alternative to presently available long-range absolute nanometrology sensors owing to its low cost, simple structure, and ease of manufacturing.

  6. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  7. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... agent is prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly... truncated and converted to an electronic image. At a minimum, the agent must retain such securities for a...

  8. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  9. Characterizing absolute piezoelectric microelectromechanical system displacement using an atomic force microscope

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, J., E-mail: radiant@ferrodevices.com; Chapman, S., E-mail: radiant@ferrodevices.com

    Piezoresponse Force Microscopy (PFM) is a popular tool for the study of ferroelectric and piezoelectric materials at the nanometer level. Progress in the development of piezoelectric MEMS fabrication is highlighting the need to characterize absolute displacement at the nanometer and Ångstrom scales, something Atomic Force Microscopy (AFM) might do but PFM cannot. Absolute displacement is measured by executing a polarization measurement of the ferroelectric or piezoelectric capacitor in question while monitoring the absolute vertical position of the sample surface with a stationary AFM cantilever. Two issues dominate the execution and precision of such a measurement: (1) the small amplitude ofmore » the electrical signal from the AFM at the Ångstrom level and (2) calibration of the AFM. The authors have developed a calibration routine and test technique for mitigating the two issues, making it possible to use an atomic force microscope to measure both the movement of a capacitor surface as well as the motion of a micro-machine structure actuated by that capacitor. The theory, procedures, pitfalls, and results of using an AFM for absolute piezoelectric measurement are provided.« less

  10. Precise and absolute measurements of complex third-order optical susceptibility

    NASA Astrophysics Data System (ADS)

    Santran, Stephane; Canioni, Lionel; Cardinal, Thierry; Fargin, Evelyne; Le Flem, Gilles; Rouyer, Claude; Sarger, Laurent

    2000-11-01

    We present precise and absolute measurements of full complex third order optical susceptibility on different fused silica and original glasses composed of tellurium, titanium, niobium erbium. These materials are designed to be the key point for applications ranging form high power laser systems to optoelectronics, their nonlinear index of refraction is a major property and thus must be accurately known. Due to the accuracy and sensitivity of our technique, we have been able to find a large dispersion (more than 30%) of the non linear index of fused silica glasses as a function of their processing mode. On the other hand, measurements on tellurium glasses have shown very strong nonlinearities (40 times higher than fused silica), to be linked to the configurations of their cations and anions. Although the titanium and niobium glasses are less nonlinear, they can be promising matrices for addition of luminescent entities like erbium leading to very interesting laser amplification materials. The experimental set-up is a collinear pump-probe (orthogonally polarized) experiment using transient absorption technique. It is built with around a 100 femtosecond laser oscillator. A fast oscillating delay between the pump and the probe allows us to measure the electronic nonlinearity in quasi real-time. This experiment has the following specifications: an absolute measurement accuracy below 10% mainly due to the laser parameters characterization, a relative measurement accuracy of 1% and a resolution less than 5.10-24m2/V2(50 times less than fused silica).

  11. INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project

    NASA Astrophysics Data System (ADS)

    D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj

    The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.

  12. Transfer of absolute and relative predictiveness in human contingency learning.

    PubMed

    Kattner, Florian

    2015-03-01

    Previous animal-learning studies have shown that the effect of the predictive history of a cue on its associability depends on whether priority was set to the absolute or relative predictiveness of that cue. The present study tested this assumption in a human contingency-learning task. In both experiments, one group of participants was trained with predictive and nonpredictive cues that were presented according to an absolute-predictiveness principle (either continuously or partially reinforced cue configurations), whereas a second group was trained with co-occurring cues that differed in predictiveness (emphasizing the relative predictive validity of the cues). In both groups, later test discriminations were learned more readily if the discriminative cues had been predictive in the previous learning stage than if they had been nonpredictive. These results imply that both the absolute and relative predictiveness of a cue lead positive transfer with regard to its associability. The data are discussed with respect to attentional models of associative learning.

  13. Neutron activation analysis of certified samples by the absolute method

    NASA Astrophysics Data System (ADS)

    Kadem, F.; Belouadah, N.; Idiri, Z.

    2015-07-01

    The nuclear reactions analysis technique is mainly based on the relative method or the use of activation cross sections. In order to validate nuclear data for the calculated cross section evaluated from systematic studies, we used the neutron activation analysis technique (NAA) to determine the various constituent concentrations of certified samples for animal blood, milk and hay. In this analysis, the absolute method is used. The neutron activation technique involves irradiating the sample and subsequently performing a measurement of the activity of the sample. The fundamental equation of the activation connects several physical parameters including the cross section that is essential for the quantitative determination of the different elements composing the sample without resorting to the use of standard sample. Called the absolute method, it allows a measurement as accurate as the relative method. The results obtained by the absolute method showed that the values are as precise as the relative method requiring the use of standard sample for each element to be quantified.

  14. Problems of collaborative work of the automated process control system (APCS) and the its information security and solutions.

    NASA Astrophysics Data System (ADS)

    Arakelyan, E. K.; Andryushin, A. V.; Mezin, S. V.; Kosoy, A. A.; Kalinina, Ya V.; Khokhlov, I. S.

    2017-11-01

    The principle of interaction of the specified systems of technological protections by the Automated process control system (APCS) and information safety in case of incorrect execution of the algorithm of technological protection is offered. - checking the correctness of the operation of technological protection in each specific situation using the functional relationship between the monitored parameters. The methodology for assessing the economic feasibility of developing and implementing an information security system.

  15. Absolute versus convective helical magnetorotational instability in a Taylor-Couette flow.

    PubMed

    Priede, Jānis; Gerbeth, Gunter

    2009-04-01

    We analyze numerically the magnetorotational instability of a Taylor-Couette flow in a helical magnetic field [helical magnetorotational instability (HMRI)] using the inductionless approximation defined by a zero magnetic Prandtl number (Pr_{m}=0) . The Chebyshev collocation method is used to calculate the eigenvalue spectrum for small-amplitude perturbations. First, we carry out a detailed conventional linear stability analysis with respect to perturbations in the form of Fourier modes that corresponds to the convective instability which is not in general self-sustained. The helical magnetic field is found to extend the instability to a relatively narrow range beyond its purely hydrodynamic limit defined by the Rayleigh line. There is not only a lower critical threshold at which HMRI appears but also an upper one at which it disappears again. The latter distinguishes the HMRI from a magnetically modified Taylor vortex flow. Second, we find an absolute instability threshold as well. In the hydrodynamically unstable regime before the Rayleigh line, the threshold of absolute instability is just slightly above the convective one although the critical wavelength of the former is noticeably shorter than that of the latter. Beyond the Rayleigh line the lower threshold of absolute instability rises significantly above the corresponding convective one while the upper one descends significantly below its convective counterpart. As a result, the extension of the absolute HMRI beyond the Rayleigh line is considerably shorter than that of the convective instability. The absolute HMRI is supposed to be self-sustained and, thus, experimentally observable without any external excitation in a system of sufficiently large axial extension.

  16. Assessing Epistemic Sophistication by Considering Domain-Specific Absolute and Multiplicistic Beliefs Separately

    ERIC Educational Resources Information Center

    Peter, Johannes; Rosman, Tom; Mayer, Anne-Kathrin; Leichner, Nikolas; Krampen, Günter

    2016-01-01

    Background: Particularly in higher education, not only a view of science as a means of finding absolute truths (absolutism), but also a view of science as generally tentative (multiplicism) can be unsophisticated and obstructive for learning. Most quantitative epistemic belief inventories neglect this and understand epistemic sophistication as…

  17. Absolute gravimetry as an operational tool for geodynamics research

    NASA Astrophysics Data System (ADS)

    Torge, W.

    Relative gravimetric techniques have been used for nearly 30 years for measuring non-tidal gravity variations with time, and thus have contributed to geodynamics research by monitoring vertical crustal movements and internal mass shifts. With today's accuracy of about ± 0.05µms-2 (or 5µGal), significant results have been obtained in numerous control nets of local extension, especially in connection with seismic and volcanic events. Nevertheless, the main drawbacks of relative gravimetry, which are deficiencies in absolute datum and calibration, set a limit for its application, especially with respect to large-scale networks and long-term investigations. These problems can now be successfully attacked by absolute gravimetry, with transportable gravimeters available since about 20 years. While the absolute technique during the first two centuries of gravimetry's history was based on the pendulum method, the free-fall method can now be employed taking advantage of laser-interferometry, electronic timing, vacuum and shock absorbing techniques, and on-line computer-control. The accuracy inherent in advanced instruments is about ± 0.05 µms-2. In field work, generally an accuracy of ±0.1 µms-2 may be expected, strongly depending on local environmental conditions.

  18. Solving Absolute Value Equations Algebraically and Geometrically

    ERIC Educational Resources Information Center

    Shiyuan, Wei

    2005-01-01

    The way in which students can improve their comprehension by understanding the geometrical meaning of algebraic equations or solving algebraic equation geometrically is described. Students can experiment with the conditions of the absolute value equation presented, for an interesting way to form an overall understanding of the concept.

  19. Achieving Climate Change Absolute Accuracy in Orbit

    NASA Technical Reports Server (NTRS)

    Wielicki, Bruce A.; Young, D. F.; Mlynczak, M. G.; Thome, K. J; Leroy, S.; Corliss, J.; Anderson, J. G.; Ao, C. O.; Bantges, R.; Best, F.; hide

    2013-01-01

    The Climate Absolute Radiance and Refractivity Observatory (CLARREO) mission will provide a calibration laboratory in orbit for the purpose of accurately measuring and attributing climate change. CLARREO measurements establish new climate change benchmarks with high absolute radiometric accuracy and high statistical confidence across a wide range of essential climate variables. CLARREO's inherently high absolute accuracy will be verified and traceable on orbit to Système Internationale (SI) units. The benchmarks established by CLARREO will be critical for assessing changes in the Earth system and climate model predictive capabilities for decades into the future as society works to meet the challenge of optimizing strategies for mitigating and adapting to climate change. The CLARREO benchmarks are derived from measurements of the Earth's thermal infrared spectrum (5-50 micron), the spectrum of solar radiation reflected by the Earth and its atmosphere (320-2300 nm), and radio occultation refractivity from which accurate temperature profiles are derived. The mission has the ability to provide new spectral fingerprints of climate change, as well as to provide the first orbiting radiometer with accuracy sufficient to serve as the reference transfer standard for other space sensors, in essence serving as a "NIST [National Institute of Standards and Technology] in orbit." CLARREO will greatly improve the accuracy and relevance of a wide range of space-borne instruments for decadal climate change. Finally, CLARREO has developed new metrics and methods for determining the accuracy requirements of climate observations for a wide range of climate variables and uncertainty sources. These methods should be useful for improving our understanding of observing requirements for most climate change observations.

  20. Landsat-5 TM reflective-band absolute radiometric calibration

    USGS Publications Warehouse

    Chander, G.; Helder, D.L.; Markham, B.L.; Dewald, J.D.; Kaita, E.; Thome, K.J.; Micijevic, E.; Ruggles, T.A.

    2004-01-01

    The Landsat-5 Thematic Mapper (TM) sensor provides the longest running continuous dataset of moderate spatial resolution remote sensing imagery, dating back to its launch in March 1984. Historically, the radiometric calibration procedure for this imagery used the instrument's response to the Internal Calibrator (IC) on a scene-by-scene basis to determine the gain and offset of each detector. Due to observed degradations in the IC, a new procedure was implemented for U.S.-processed data in May 2003. This new calibration procedure is based on a lifetime radiometric calibration model for the instrument's reflective bands (1-5 and 7) and is derived, in part, from the IC response without the related degradation effects and is tied to the cross calibration with the Landsat-7 Enhanced Thematic Mapper Plus. Reflective-band absolute radiometric accuracy of the instrument tends to be on the order of 7% to 10%, based on a variety of calibration methods.

  1. Securing the Data Storage and Processing in Cloud Computing Environment

    ERIC Educational Resources Information Center

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  2. Directly relating gas-phase cluster measurements to solution-phase hydrolysis, the absolute standard hydrogen electrode potential, and the absolute proton solvation energy.

    PubMed

    Donald, William A; Leib, Ryan D; O'Brien, Jeremy T; Williams, Evan R

    2009-06-08

    Solution-phase, half-cell potentials are measured relative to other half-cell potentials, resulting in a thermochemical ladder that is anchored to the standard hydrogen electrode (SHE), which is assigned an arbitrary value of 0 V. A new method for measuring the absolute SHE potential is demonstrated in which gaseous nanodrops containing divalent alkaline-earth or transition-metal ions are reduced by thermally generated electrons. Energies for the reactions 1) M(H(2)O)(24)(2+)(g) + e(-)(g)-->M(H(2)O)(24)(+)(g) and 2) M(H(2)O)(24)(2+)(g) + e(-)(g)-->MOH(H(2)O)(23)(+)(g) + H(g) and the hydrogen atom affinities of MOH(H(2)O)(23)(+)(g) are obtained from the number of water molecules lost through each pathway. From these measurements on clusters containing nine different metal ions and known thermochemical values that include solution hydrolysis energies, an average absolute SHE potential of +4.29 V vs. e(-)(g) (standard deviation of 0.02 V) and a real proton solvation free energy of -265 kcal mol(-1) are obtained. With this method, the absolute SHE potential can be obtained from a one-electron reduction of nanodrops containing divalent ions that are not observed to undergo one-electron reduction in aqueous solution.

  3. Directly Relating Gas-Phase Cluster Measurements to Solution-Phase Hydrolysis, the Absolute Standard Hydrogen Electrode Potential, and the Absolute Proton Solvation Energy

    PubMed Central

    Donald, William A.; Leib, Ryan D.; O’Brien, Jeremy T.; Williams, Evan R.

    2009-01-01

    Solution-phase, half-cell potentials are measured relative to other half-cell potentials, resulting in a thermochemical ladder that is anchored to the standard hydrogen electrode (SHE), which is assigned an arbitrary value of 0 V. A new method for measuring the absolute SHE potential is demonstrated in which gaseous nanodrops containing divalent alkaline-earth or transition-metal ions are reduced by thermally generated electrons. Energies for the reactions 1) M-(H2O)242+(g)+e−(g)→M(H2O)24+(g) and 2) M(H2O)242+(g)+e−(g)→MOH(H2O)23+(g)+H(g) and the hydrogen atom affinities of MOH(H2O)23+(g) are obtained from the number of water molecules lost through each pathway. From these measurements on clusters containing nine different metal ions and known thermochemical values that include solution hydrolysis energies, an average absolute SHE potential of +4.29 V vs. e−(g) (standard deviation of 0.02 V) and a real proton solvation free energy of −265 kcal mol−1 are obtained. With this method, the absolute SHE potential can be obtained from a one-electron reduction of nanodrops containing divalent ions that are not observed to undergo one-electron reduction in aqueous solution. PMID:19440999

  4. Articulated Multimedia Physics, Lesson 14, Gases, The Gas Laws, and Absolute Temperature.

    ERIC Educational Resources Information Center

    New York Inst. of Tech., Old Westbury.

    As the fourteenth lesson of the Articulated Multimedia Physics Course, instructional materials are presented in this study guide with relation to gases, gas laws, and absolute temperature. The topics are concerned with the kinetic theory of gases, thermometric scales, Charles' law, ideal gases, Boyle's law, absolute zero, and gas pressures. The…

  5. Software Security Practices: Integrating Security into the SDLC

    DTIC Science & Technology

    2011-05-01

    Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle

  6. A novel cyanide-selective colorimetric and fluorescent chemosensor: first molecular security keypad lock based on phosphotungstic acid and CN- inputs.

    PubMed

    Tavallali, Hossein; Deilamy-Rad, Gohar; Parhami, Abolfath; Hasanli, Nahid

    2014-02-15

    Rhodamine B (RhB) an available dye has been developed as novel and efficient colorimetric and fluorometric chemosensor for cyanide ions in an absolutely aqueous media. The UV-vis absorption and fluorescent emission titrations experiments have been employed to study the sensing process. RhB could act as an efficient "ON-OFF" fluorescent response for phosphotungstic acid (H3PW12O40 or PTA) based on an ion associate process. Also (RhB(+))3 · PTA(3-) could operate as an "OFF-ON" fluorescent sensor for cyanide anions based on a ligand substitution process. It has been identified as highly sensitive probe for CN(-) which responds at 0.3 and 0.04 μmol L(-1) concentration levels by absorption and fluorescent method respectively. Depending upon the sequence of addition of PTA and CN(-) ions into the solution, RhB could be as a molecular security keypad lock with PTA and CN(-) inputs. The ionic inputs to new fluorophore have been mimicked as a superimposed electronic molecular keypad lock. The results were compared successfully (>96%) with the data of a spectrophotometry approved method (EPA 9014-1) for cyanide ions. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. Intrusion detection using secure signatures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, Trent Darnel; Haile, Jedediah

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of themore » secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.« less

  8. Counting the Photons: Determining the Absolute Storage Capacity of Persistent Phosphors

    PubMed Central

    Rodríguez Burbano, Diana C.; Capobianco, John A.

    2017-01-01

    The performance of a persistent phosphor is often determined by comparing luminance decay curves, expressed in cd/m2. However, these photometric units do not enable a straightforward, objective comparison between different phosphors in terms of the total number of emitted photons, as these units are dependent on the emission spectrum of the phosphor. This may lead to incorrect conclusions regarding the storage capacity of the phosphor. An alternative and convenient technique of characterizing the performance of a phosphor was developed on the basis of the absolute storage capacity of phosphors. In this technique, the phosphor is incorporated in a transparent polymer and the measured afterglow is converted into an absolute number of emitted photons, effectively quantifying the amount of energy that can be stored in the material. This method was applied to the benchmark phosphor SrAl2O4:Eu,Dy and to the nano-sized phosphor CaS:Eu. The results indicated that only a fraction of the Eu ions (around 1.6% in the case of SrAl2O4:Eu,Dy) participated in the energy storage process, which is in line with earlier reports based on X-ray absorption spectroscopy. These findings imply that there is still a significant margin for improving the storage capacity of persistent phosphors. PMID:28773228

  9. Ratio measures in leading medical journals: structured review of accessibility of underlying absolute risks

    PubMed Central

    Schwartz, Lisa M; Dvorin, Evan L; Welch, H Gilbert

    2006-01-01

    Objective To examine the accessibility of absolute risk in articles reporting ratio measures in leading medical journals. Design Structured review of abstracts presenting ratio measures. Setting Articles published between 1 June 2003 and 1 May 2004 in Annals of Internal Medicine, BMJ, Journal of the American Medical Association, Journal of the National Cancer Institute, Lancet, and New England Journal of Medicine. Participants 222 articles based on study designs in which absolute risks were directly calculable (61 randomised trials, 161 cohort studies). Main outcome measure Accessibility of the absolute risks underlying the first ratio measure in the abstract. Results 68% of articles (150/222) failed to report the underlying absolute risks for the first ratio measure in the abstract (range 55−81% across the journals). Among these articles, about half did report the underlying absolute risks elsewhere in the article (text, table, or figure) but half did not report them anywhere. Absolute risks were more likely to be reported in the abstract for randomised trials compared with cohort studies (62% v 21%; relative risk 3.0, 95% confidence interval 2.1 to 4.2) and for studies reporting crude compared with adjusted ratio measures (62% v 21%; relative risk 3.0, 2.1 to 4.3). Conclusion Absolute risks are often not easily accessible in articles reporting ratio measures and sometimes are missing altogether—this lack of accessibility can easily exaggerate readers' perceptions of benefit or harm. PMID:17060338

  10. On Relative and Absolute Conviction in Mathematics

    ERIC Educational Resources Information Center

    Weber, Keith; Mejia-Ramos, Juan Pablo

    2015-01-01

    Conviction is a central construct in mathematics education research on justification and proof. In this paper, we claim that it is important to distinguish between absolute conviction and relative conviction. We argue that researchers in mathematics education frequently have not done so and this has lead to researchers making unwarranted claims…

  11. Child emotional security and interparental conflict.

    PubMed

    Davies, Patrick T; Harold, Gordon T; Goeke-Morey, Marcie C; Cummings, E Mark; Shelton, Katherine; Rasi, Jennifer A

    2002-01-01

    Guided by the emotional security hypothesis developed by Davies & Cummings (1994), studies were conducted to test a conceptual refinement of children's adjustment to parental conflict in relation to hypotheses of other prominent theories. Study 1 examined whether the pattern of child responses to simulations of adult conflict tactics and topics was consistent with the emotional security hypothesis and social learning theory in a sample of 327 Welsh children. Supporting the emotional security hypothesis, child reports of fear, avoidance, and involvement were especially prominent responses to destructive conflict. Study 2 examined the relative roles of child emotional insecurity and social-cognitive appraisals in accounting for associations between parental conflict and child psychological symptoms in a sample of 285 Welsh children and parents. Findings indicated that child emotional insecurity was a robust intervening process in the prospective links between parental conflict and child maladjustment even when intervening processes proposed in the social-cognitive models were included in the analyses. Studies 3 and 4 explored pathways among parental conflict, child emotional insecurity, and psychological adjustment in the broader family context with a sample of 174 children and mothers. Supporting the emotional security hypothesis, Study 3 findings indicated that child insecurity continued to mediate the link between parental conflict and child maladjustment even after specifying the effects of other parenting processes. Parenting difficulties accompanying interparental conflict were related to child maladjustment through their association with insecure parent-child attachment. In support of the emotional security hypothesis, Study 4 findings indicated that family instability, parenting difficulties, and parent-child attachment insecurity potentiated mediational pathways among parental conflict, child insecurity, and maladjustment. Family cohesiveness, interparental

  12. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  13. Measuring relational security in forensic mental health services

    PubMed Central

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  14. Measuring relational security in forensic mental health services.

    PubMed

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  15. Security Considerations for E-Mental Health Interventions

    PubMed Central

    Bennett, Anthony James; Griffiths, Kathleen Margaret

    2010-01-01

    Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. PMID:21169173

  16. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    PubMed Central

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  17. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    PubMed

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  18. The absolute radiometric calibration of the advanced very high resolution radiometer

    NASA Technical Reports Server (NTRS)

    Slater, P. N.; Teillet, P. M.; Ding, Y.

    1988-01-01

    The need for independent, redundant absolute radiometric calibration methods is discussed with reference to the Thematic Mapper. Uncertainty requirements for absolute calibration of between 0.5 and 4 percent are defined based on the accuracy of reflectance retrievals at an agricultural site. It is shown that even very approximate atmospheric corrections can reduce the error in reflectance retrieval to 0.02 over the reflectance range 0 to 0.4.

  19. Marine data security based on blockchain technology

    NASA Astrophysics Data System (ADS)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  20. Nuclear Security Objectives of an NMAC System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this module, you should be able to: Describe the role of Nuclear Material Accounting and Control (NMAC) in comprehensive nuclear security at a facility; Describe purpose of NMAC; Identify differences between the use of NMAC for IAEA safeguards and for facility nuclear security; List NMAC elements and measures; and Describe process for resolution of irregularities

  1. Pixel-by-pixel absolute phase retrieval using three phase-shifted fringe patterns without markers

    NASA Astrophysics Data System (ADS)

    Jiang, Chufan; Li, Beiwen; Zhang, Song

    2017-04-01

    This paper presents a method that can recover absolute phase pixel by pixel without embedding markers on three phase-shifted fringe patterns, acquiring additional images, or introducing additional hardware component(s). The proposed three-dimensional (3D) absolute shape measurement technique includes the following major steps: (1) segment the measured object into different regions using rough priori knowledge of surface geometry; (2) artificially create phase maps at different z planes using geometric constraints of structured light system; (3) unwrap the phase pixel by pixel for each region by properly referring to the artificially created phase map; and (4) merge unwrapped phases from all regions into a complete absolute phase map for 3D reconstruction. We demonstrate that conventional three-step phase-shifted fringe patterns can be used to create absolute phase map pixel by pixel even for large depth range objects. We have successfully implemented our proposed computational framework to achieve absolute 3D shape measurement at 40 Hz.

  2. Technology Empowerment: Security Challenges.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, Drake Edward; Backus, George A.; Jones, Wendell

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less

  3. National Security Technology Incubation Strategic Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company

  4. Absolute configuration of 2,2',3,3',6-pentachlorinatedbiphenyl (PCB 84) atropisomers.

    PubMed

    Li, Xueshu; Parkin, Sean R; Lehmler, Hans-Joachim

    2017-05-23

    Nineteen polychlorinated biphenyl (PCB) congeners, such as 2,2',3,3',6-pentachlorobiphenyl (PCB 84), display axial chirality because they form stable rotational isomers, or atropisomers, that are non-superimposable mirror images of each other. Although chiral PCBs undergo atropselective biotransformation and atropselectively alter biological processes, the absolute structure of only a few PCB atropisomers has been determined experimentally. To help close this knowledge gap, pure PCB 84 atropisomers were obtained by semi-preparative liquid chromatography with two serially connected Nucleodex β-PM columns. The absolute configuration of both atropisomers was determined by X-ray single-crystal diffraction. The PCB 84 atropisomer eluting first and second on the Nucleodex β-PM column correspond to (aR)-(-)-PCB 84 and (aS)-(+)-PCB 84, respectively. Enantioselective gas chromatographic analysis with the β-cyclodextrin-based CP-Chirasil-Dex CB gas chromatography column showed the same elution order as the Nucleodex β-PM column. Based on earlier reports, the atropisomers eluting first and second on the BGB-172 gas chromatography column are (aR)-(-)-PCB 84 and (aS)-(+)-PCB 84, respectively. An inversion of the elution order is observed on the Cyclosil-B gas chromatography and Cellulose-3 liquid chromatography columns. These results advance the interpretation of environmental and human biomonitoring as well as toxicological studies.

  5. Improved Strategies and Optimization of Calibration Models for Real-time PCR Absolute Quantification

    EPA Science Inventory

    Real-time PCR absolute quantification applications rely on the use of standard curves to make estimates of DNA target concentrations in unknown samples. Traditional absolute quantification approaches dictate that a standard curve must accompany each experimental run. However, t...

  6. Security and privacy issues of personal health.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  7. Birds of a Feather: Supporting Secure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less

  8. Increasing Capacity: Practice Effects in Absolute Identification

    ERIC Educational Resources Information Center

    Dodds, Pennie; Donkin, Christopher; Brown, Scott D.; Heathcote, Andrew

    2011-01-01

    In most of the long history of the study of absolute identification--since Miller's (1956) seminal article--a severe limit on performance has been observed, and this limit has resisted improvement even by extensive practice. In a startling result, Rouder, Morey, Cowan, and Pfaltz (2004) found substantially improved performance with practice in the…

  9. Update: Science and security

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    Although ‘a substantial and serious technology transfer [to the Soviet Union] exists,’ open communication of federally funded research does not damage our national security, according to Dale R. Corson, president emeritus of Cornell University and chairman of the National Academy of Sciences' Panel on Scientific Communication and National Security. Corson characterized those technology transfers at a recent press conference on the panel's findings, which are summarized in their report, ‘Science Communications and National Security’ (Eos, October 5, p. 801).‘A net flow of products, processes, and ideas is continually moving from the United States and its allies to the Soviet Union, through both overt and covert means,’ Corson said. While some of this technology transfer has not compromised national security (‘in part because a technology in question had little or no military significance’), a ‘substantial portion of the transfer has been damaging to national security,’ Corson explained. The ‘damaging transfers’ occur through the ‘legal as well as illegal sale of products, through transfers via third countries, and through a highly organized espionage operation.’

  10. Improvement of Gaofen-3 Absolute Positioning Accuracy Based on Cross-Calibration

    PubMed Central

    Deng, Mingjun; Li, Jiansong

    2017-01-01

    The Chinese Gaofen-3 (GF-3) mission was launched in August 2016, equipped with a full polarimetric synthetic aperture radar (SAR) sensor in the C-band, with a resolution of up to 1 m. The absolute positioning accuracy of GF-3 is of great importance, and in-orbit geometric calibration is a key technology for improving absolute positioning accuracy. Conventional geometric calibration is used to accurately calibrate the geometric calibration parameters of the image (internal delay and azimuth shifts) using high-precision ground control data, which are highly dependent on the control data of the calibration field, but it remains costly and labor-intensive to monitor changes in GF-3’s geometric calibration parameters. Based on the positioning consistency constraint of the conjugate points, this study presents a geometric cross-calibration method for the rapid and accurate calibration of GF-3. The proposed method can accurately calibrate geometric calibration parameters without using corner reflectors and high-precision digital elevation models, thus improving absolute positioning accuracy of the GF-3 image. GF-3 images from multiple regions were collected to verify the absolute positioning accuracy after cross-calibration. The results show that this method can achieve a calibration accuracy as high as that achieved by the conventional field calibration method. PMID:29240675

  11. Absolute Gravity Datum in the Age of Cold Atom Gravimeters

    NASA Astrophysics Data System (ADS)

    Childers, V. A.; Eckl, M. C.

    2014-12-01

    The international gravity datum is defined today by the International Gravity Standardization Net of 1971 (IGSN-71). The data supporting this network was measured in the 1950s and 60s using pendulum and spring-based gravimeter ties (plus some new ballistic absolute meters) to replace the prior protocol of referencing all gravity values to the earlier Potsdam value. Since this time, gravimeter technology has advanced significantly with the development and refinement of the FG-5 (the current standard of the industry) and again with the soon-to-be-available cold atom interferometric absolute gravimeters. This latest development is anticipated to provide improvement in the range of two orders of magnitude as compared to the measurement accuracy of technology utilized to develop ISGN-71. In this presentation, we will explore how the IGSN-71 might best be "modernized" given today's requirements and available instruments and resources. The National Geodetic Survey (NGS), along with other relevant US Government agencies, is concerned about establishing gravity control to establish and maintain high order geodetic networks as part of the nation's essential infrastructure. The need to modernize the nation's geodetic infrastructure was highlighted in "Precise Geodetic Infrastructure, National Requirements for a Shared Resource" National Academy of Science, 2010. The NGS mission, as dictated by Congress, is to establish and maintain the National Spatial Reference System, which includes gravity measurements. Absolute gravimeters measure the total gravity field directly and do not involve ties to other measurements. Periodic "intercomparisons" of multiple absolute gravimeters at reference gravity sites are used to constrain the behavior of the instruments to ensure that each would yield reasonably similar measurements of the same location (i.e. yield a sufficiently consistent datum when measured in disparate locales). New atomic interferometric gravimeters promise a significant

  12. IT security evaluation - “hybrid” approach and risk of its implementation

    NASA Astrophysics Data System (ADS)

    Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.

    2018-05-01

    It is relevant to evolve processes of evaluation of the IT security nowadays. Creating and application of the common evaluation approaches for an IT component, which are processed by the governmental and civil organizations, are still not solving problem. It is suggested to create a more precise and complex assessment tool for an IT security – the “hybrid” method of the IT security evaluation for a particular object, which is based on a range of adequate assessment tools.

  13. Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption

    NASA Astrophysics Data System (ADS)

    Anees, Amir; Khan, Waqar Ahmad; Gondal, Muhammad Asif; Hussain, Iqtadar

    2013-07-01

    The aim of this work is to make use of the mean of absolute deviation (MAD) method for the evaluation process of substitution boxes used in the advanced encryption standard. In this paper, we use the MAD technique to analyze some popular and prevailing substitution boxes used in encryption processes. In particular, MAD is applied to advanced encryption standard (AES), affine power affine (APA), Gray, Lui J., Residue Prime, S8 AES, SKIPJACK, and Xyi substitution boxes.

  14. Absolute limit on rotation of gravitationally bound stars

    NASA Astrophysics Data System (ADS)

    Glendenning, N. K.

    1994-03-01

    The authors seek an absolute limit on the rotational period for a neutron star as a function of its mass, based on the minimal constraints imposed by Einstein's theory of relativity, Le Chatelier's principle, causality, and a low-density equation of state, uncertainties which can be evaluated as to their effect on the result. This establishes a limiting curve in the mass-period plane below which no pulsar that is a neutron star can lie. For example, the minimum possible Kepler period, which is an absolute limit on rotation below which mass-shedding would occur, is 0.33 ms for a M = 1.442 solar mass neutron star (the mass of PSR1913+16). If the limit were found to be broken by any pulsar, it would signal that the confined hadronic phase of ordinary nucleons and nuclei is only metastable.

  15. Absolute quantification methods in tissue near-infrared spectroscopy

    NASA Astrophysics Data System (ADS)

    Matcher, Steven J.; Kirkpatrick, Peter J.; Nahid, K.; Cope, Mark; Delpy, David T.

    1995-05-01

    Recent work aimed at providing an absolute measurement of tissue haemoglobin saturation and a new instrument development, the spatially resolved spectrometer (SRS), are discussed. The theoretical basis of operation of this device and its hardware implementation are described and the results of validation studies on tissue simulating phantoms are presented as are preliminary measurements on human volunteers and observations on patients undergoing neurosurgery. In its present form the instrument appears to produce absolute haemoglobin saturation values for resting human skeletal muscle and the normally perfused human head which are rather low based on physiological expectations. However, we obtained a tight correlation between the saturation values measured by the SRS instrument and those obtained from blood-gas analysis of samples drawn from a jugular bulb catheter in one neurosurgery subject during clamping of the right carotid arteries.

  16. The absolute threshold of cone vision

    PubMed Central

    Koeing, Darran; Hofer, Heidi

    2013-01-01

    We report measurements of the absolute threshold of cone vision, which has been previously underestimated due to sub-optimal conditions or overly strict subjective response criteria. We avoided these limitations by using optimized stimuli and experimental conditions while having subjects respond within a rating scale framework. Small (1′ fwhm), brief (34 msec), monochromatic (550 nm) stimuli were foveally presented at multiple intensities in dark-adapted retina for 5 subjects. For comparison, 4 subjects underwent similar testing with rod-optimized stimuli. Cone absolute threshold, that is, the minimum light energy for which subjects were just able to detect a visual stimulus with any response criterion, was 203 ± 38 photons at the cornea, ∼0.47 log units lower than previously reported. Two-alternative forced-choice measurements in a subset of subjects yielded consistent results. Cone thresholds were less responsive to criterion changes than rod thresholds, suggesting a limit to the stimulus information recoverable from the cone mosaic in addition to the limit imposed by Poisson noise. Results were consistent with expectations for detection in the face of stimulus uncertainty. We discuss implications of these findings for modeling the first stages of human cone vision and interpreting psychophysical data acquired with adaptive optics at the spatial scale of the receptor mosaic. PMID:21270115

  17. The importance and attainment of accurate absolute radiometric calibration

    NASA Technical Reports Server (NTRS)

    Slater, P. N.

    1984-01-01

    The importance of accurate absolute radiometric calibration is discussed by reference to the needs of those wishing to validate or use models describing the interaction of electromagnetic radiation with the atmosphere and earth surface features. The in-flight calibration methods used for the Landsat Thematic Mapper (TM) and the Systeme Probatoire d'Observation de la Terre, Haute Resolution visible (SPOT/HRV) systems are described and their limitations discussed. The questionable stability of in-flight absolute calibration methods suggests the use of a radiative transfer program to predict the apparent radiance, at the entrance pupil of the sensor, of a ground site of measured reflectance imaged through a well characterized atmosphere. The uncertainties of such a method are discussed.

  18. Absolute magnitude calibration using trigonometric parallax - Incomplete, spectroscopic samples

    NASA Technical Reports Server (NTRS)

    Ratnatunga, Kavan U.; Casertano, Stefano

    1991-01-01

    A new numerical algorithm is used to calibrate the absolute magnitude of spectroscopically selected stars from their observed trigonometric parallax. This procedure, based on maximum-likelihood estimation, can retrieve unbiased estimates of the intrinsic absolute magnitude and its dispersion even from incomplete samples suffering from selection biases in apparent magnitude and color. It can also make full use of low accuracy and negative parallaxes and incorporate censorship on reported parallax values. Accurate error estimates are derived for each of the fitted parameters. The algorithm allows an a posteriori check of whether the fitted model gives a good representation of the observations. The procedure is described in general and applied to both real and simulated data.

  19. High-performance multi-channel fiber-based absolute distance measuring interferometer system

    NASA Astrophysics Data System (ADS)

    Deck, Leslie L.

    2009-08-01

    I describe the principle of operation and performance of a fiber-based absolute distance measuring interferometer system with 60 independent simultaneous channels. The system was designed for demanding applications requiring passive, electrically immune sensors with an extremely long MTTF. In addition to providing better than 0.3nm measurement repeatability at 5KHz for all channels, the system demonstrated absolute distance uncertainty of less than 5nm over a 500 micron measurement range.

  20. The Naval Postgraduate School SECURE ARCHIVAL STORAGE SYSTEM. Part II. Segment and Process Management Implementation.

    DTIC Science & Technology

    1981-03-01

    Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security

  1. 12 CFR 380.53 - Repudiation of secured contract.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... POLICY ORDERLY LIQUIDATION AUTHORITY Receivership Administrative Claims Process § 380.53 Repudiation of secured contract. To the extent that a contract to which a covered financial company is a party is secured by property of the covered financial company, the repudiation of the contract by the Corporation as...

  2. 12 CFR 380.53 - Repudiation of secured contract.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... POLICY ORDERLY LIQUIDATION AUTHORITY Receivership Administrative Claims Process § 380.53 Repudiation of secured contract. To the extent that a contract to which a covered financial company is a party is secured by property of the covered financial company, the repudiation of the contract by the Corporation as...

  3. Absolute detector calibration using twin beams.

    PubMed

    Peřina, Jan; Haderka, Ondřej; Michálek, Václav; Hamar, Martin

    2012-07-01

    A method for the determination of absolute quantum detection efficiency is suggested based on the measurement of photocount statistics of twin beams. The measured histograms of joint signal-idler photocount statistics allow us to eliminate an additional noise superimposed on an ideal calibration field composed of only photon pairs. This makes the method superior above other approaches presently used. Twin beams are described using a paired variant of quantum superposition of signal and noise.

  4. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. 2015 Annual Report on Security Clearance Determinations

    DTIC Science & Technology

    2016-06-28

    completed or pending security clearance determinations for government employees and contractors during the preceding fiscal year that have taken longer...each level during the preceding fiscal year. Similar data pertaining to USG contractors is also required. Also, for each element of the Intelligence...for USG Employees and USG Contractors Security Clearance Determination Processing Metrics for the Seven IC Agencies The number of individuals

  6. Absolute Calibration of Si iRMs used for Measurements of Si Paleo-nutrient proxies

    NASA Astrophysics Data System (ADS)

    Vocke, R. D., Jr.; Rabb, S. A.

    2016-12-01

    Silicon isotope variations (reported as δ30Si and δ29Si, relative to NBS28) in silicic acid dissolved in ocean waters, in biogenic silica and in diatoms are extremely informative paleo-nutrient proxies. The resolution and comparability of such measurements depend on the quality of the isotopic Reference Materials (iRMs) defining the delta scale. We report new absolute Si isotopic measurements on the iRMs NBS28 (RM 8546 - Silica Sand), Diatomite, and Big Batch using the Avogadro measurement approach and comparing them with prior assessments of these iRMs. The Avogadro Si measurement technique was developed by the German Physikalish-Technische Bundesanstalt (PTB) to provide a precise and highly accurate method to measure absolute isotopic ratios in highly enriched 28Si (99.996%) material. These measurements are part of an international effort to redefine the kg and mole based on the Planck constant h and the Avogadro constant NA, respectively (Vocke et al., 2014 Metrologia 51, 361, Azuma et al., 2015 Metrologia 52 360). This approach produces absolute Si isotope ratio data with lower levels of uncertainty when compared to the traditional "Atomic Weights" method of absolute isotope ratio measurement calibration. This is illustrated in Fig. 1 where absolute Si isotopic measurements on SRM 990, separated by 40+ years of advances in instrumentation, are compared. The availability of this new technique does not say that absolute Si isotopic ratios are or ever will be better for normal Si isotopic measurements when seeking isotopic variations in nature, because they are not. However, by determining the absolute isotopic ratios of all the Si iRM scale artifacts, such iRMs become traceable to the metric system (SI); thereby automatically conferring on all the artifact-based δ30Si and δ29Si measurements traceability to the base SI unit, the mole. Such traceability should help reduce the potential of bias between different iRMs and facilitate the replacement of delta

  7. A rare gas optics-free absolute photon flux and energy analyzer to provide absolute photoionization rates of inflowing interstellar neutrals

    NASA Technical Reports Server (NTRS)

    Judge, Darrell L.

    1994-01-01

    A prototype spectrometer has been developed for space applications requiring long term absolute EUV photon flux measurements. The energy spectrum of the incoming photons is transformed directly into an electron energy spectrum by taking advantage of the photoelectric effect in one of several rare gases at low pressures. Using an electron energy spectrometer, followed by an electron multiplier detector, pulses due to individual electrons are counted. The overall efficiency of this process can be made essentially independent of gain drifts in the signal path, and the secular degradation of optical components which is often a problem in other techniques is avoided. A very important feature of this approach is its freedom from the problem of overlapping spectral orders that plagues grating EUV spectrometers. An instrument with these features has not been flown before, but is essential to further advances in our understanding of solar EUV flux dynamics, and the coupled dynamics of terrestrial and planetary atmospheres. The detailed characteristics of this optics-free spectrometer are presented in the publications section.

  8. Information security using multiple reference-based optical joint transform correlation and orthogonal code

    NASA Astrophysics Data System (ADS)

    Nazrul Islam, Mohammed; Karim, Mohammad A.; Vijayan Asari, K.

    2013-09-01

    Protecting and processing of confidential information, such as personal identification, biometrics, remains a challenging task for further research and development. A new methodology to ensure enhanced security of information in images through the use of encryption and multiplexing is proposed in this paper. We use orthogonal encoding scheme to encode multiple information independently and then combine them together to save storage space and transmission bandwidth. The encoded and multiplexed image is encrypted employing multiple reference-based joint transform correlation. The encryption key is fed into four channels which are relatively phase shifted by different amounts. The input image is introduced to all the channels and then Fourier transformed to obtain joint power spectra (JPS) signals. The resultant JPS signals are again phase-shifted and then combined to form a modified JPS signal which yields the encrypted image after having performed an inverse Fourier transformation. The proposed cryptographic system makes the confidential information absolutely inaccessible to any unauthorized intruder, while allows for the retrieval of the information to the respective authorized recipient without any distortion. The proposed technique is investigated through computer simulations under different practical conditions in order to verify its overall robustness.

  9. New Technology's Surprising Security Threats. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  10. Security in the Middle East

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wells, S.F. Jr.; Bruzonsky, M.A.

    1986-01-01

    The full range of U.S. security interests in the Middle East is covered in this volume of original contributions from prominent international scholars. Case studies of key countries emphasize the prospects for peaceful political, economic, and cultural change in the region. The Arab-Israeli conflict is examined with particular attention to the ''Palestine problem,'' U.S. policy and diplomacy, and the peace process. Finally, the involvement of the U.S. and the USSR and the policy options open to them are considered. Includes chapters on oil and its role in Middle-East security issues.

  11. Let's talk conflict: using mediation in healthcare security disputes.

    PubMed

    Armstrong, Brad

    2013-01-01

    Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.

  12. Development of CPR security using impact analysis.

    PubMed Central

    Salazar-Kish, J.; Tate, D.; Hall, P. D.; Homa, K.

    2000-01-01

    The HIPAA regulations will require that institutions ensure the prevention of unauthorized access to electronically stored or transmitted patient records. This paper discusses a process for analyzing the impact of security mechanisms on users of computerized patient records through "behind the scenes" electronic access audits. In this way, those impacts can be assessed and refined to an acceptable standard prior to implementation. Through an iterative process of design and evaluation, we develop security algorithms that will protect electronic health information from improper access, alteration or loss, while minimally affecting the flow of work of the user population as a whole. PMID:11079984

  13. Technology Requirements and Selection for Securely Partitioning OBSW

    NASA Astrophysics Data System (ADS)

    Mendham, Peter; Windsor, James; Eckstein, Knut

    2010-08-01

    The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.

  14. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  15. Repair process and a repaired component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roberts, III, Herbert Chidsey; Simpson, Stanley F.

    Matrix composite component repair processes are disclosed. The matrix composite repair process includes applying a repair material to a matrix composite component, securing the repair material to the matrix composite component with an external securing mechanism and curing the repair material to bond the repair material to the matrix composite component during the securing by the external securing mechanism. The matrix composite component is selected from the group consisting of a ceramic matrix composite, a polymer matrix composite, and a metal matrix composite. In another embodiment, the repair process includes applying a partially-cured repair material to a matrix composite component,more » and curing the repair material to bond the repair material to the matrix composite component, an external securing mechanism securing the repair material throughout a curing period, In another embodiment, the external securing mechanism is consumed or decomposed during the repair process.« less

  16. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...

  17. 78 FR 8217 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...

  18. Recovery and concordance in a secure forensic psychiatry hospital - the self rated DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales.

    PubMed

    Davoren, Mary; Hennessy, Sarah; Conway, Catherine; Marrinan, Seamus; Gill, Pauline; Kennedy, Harry G

    2015-03-28

    was predicted predominantly by the DUNDRUM-3. Patients accurately self-rate relative to other patients however their absolute ratings were consistently lower (better) than clinicians' ratings and were less accurate predictors of outcomes including conditional discharge. Quantifying concordance is a useful part of the recovery process and predicts outcomes but self-ratings are not accurate predictors.

  19. National Security Technology Incubator Business Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less

  20. Conceptualizations of water security in the agricultural sector: Perceptions, practices, and paradigms

    NASA Astrophysics Data System (ADS)

    Malekian, Atefe; Hayati, Dariush; Aarts, Noelle

    2017-01-01

    Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.

  1. Computer simulation of functioning of elements of security systems

    NASA Astrophysics Data System (ADS)

    Godovykh, A. V.; Stepanov, B. P.; Sheveleva, A. A.

    2017-01-01

    The article is devoted to issues of development of the informational complex for simulation of functioning of the security system elements. The complex is described from the point of view of main objectives, a design concept and an interrelation of main elements. The proposed conception of the computer simulation provides an opportunity to simulate processes of security system work for training security staff during normal and emergency operation.

  2. Modeling absolute plate and plume motions

    NASA Astrophysics Data System (ADS)

    Bodinier, G. P.; Wessel, P.; Conrad, C. P.

    2016-12-01

    Paleomagnetic evidence for plume drift has made modeling of absolute plate motions challenging, especially since direct observations of plume drift are lacking. Predictions of plume drift arising from mantle convection models and broadly satisfying observed paleolatitudes have so far provided the only framework for deriving absolute plate motions over moving hotspots. However, uncertainties in mantle rheology, temperature, and initial conditions make such models nonunique. Using simulated and real data, we will show that age progressions along Pacific hotspot trails provide strong constraints on plume motions for all major trails, and furthermore that it is possible to derive models for relative plume drift from these data alone. Relative plume drift depends on the inter-hotspot distances derived from age progressions but lacks a fixed reference point and orientation. By incorporating paleolatitude histories for the Hawaii and Louisville chains we add further constraints on allowable plume motions, yet one unknown parameter remains: a longitude shift that applies equally to all plumes. To obtain a solution we could restrict either the Hawaii or Louisville plume to have latitudinal motion only, thus satisfying paleolatitude constraints. Yet, restricting one plume to latitudinal motion while all others move freely is not realistic. Consequently, it is only possible to resolve the motion of hotspots relative to an overall and unknown longitudinal shift as a function of time. Our plate motions are therefore dependent on the same shift via an unknown rotation about the north pole. Yet, as plume drifts are consequences of mantle convection, our results place strong constraints on the pattern of convection. Other considerations, such as imposed limits on plate speed, plume speed, proximity to LLSVP edges, model smoothness, or relative plate motions via ridge-spotting may add further constraints that allow a unique model of Pacific absolute plate and plume motions to be

  3. Absolute measurement of the extreme UV solar flux

    NASA Technical Reports Server (NTRS)

    Carlson, R. W.; Ogawa, H. S.; Judge, D. L.; Phillips, E.

    1984-01-01

    A windowless rare-gas ionization chamber has been developed to measure the absolute value of the solar extreme UV flux in the 50-575-A region. Successful results were obtained on a solar-pointing sounding rocket. The ionization chamber, operated in total absorption, is an inherently stable absolute detector of ionizing UV radiation and was designed to be independent of effects from secondary ionization and gas effusion. The net error of the measurement is + or - 7.3 percent, which is primarily due to residual outgassing in the instrument, other errors such as multiple ionization, photoelectron collection, and extrapolation to the zero atmospheric optical depth being small in comparison. For the day of the flight, Aug. 10, 1982, the solar irradiance (50-575 A), normalized to unit solar distance, was found to be 5.71 + or - 0.42 x 10 to the 10th photons per sq cm sec.

  4. Absolute Sea-level Changes Derived from Integrated Geodetic Datasets (1955-2016) in the Caribbean Sea

    NASA Astrophysics Data System (ADS)

    Yang, L.; Wang, G.; Liu, H.

    2017-12-01

    Rising sea level has important direct impacts on coastal and island regions such as the Caribbean where the influence of sea-level rise is becoming more apparent. The Caribbean Sea is a semi-enclosed sea adjacent to the landmasses of South and Central America to the south and west, and the Greater Antilles and the Lesser Antilles separate it from the Atlantic Ocean to the north and east. The work focus on studying the relative and absolute sea-level changes by integrating tide gauge, GPS, and satellite altimetry datasets (1955-2016) within the Caribbean Sea. Further, the two main components of absolute sea-level change, ocean mass and steric sea-level changes, are respectively studied using GRACE, temperature, and salinity datasets (1955-2016). According to the analysis conducted, the sea-level change rates have considerable temporal and spatial variations, and estimates may be subject to the techniques used and observation periods. The average absolute sea-level rise rate is 1.8±0.3 mm/year for the period from 1955 to 2015 according to the integrated tide gauge and GPS observations; the average absolute sea-level rise rate is 3.5±0.6 mm/year for the period from 1993 to 2016 according to the satellite altimetry observations. This study shows that the absolute sea-level change budget in the Caribbean Sea is closed in the periods from 1955 to 2016, in which ocean mass change dominates the absolute sea-level rise. The absolute sea-level change budget is also closed in the periods from 2004 to 2016, in which steric sea-level rise dominates the absolute sea-level rise.

  5. Early diagnosis of myocardial infarction using absolute and relative changes in cardiac troponin concentrations.

    PubMed

    Irfan, Affan; Reichlin, Tobias; Twerenbold, Raphael; Meister, Marc; Moehring, Berit; Wildi, Karin; Bassetti, Stefano; Zellweger, Christa; Gimenez, Maria Rubini; Hoeller, Rebeca; Murray, Karsten; Sou, Seoung Mann; Mueller, Mira; Mosimann, Tamina; Reiter, Miriam; Haaf, Philip; Ziller, Ronny; Freidank, Heike; Osswald, Stefan; Mueller, Christian

    2013-09-01

    Absolute changes in high-sensitivity cardiac troponin T (hs-cTnT) seem to have higher diagnostic accuracy in the early diagnosis of acute myocardial infarction compared with relative changes. It is unknown whether the same applies to high-sensitivity cardiac troponin I (hs-cTnI) assays and whether the combination of absolute and relative change might further increase accuracy. In a prospective, international multicenter study, high-sensitivity cardiac troponin (hs-cTn) was measured with 3 novel assays (hs-cTnT, Roche Diagnostics Corp, Indianapolis, Ind; hs-cTnI, Beckman Coulter Inc, Brea, Calif; hs-cTnI, Siemens, Munich, Germany) in a blinded fashion at presentation and after 1 and 2 hours in a blinded fashion in 830 unselected patients with suspected acute myocardial infarction. The final diagnosis was adjudicated by 2 independent cardiologists. The area under the receiver operating characteristic curve for diagnosing acute myocardial infarction was significantly higher for 1- and 2-hour absolute versus relative hs-cTn changes for all 3 assays (P < .001). The area under the receiver operating characteristic curve of the combination of 2-hour absolute and relative change (hs-cTnT 0.98 [95% confidence interval {CI}, 0.97-0.99]; hs-cTnI, Beckman Coulter Inc, 0.97 [95% CI, 0.96-0.99]; hs-cTnI, Siemens, 0.96 [95% CI, 0.93-0.99]) were high and provided some benefit compared with the use of absolute change alone for hs-cTnT, but not for the hs-cTnI assays. Reclassification analysis confirmed the superiority of absolute changes versus relative changes. Absolute changes seem to be the preferred metrics for both hs-cTnT and hs-cTnI in the early diagnosis of acute myocardial infarction. The combination of absolute and relative changes provides a small added value for hs-cTnT, but not for hs-cTnI. Copyright © 2013 Elsevier Inc. All rights reserved.

  6. Notification: Audit of EPA's Processes for Managing Background Investigations of Privileged Users and Taking Action to Remediate Weaknesses in Agency's Information Security Program

    EPA Pesticide Factsheets

    Project #OA-FY17-0139, Feb 15, 2017.The EPA OIG plans to begin preliminary research on an audit of EPA's processes for managing background investigations of privileged users and taking action to remediate weaknesses in agency's info security program.

  7. Remote ultrasound palpation for robotic interventions using absolute elastography.

    PubMed

    Schneider, Caitlin; Baghani, Ali; Rohling, Robert; Salcudean, Septimiu

    2012-01-01

    Although robotic surgery has addressed many of the challenges presented by minimally invasive surgery, haptic feedback and the lack of knowledge of tissue stiffness is an unsolved problem. This paper presents a system for finding the absolute elastic properties of tissue using a freehand ultrasound scanning technique, which utilizes the da Vinci Surgical robot and a custom 2D ultrasound transducer for intraoperative use. An external exciter creates shear waves in the tissue, and a local frequency estimation method computes the shear modulus. Results are reported for both phantom and in vivo models. This system can be extended to any 6 degree-of-freedom tracking method and any 2D transducer to provide real-time absolute elastic properties of tissue.

  8. Homeland security challenges in nursing practice.

    PubMed

    Boatright, Connie; McGlown, K Joanne

    2005-09-01

    Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.

  9. Qualification of security printing features

    NASA Astrophysics Data System (ADS)

    Simske, Steven J.; Aronoff, Jason S.; Arnabat, Jordi

    2006-02-01

    This paper describes the statistical and hardware processes involved in qualifying two related printing features for their deployment in product (e.g. document and package) security. The first is a multi-colored tiling feature that can also be combined with microtext to provide additional forms of security protection. The color information is authenticated automatically with a variety of handheld, desktop and production scanners. The microtext is authenticated either following magnification or manually by a field inspector. The second security feature can also be tile-based. It involves the use of two inks that provide the same visual color, but differ in their transparency to infrared (IR) wavelengths. One of the inks is effectively transparent to IR wavelengths, allowing emitted IR light to pass through. The other ink is effectively opaque to IR wavelengths. These inks allow the printing of a seemingly uniform, or spot, color over a (truly) uniform IR emitting ink layer. The combination converts a uniform covert ink and a spot color to a variable data region capable of encoding identification sequences with high density. Also, it allows the extension of variable data printing for security to ostensibly static printed regions, affording greater security protection while meeting branding and marketing specifications.

  10. Mapping absolute tissue endogenous fluorophore concentrations with chemometric wide-field fluorescence microscopy

    NASA Astrophysics Data System (ADS)

    Xu, Zhang; Reilley, Michael; Li, Run; Xu, Min

    2017-06-01

    We report chemometric wide-field fluorescence microscopy for imaging the spatial distribution and concentration of endogenous fluorophores in thin tissue sections. Nonnegative factorization aided by spatial diversity is used to learn both the spectral signature and the spatial distribution of endogenous fluorophores from microscopic fluorescence color images obtained under broadband excitation and detection. The absolute concentration map of individual fluorophores is derived by comparing the fluorescence from "pure" fluorophores under the identical imaging condition following the identification of the fluorescence species by its spectral signature. This method is then demonstrated by characterizing the concentration map of endogenous fluorophores (including tryptophan, elastin, nicotinamide adenine dinucleotide, and flavin adenine dinucleotide) for lung tissue specimens. The absolute concentrations of these fluorophores are all found to decrease significantly from normal, perilesional, to cancerous (squamous cell carcinoma) tissue. Discriminating tissue types using the absolute fluorophore concentration is found to be significantly more accurate than that achievable with the relative fluorescence strength. Quantification of fluorophores in terms of the absolute concentration map is also advantageous in eliminating the uncertainties due to system responses or measurement details, yielding more biologically relevant data, and simplifying the assessment of competing imaging approaches.

  11. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  12. Creating Security System Models Using SNAP-PC.

    DTIC Science & Technology

    1987-05-01

    Submodel ATTGRD Prompts ............ 228 x ACKNOWLEDGEMENTS SNAP was originally developed in the late 1970’s by Pritsker & Associates, Inc., for Sandia...systems. The other was to simplify the simulation process so that a person knowledgeable in security planning and who had little experience in ...simulation techniques could use simulation in his evaluation of security systems. SNAP-PC was developed by Pritsker & Associates, Inc., for Sandia with

  13. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  14. On the absolute photoionization cross section and dissociative photoionization of cyclopropenylidene.

    PubMed

    Holzmeier, Fabian; Fischer, Ingo; Kiendl, Benjamin; Krueger, Anke; Bodi, Andras; Hemberger, Patrick

    2016-04-07

    We report the determination of the absolute photoionization cross section of cyclopropenylidene, c-C3H2, and the heat of formation of the C3H radical and ion derived by the dissociative ionization of the carbene. Vacuum ultraviolet (VUV) synchrotron radiation as provided by the Swiss Light Source and imaging photoelectron photoion coincidence (iPEPICO) were employed. Cyclopropenylidene was generated by pyrolysis of a quadricyclane precursor in a 1 : 1 ratio with benzene, which enabled us to derive the carbene's near threshold absolute photoionization cross section from the photoionization yield of the two pyrolysis products and the known cross section of benzene. The cross section at 9.5 eV, for example, was determined to be 4.5 ± 1.4 Mb. Upon dissociative ionization the carbene decomposes by hydrogen atom loss to the linear isomer of C3H(+). The appearance energy for this process was determined to be AE(0K)(c-C3H2; l-C3H(+)) = 13.67 ± 0.10 eV. The heat of formation of neutral and cationic C3H was derived from this value via a thermochemical cycle as Δ(f)H(0K)(C3H) = 725 ± 25 kJ mol(-1) and Δ(f)H(0K)(C3H(+)) = 1604 ± 19 kJ mol(-1), using a previously reported ionization energy of C3H.

  15. Orion Absolute Navigation System Progress and Challenge

    NASA Technical Reports Server (NTRS)

    Holt, Greg N.; D'Souza, Christopher

    2012-01-01

    The absolute navigation design of NASA's Orion vehicle is described. It has undergone several iterations and modifications since its inception, and continues as a work-in-progress. This paper seeks to benchmark the current state of the design and some of the rationale and analysis behind it. There are specific challenges to address when preparing a timely and effective design for the Exploration Flight Test (EFT-1), while still looking ahead and providing software extensibility for future exploration missions. The primary onboard measurements in a Near-Earth or Mid-Earth environment consist of GPS pseudo-range and delta-range, but for future explorations missions the use of star-tracker and optical navigation sources need to be considered. Discussions are presented for state size and composition, processing techniques, and consider states. A presentation is given for the processing technique using the computationally stable and robust UDU formulation with an Agee-Turner Rank-One update. This allows for computational savings when dealing with many parameters which are modeled as slowly varying Gauss-Markov processes. Preliminary analysis shows up to a 50% reduction in computation versus a more traditional formulation. Several state elements are discussed and evaluated, including position, velocity, attitude, clock bias/drift, and GPS measurement biases in addition to bias, scale factor, misalignment, and non-orthogonalities of the accelerometers and gyroscopes. Another consideration is the initialization of the EKF in various scenarios. Scenarios such as single-event upset, ground command, and cold start are discussed as are strategies for whole and partial state updates as well as covariance considerations. Strategies are given for dealing with latent measurements and high-rate propagation using multi-rate architecture. The details of the rate groups and the data ow between the elements is discussed and evaluated.

  16. Survey on Security Issues in File Management in Cloud Computing Environment

    NASA Astrophysics Data System (ADS)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  17. Computer Security: Governmentwide Planning Process Had Limited Impact. Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Information Management and Technology Div.

    As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…

  18. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    PubMed

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  19. Recurrent Otitis Media and Attachment Security: A Path Model.

    ERIC Educational Resources Information Center

    McCallum, Michelle S.; McKim, Margaret K.

    1999-01-01

    Used regular telephone interviews over six months to examine processes through which recurrent episodes of otitis media influence children's attachment security. Found that recurrent otitis media negatively affected attachment security by increasing mothers' perceptions of their children as behaving more negatively. Parenting stress was not…

  20. Astigmatism error modification for absolute shape reconstruction using Fourier transform method

    NASA Astrophysics Data System (ADS)

    He, Yuhang; Li, Qiang; Gao, Bo; Liu, Ang; Xu, Kaiyuan; Wei, Xiaohong; Chai, Liqun

    2014-12-01

    A method is proposed to modify astigmatism errors in absolute shape reconstruction of optical plane using Fourier transform method. If a transmission and reflection flat are used in an absolute test, two translation measurements lead to obtain the absolute shapes by making use of the characteristic relationship between the differential and original shapes in spatial frequency domain. However, because the translation device cannot guarantee the test and reference flats rigidly parallel to each other after the translations, a tilt error exists in the obtained differential data, which caused power and astigmatism errors in the reconstructed shapes. In order to modify the astigmatism errors, a rotation measurement is added. Based on the rotation invariability of the form of Zernike polynomial in circular domain, the astigmatism terms are calculated by solving polynomial coefficient equations related to the rotation differential data, and subsequently the astigmatism terms including error are modified. Computer simulation proves the validity of the proposed method.