Science.gov

Sample records for adequately address security

  1. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  2. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  3. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... of maintaining adequate technical, physical, and security safeguards to prevent...

  4. Addressing social resistance in emerging security technologies.

    PubMed

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus. Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  5. Addressing social resistance in emerging security technologies

    PubMed Central

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  6. 45 CFR 2508.10 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... security safeguards to prevent unauthorized disclosure or destruction of manual and automatic record..., and security safeguards to prevent unauthorized disclosure or destruction of manual and...

  7. Addressing software security risk mitigations in the life cycle

    NASA Technical Reports Server (NTRS)

    Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt

    2003-01-01

    The NASA Office of Safety and Mission Assurance (OSMA) has funded the Jet Propulsion Laboratory (JPL) with a Center Initiative, 'Reducing Software Security Risk through an Integrated Approach' (RSSR), to address this need. The Initiative is a formal approach to addressing software security in the life cycle through the instantiation of a Software Security Assessment Instrument (SSAI) for the development and maintenance life cycles.

  8. 45 CFR 1182.15 - Institute responsibility for maintaining adequate technical, physical, and security safeguards to...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and..., physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and automatic..., physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...

  9. For telehealth to succeed, privacy and security risks must be identified and addressed.

    PubMed

    Hall, Joseph L; McGraw, Deven

    2014-02-01

    The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth. PMID:24493763

  10. Hydrocomplexity: Addressing water security and emergent environmental risks

    NASA Astrophysics Data System (ADS)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  11. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  12. Addressing security issues related to virtual institute distributed activities

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  13. Addressing software security and mitigations in the life cycle

    NASA Technical Reports Server (NTRS)

    Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt

    2003-01-01

    Traditionally, security is viewed as an organizational and Information Technology (IIJ systems function comprising of Firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.

  14. Addressing software security and mitigations in the life cycle

    NASA Technical Reports Server (NTRS)

    Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt

    2004-01-01

    Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.

  15. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    SciTech Connect

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  16. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    SciTech Connect

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  17. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  18. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  19. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production

    PubMed Central

    Wratten, Stephen D.; Porter, John R.

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies. PMID:27478691

  20. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production.

    PubMed

    Coles, Graeme D; Wratten, Stephen D; Porter, John R

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies. PMID:27478691

  1. Addressing the Pilot security problem with gLExec

    SciTech Connect

    Sfiligoi, I.; Koeroo, O.; Venekamp, G.; Yocum, D.; Groep, D.; Petravick, D.; /Fermilab

    2007-09-01

    The Grid security mechanisms were designed under the assumption that users would submit their jobs directly to the Grid gatekeepers. Many groups are however starting to use pilot-based infrastructures, where users submit jobs to a centralized queue and are successively transferred to the Grid resources by the pilot infrastructure. While this approach greatly improves the user experience, it does introduce several security and policy issues, the more serious being the lack of system level protection between the users and the inability for Grid sites to apply fine grained authorization policies. One possible solution to the problem is provided by gLExec, a X.509 aware suexec derivative. By using gLExec, the pilot workflow becomes as secure as any traditional one.

  2. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  3. Secure Naming and Addressing Operations for Store, Carry and Forward Networks

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Ivancic, William D.; Iannicca, Dennis C.; Ishac, Joseph; Hylton, Alan G.

    2014-01-01

    This paper describes concepts for secure naming and addressing directed at Store, Carry and Forward (SCF) distributed applications, where disconnection and intermittent connectivity between forwarding systems is the norm. The paper provides a brief overview of store, carry and forward distributed applications followed by an in depth discussion of how to securely: create a namespace; allocate names within the namespace; query for names known within a local processing system or connected subnetwork; validate ownership of a given name; authenticate data from a given name; and, encrypt data to a given name. Critical issues such as revocation of names, mobility and the ability to use various namespaces to secure operations or for Quality-of-Service are also presented. Although the concepts presented for naming and addressing have been developed for SCF, they are directly applicable to fully connected systems.

  4. Governmental Control of the Internet in addressing Law Enforcement and National Security

    NASA Astrophysics Data System (ADS)

    Watney, Murdoch

    Some people contended that governmental regulation of the Internet would not be possible due to its inherent characteristics. This paper relates how governments, in addressing law enforcement and national security, have taken control of the Internet by means of legislation. Consideration is given to the influence and impact of powerful governments on the legal regulation of the Internet. It is pointed out that when addressing law enforcement and national security the borderless nature of the Internet is in reality bordered. It is concluded that in striving towards law enforcement and national security, enforcement of governmental control of the Internet is not easily achieved without the assistance of the Internet Service Provider (ISP) as well as international assistance and co-operation.

  5. Addressing the risk of inadequate and excessive micronutrient intakes: traditional versus new approaches to setting adequate and safe micronutrient levels in foods

    PubMed Central

    Bruins, Maaike J.; Mugambi, Gladys; Verkaik-Kloosterman, Janneke; Hoekstra, Jeljer; Kraemer, Klaus; Osendarp, Saskia; Melse-Boonstra, Alida; Gallagher, Alison M.; Verhagen, Hans

    2015-01-01

    Fortification of foods consumed by the general population or specific food products or supplements designed to be consumed by vulnerable target groups is amongst the strategies in developing countries to address micronutrient deficiencies. Any strategy aimed at dietary change needs careful consideration, ensuring the needs of at-risk subgroups are met whilst ensuring safety within the general population. This paper reviews the key principles of two main assessment approaches that may assist developing countries in deciding on effective and safe micronutrient levels in foods or special products designed to address micronutrient deficiencies, that is, the cut-point method and the stepwise approach to risk–benefit assessment. In the first approach, the goal is to shift population intake distributions such that intake prevalences below the Estimated Average Requirement (EAR) and above the Tolerable Upper Intake Level (UL) are both minimized. However, for some micronutrients like vitamin A and zinc, a narrow margin between the EAR and UL exists. Increasing their intakes through mass fortification may pose a dilemma; not permitting the UL to be exceeded provides assurance about the safety within the population but can potentially leave a proportion of the target population with unmet needs, or vice versa. Risk–benefit approaches assist in decision making at different micronutrient intake scenarios by balancing the magnitude of potential health benefits of reducing inadequate intakes against health risks of excessive intakes. Risk–benefit approaches consider different aspects of health risk including severity and number of people affected. This approach reduces the uncertainty for policy makers as compared to classic cut-point methods. PMID:25630617

  6. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    NASA Astrophysics Data System (ADS)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  7. Addressing food security through public policy action in a community-based participatory research partnership.

    PubMed

    Vásquez, Victoria Breckwich; Lanza, Dana; Hennessey-Lavery, Susana; Facente, Shelley; Halpin, Helen Ann; Minkler, Meredith

    2007-10-01

    Community-based participatory research (CBPR) is an increasingly utilized research approach that involves the affected community identifying a health-related problem, developing a research agenda, and planning an appropriate intervention to address the problem. This report on a CBPR partnership in San Francisco's Bayview Hunters Point neighborhood documents the rise of a community food security policy in response to youth-involved research that found poor access to quality food in an economically disadvantaged area of the city. To analyze the impact of the research on public policy, a framework of specific steps in the policy-making process is used to organize and better understand the partnership's objectives, activities, strategies, and successes. This community-health department partnership has been able to achieve an innovative and sustainable public policy solution, the Good Neighbor Program, by working closely with policy makers and local businesses to expand community accessibility to healthy food. PMID:17728199

  8. Execution of a self-directed risk assessment methodology to address HIPAA data security requirements

    NASA Astrophysics Data System (ADS)

    Coleman, Johnathan

    2003-05-01

    This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.

  9. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    PubMed

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies. PMID:26601127

  10. Addressing China’s grand challenge of achieving food security while ensuring environmental sustainability

    PubMed Central

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C.; Bailey, Mark; Gordon, Iain J.; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-01-01

    China’s increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies. PMID:26601127

  11. Recent advances to address European Union Health Security from cross border chemical health threats.

    PubMed

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. PMID:24679379

  12. How can we exploit above–belowground interactions to assist in addressing the challenges of food security?

    PubMed Central

    Orrell, Peter; Bennett, Alison E.

    2013-01-01

    Can above–belowground interactions help address issues of food security? We address this question in this manuscript, and review the intersection of above–belowground interactions and food security. We propose that above–belowground interactions could address two strategies identified by Godfray etal. (2010): reducing the Yield Gap, and Increasing Production Limits. In particular, to minimize the difference between potential and realized production (The Yield Gap) above–belowground interactions could be manipulated to reduce losses to pests and increase crop growth (and therefore yields). To Increase Production Limits we propose two mechanisms: utilizing intercropping (which uses multiple aspects of above–belowground interactions) and breeding for traits that promote beneficial above–belowground interactions, as well as breeding mutualistic organisms to improve their provided benefit. As a result, if they are managed correctly, there is great potential for above–belowground interactions to contribute to food security. PMID:24198821

  13. The Need to Address Mobile Device Security in the Higher Education IT Curriculum

    ERIC Educational Resources Information Center

    Patten, Karen P.; Harris, Mark A.

    2013-01-01

    Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…

  14. Status of Global Threat Reduction Initiative's Activities Underway to Address Major Domestic Radiological Security Challenges - 12105

    SciTech Connect

    Cuthbertson, Abigail; Jennison, Meaghan

    2012-07-01

    During their service lives, radioactive sealed sources are used for a wide variety of essential purposes. However, each year, thousands of radioactive sealed sources that pose a potential risk to national security, health, and safety become disused and unwanted in the United States. Due to their concentrated activity and portability, these sources could be used in radiological dispersal devices ('dirty bombs'). For more than a decade, the National Nuclear Security Administration and the U.S. Department of Energy, through the Global Threat Reduction Initiative Offsite Source Recovery Project (GTRI/OSRP), have facilitated the removal and disposition of thousands of disused/unwanted sources worldwide. However, the ability of GTRI/OSRP to continue its work is critically dependent on the ability to transport and appropriately dispose of these sources. On that front, GTRI/OSRP progress includes development of two prototype Type B transport containers and significant efforts toward certification, increased commercial disposal access for risk-significant sealed sources at commercial sites, and cooperation through the International Atomic Energy Agency to increase source repatriation. Disused sealed sources continue to pose a national security concern. The impact of a dirty bomb detonation could be costly both financially and to those exposed to the resulting radiation. However, significant progress has been made since 2008 on each of the challenges identified in the DHS Sealed Source Security Workshop. Not only will there be increased opportunity for commercial disposal of many sizes and types of sealed sources, but also stakeholders are studying front-end solutions to the problem of disused sealed sources, such as financial assurance and recycle. The lack of sealed source transport containers is also likely to be mitigated with the development and certification by NNSA of two new Type B models. Internationally, increased efforts at source repatriation will mitigate the

  15. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    SciTech Connect

    James E. O'Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  16. Field gleaning as a tool for addressing food security at the local level: case study.

    PubMed

    Hoisington, A; Butkus, S N; Garrett, S; Beerman, K

    2001-01-01

    Field gleaning, or harvesting crops after the commercial harvest, has been promoted as a way to increase food security; however, the effectiveness of gleaning programs is not well documented. The purpose of this research was to explore the impact of gleaning on individual gleaners and the community by documenting total amounts gleaned, individual uses of produce, and self-reported benefits and barriers to gleaning. During the 1997 season, approximately 50 gleaners participated in the Pierce County Expanded Food and Nutrition Education Program Gleaning Project; 29 participated in an intensive 4-week study to track use of produce by gleaners. Onsite weighing of gleaned produce revealed that of the 110,000 pounds gleaned by these 50 gleaners from Pierce County farms and orchards during 1997, 85,000 pounds (77%) were donated to local emergency food programs; 25,000 pounds (23%) were taken home by gleaners. Of the produce taken home by the 29 study participants, an estimated 9% was used fresh, 48% was preserved for later user, and 43% was shared with others. During a combination of telephone and in-person interviews, gleaners reported using more fresh produce and sharing knowledge about gardening and food preservation. The most important benefits of gleaning were "stretching my food budget" and "helping provide food for the community." Detailed exploration of the impact of gleaned produce on dietary patterns and use of validated food security measures is warranted considering the volume of produce used fresh, preserved for later use, and given away by gleaning participants. PMID:12031205

  17. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  18. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats. PMID:24187744

  19. Policy Framework for Addressing Personal Security Issues Concerning Women and Girls. National Strategy on Community Safety and Crime Prevention.

    ERIC Educational Resources Information Center

    National Crime Prevention Centre, Ottawa (Ontario).

    This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and building an integrated…

  20. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate technical, physical, and security...

  1. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate technical, physical, and security...

  2. 4 CFR 200.14 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Responsibility for maintaining adequate safeguards. 200....14 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate technical, physical, and security safeguards to prevent unauthorized disclosure...

  3. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  4. Sixth Warren K. Sinclair keynote address: The role of a strong regulator in safe and secure nuclear energy.

    PubMed

    Lyons, Peter B

    2011-01-01

    The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. PMID:21399404

  5. Adequate supervision for children and adolescents.

    PubMed

    Anderst, James; Moffatt, Mary

    2014-11-01

    Primary care providers (PCPs) have the opportunity to improve child health and well-being by addressing supervision issues before an injury or exposure has occurred and/or after an injury or exposure has occurred. Appropriate anticipatory guidance on supervision at well-child visits can improve supervision of children, and may prevent future harm. Adequate supervision varies based on the child's development and maturity, and the risks in the child's environment. Consideration should be given to issues as wide ranging as swimming pools, falls, dating violence, and social media. By considering the likelihood of harm and the severity of the potential harm, caregivers may provide adequate supervision by minimizing risks to the child while still allowing the child to take "small" risks as needed for healthy development. Caregivers should initially focus on direct (visual, auditory, and proximity) supervision of the young child. Gradually, supervision needs to be adjusted as the child develops, emphasizing a safe environment and safe social interactions, with graduated independence. PCPs may foster adequate supervision by providing concrete guidance to caregivers. In addition to preventing injury, supervision includes fostering a safe, stable, and nurturing relationship with every child. PCPs should be familiar with age/developmentally based supervision risks, adequate supervision based on those risks, characteristics of neglectful supervision based on age/development, and ways to encourage appropriate supervision throughout childhood. PMID:25369578

  6. Beyond engagement in working with children in eight Nairobi slums to address safety, security, and housing: Digital tools for policy and community dialogue.

    PubMed

    Mitchell, Claudia; Chege, Fatuma; Maina, Lucy; Rothman, Margot

    2016-01-01

    This article studies the ways in which researchers working in the area of health and social research and using participatory visual methods might extend the reach of participant-generated creations such as photos and drawings to engage community leaders and policy-makers. Framed as going 'beyond engagement', the article explores the idea of the production of researcher-led digital dialogue tools, focusing on one example, based on a series of visual arts-based workshops with children from eight slums in Nairobi addressing issues of safety, security, and well-being in relation to housing. The authors conclude that there is a need for researchers to embark upon the use of visual tools to expand the life and use of visual productions, and in particular to ensure meaningful participation of communities in social change. PMID:27132645

  7. Security in the Schools.

    ERIC Educational Resources Information Center

    Nelson, Jesse

    1997-01-01

    Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)

  8. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  9. How agro-ecological research helps to address food security issues under new IPM and pesticide reduction policies for global crop production systems.

    PubMed

    E Birch, A Nicholas; Begg, Graham S; Squire, Geoffrey R

    2011-06-01

    Drivers behind food security and crop protection issues are discussed in relation to food losses caused by pests. Pests globally consume food estimated to feed an additional one billion people. Key drivers include rapid human population increase, climate change, loss of beneficial on-farm biodiversity, reduction in per capita cropped land, water shortages, and EU pesticide withdrawals under policies relating to 91/414 EEC. IPM (Integrated Pest Management) will be compulsory for all EU agriculture by 2014 and is also being widely adopted globally. IPM offers a 'toolbox' of complementary crop- and region-specific crop protection solutions to address these rising pressures. IPM aims for more sustainable solutions by using complementary technologies. The applied research challenge now is to reduce selection pressure on single solution strategies, by creating additive/synergistic interactions between IPM components. IPM is compatible with organic, conventional, and GM cropping systems and is flexible, allowing regional fine-tuning. It reduces pests below economic thresholds utilizing key 'ecological services', particularly biocontrol. A recent global review demonstrates that IPM can reduce pesticide use and increase yields of most of the major crops studied. Landscape scale 'ecological engineering', together with genetic improvement of new crop varieties, will enhance the durability of pest-resistant cultivars (conventional and GM). IPM will also promote compatibility with semiochemicals, biopesticides, precision pest monitoring tools, and rapid diagnostics. These combined strategies are urgently needed and are best achieved via multi-disciplinary research, including complex spatio-temporal modelling at farm and landscape scales. Integrative and synergistic use of existing and new IPM technologies will help meet future food production needs more sustainably in developed and developing countries, in an era of reduced pesticide availability. Current IPM research gaps are

  10. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  11. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 1404.900 Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular...

  12. 29 CFR 98.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Adequate evidence. 98.900 Section 98.900 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.900 Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  13. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  14. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  15. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  16. 34 CFR 85.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Definitions § 85.900 Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular act or omission has occurred. Authority: E.O. 12549 (3 CFR, 1986 Comp., p. 189); E.O 12689 (3 CFR, 1989 Comp., p. 235); 20 U.S.C. 1082, 1094, 1221e-3 and 3474; and Sec....

  17. 29 CFR 452.110 - Adequate safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Adequate safeguards. 452.110 Section 452.110 Labor... DISCLOSURE ACT OF 1959 Election Procedures; Rights of Members § 452.110 Adequate safeguards. (a) In addition to the election safeguards discussed in this part, the Act contains a general mandate in section...

  18. 29 CFR 452.110 - Adequate safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 2 2011-07-01 2011-07-01 false Adequate safeguards. 452.110 Section 452.110 Labor... DISCLOSURE ACT OF 1959 Election Procedures; Rights of Members § 452.110 Adequate safeguards. (a) In addition to the election safeguards discussed in this part, the Act contains a general mandate in section...

  19. Violence as an Under-Recognized Barrier to Women's Realization of Their Right to Adequate Food and Nutrition: Case Studies From Georgia and South Africa.

    PubMed

    Bellows, Anne C; Lemke, Stefanie; Jenderedjian, Anna; Scherbaum, Veronika

    2015-10-01

    This article addresses under-acknowledged barriers of structural violence and discrimination that interfere with women's capacity to realize their human rights generally, and their right to adequate food and nutrition in particular. Case studies from Georgia and South Africa illustrate the need for a human rights-based approach to food and nutrition security that prioritizes non-discrimination, public participation, and self-determination. These principles are frustrated by different types of structural violence that, if not seriously addressed, pose multiple barriers to women's economic, public, and social engagement. PMID:26139694

  20. Americans Getting Adequate Water Daily, CDC Finds

    MedlinePlus

    ... medlineplus/news/fullstory_158510.html Americans Getting Adequate Water Daily, CDC Finds Men take in an average ... new government report finds most are getting enough water each day. The data, from the U.S. National ...

  1. Americans Getting Adequate Water Daily, CDC Finds

    MedlinePlus

    ... gov/news/fullstory_158510.html Americans Getting Adequate Water Daily, CDC Finds Men take in an average ... new government report finds most are getting enough water each day. The data, from the U.S. National ...

  2. 12 CFR 380.52 - Adequate protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... interest or other lien against property of the covered financial company that is subject to a security... lease of the property or the grant of a security interest or other lien against the property by the... property; (2) Providing to the claimant an additional or replacement lien to the extent that the sale,...

  3. Asbestos/NESHAP adequately wet guidance

    SciTech Connect

    Shafer, R.; Throwe, S.; Salgado, O.; Garlow, C.; Hoerath, E.

    1990-12-01

    The Asbestos NESHAP requires facility owners and/or operators involved in demolition and renovation activities to control emissions of particulate asbestos to the outside air because no safe concentration of airborne asbestos has ever been established. The primary method used to control asbestos emissions is to adequately wet the Asbestos Containing Material (ACM) with a wetting agent prior to, during and after demolition/renovation activities. The purpose of the document is to provide guidance to asbestos inspectors and the regulated community on how to determine if friable ACM is adequately wet as required by the Asbestos NESHAP.

  4. Small Rural Schools CAN Have Adequate Curriculums.

    ERIC Educational Resources Information Center

    Loustaunau, Martha

    The small rural school's foremost and largest problem is providing an adequate curriculum for students in a changing world. Often the small district cannot or is not willing to pay the per-pupil cost of curriculum specialists, specialized courses using expensive equipment no more than one period a day, and remodeled rooms to accommodate new…

  5. Funding the Formula Adequately in Oklahoma

    ERIC Educational Resources Information Center

    Hancock, Kenneth

    2015-01-01

    This report is a longevity, simulational study that looks at how the ratio of state support to local support effects the number of school districts that breaks the common school's funding formula which in turns effects the equity of distribution to the common schools. After nearly two decades of adequately supporting the funding formula, Oklahoma…

  6. Climate-derived tensions in Arctic security.

    SciTech Connect

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  7. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Addressing healthcare.

    PubMed

    Daly, Rich

    2013-02-11

    Though President Barack Obama has rarely made healthcare references in his State of the Union addresses, health policy experts are hoping he changes that strategy this year. "The question is: Will he say anything? You would hope that he would, given that that was the major issue he started his presidency with," says Dr. James Weinstein, left, of the Dartmouth-Hitchcock health system. PMID:23487896

  9. Convocation address.

    PubMed

    Alexander, P C

    1994-07-01

    Total world population is growing at the annual rate of 2%. While this rate of growth represents a decline from the annual growth rate of 2.5% during the early 1960s, world population still continues to grow rapidly in absolute terms as a result of the already enormous population base. Experts predict world population to grow to 12-14 billion before it stabilizes. Most of this growth will be due to high fertility amid declining mortality in developing countries; 80% of world population by the year 2000 will be in developing countries. India, for example, had a population of 358 million people in 1950. That population, however, should grow to more than one billion by the year 2000. The author, governor of Maharashtra, congratulates all who have successfully completed courses at the International Institute for Population Sciences during the year and voices his expectation that graduates will use their newfound knowledge and expertise in research and teaching as well as in developing meaningful and effective population policies in their respective countries. He also describes some of India's current population-related problems and future prospects. India has thus far kept its rate of food production above the rate of population growth. Even so, the average caloric intake in India needs to be increased by at least 50% in order for the population to maintain adequate health standards. The current scarcity of additional arable land, the need to halt further deforestation, and the ongoing absolute growth in population, however, suggest that India will be unable to raise the level of caloric intake for its people. India may even become dependent upon other countries to provide food for its population. PMID:12346131

  10. Inaugural address

    NASA Astrophysics Data System (ADS)

    Joshi, P. S.

    2014-03-01

    From jets to cosmos to cosmic censorship P S Joshi Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400005, India E-mail: psj@tifr.res.in 1. Introduction At the outset, I should like to acknowledge that part of the title above, which tries to capture the main flavour of this meeting, and has been borrowed from one of the plenary talks at the conference. When we set out to make the programme for the conference, we thought of beginning with observations on the Universe, but then we certainly wanted to go further and address deeper questions, which were at the very foundations of our inquiry, and understanding on the nature and structure of the Universe. I believe, we succeeded to a good extent, and it is all here for you in the form of these Conference Proceedings, which have been aptly titled as 'Vishwa Mimansa', which could be possibly translated as 'Analysis of the Universe'! It is my great pleasure and privilege to welcome you all to the ICGC-2011 meeting at Goa. The International Conference on Gravitation and Cosmology (ICGC) series of meetings are being organized by the Indian Association for General Relativity and Gravitation (IAGRG), and the first such meeting was planned and conducted in Goa in 1987, with subsequent meetings taking place at a duration of about four years at various locations in India. So, it was thought appropriate to return to Goa to celebrate the 25 years of the ICGC meetings. The recollections from that first meeting have been recorded elsewhere here in these Proceedings. The research and teaching on gravitation and cosmology was initiated quite early in India, by V V Narlikar at the Banares Hindu University, and by N R Sen in Kolkata in the 1930s. In course of time, this activity grew and gained momentum, and in early 1969, at the felicitation held for the 60 years of V V Narlikar at a conference in Ahmedabad, P C Vaidya proposed the formation of the IAGRG society, with V V Narlikar being the first President. This

  11. Opening addresses.

    PubMed

    Chukudebelu, W O; Lucas, A O; Ransome-kuti, O; Akinla, O; Obayi, G U

    1988-01-01

    The theme of the 3rd International Conference of the Society of Gynecology and Obstetrics of Nigeria (SOGON) held October 26, 1986 in Enugu was maternal morbidity and mortality in Africa. The opening addresses emphasize the high maternal mortality rate in Africa and SOGON's dedication to promoting women's health and welfare. In order to reduce maternal mortality, the scope of this problem must be made evident by gathering accurate mortality rates through maternity care monitoring and auditing. Governments, health professionals, educators, behavioral scientists, and communication specialists have a responsibility to improve maternal health services in this country. By making the population aware of this problem through education, measures can be taken to reduce the presently high maternal mortality rates. Nigerian women are physically unprepared for childbirth; therefore, balanced diets and disease prevention should be promoted. Since about 40% of deliveries are unmanaged, training for traditional birth attendants should be provided. Furthermore, family planning programs should discourage teenage pregnancies, encourage birth spacing and small families, and promote the use of family planning techniques among men. The problem of child bearing and rearing accompanied by hard work should also be investigated. For practices to change so that maternal mortality rates can be reduced, attitudes must be changed such that the current rates are viewed as unacceptable. PMID:12179275

  12. Opening Address

    NASA Astrophysics Data System (ADS)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  13. Presidential address.

    PubMed

    Vohra, U

    1993-07-01

    The Secretary of India's Ministry of Health and Family Welfare serves as Chair of the Executive Council of the International Institute for Population Sciences in Bombay. She addressed its 35th convocation in 1993. Global population stands at 5.43 billion and increases by about 90 million people each year. 84 million of these new people are born in developing countries. India contributes 17 million new people annually. The annual population growth rate in India is about 2%. Its population size will probably surpass 1 billion by the 2000. High population growth rates are a leading obstacle to socioeconomic development in developing countries. Governments of many developing countries recognize this problem and have expanded their family planning programs to stabilize population growth. Asian countries that have done so and have completed the fertility transition include China, Japan, Singapore, South Korea, and Thailand. Burma, Malaysia, North Korea, Sri Lanka, and Vietnam have not yet completed the transition. Afghanistan, Bangladesh, Iran, Nepal, and Pakistan are half-way through the transition. High population growth rates put pressure on land by fragmenting finite land resources, increasing the number of landless laborers and unemployment, and by causing considerable rural-urban migration. All these factors bring about social stress and burden civic services. India has reduced its total fertility rate from 5.2 to 3.9 between 1971 and 1991. Some Indian states have already achieved replacement fertility. Considerable disparity in socioeconomic development exists among states and districts. For example, the states of Bihar, Madhya Pradesh, Rajasthan, and Uttar Pradesh have female literacy rates lower than 27%, while that for Kerala is 87%. Overall, infant mortality has fallen from 110 to 80 between 1981 and 1990. In Uttar Pradesh, it has fallen from 150 to 98, while it is at 17 in Kerala. India needs innovative approaches to increase contraceptive prevalence rates

  14. Computer security engineering management

    SciTech Connect

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system.

  15. Purchasing a cycle helmet: are retailers providing adequate advice?

    PubMed Central

    Plumridge, E.; McCool, J.; Chetwynd, J.; Langley, J. D.

    1996-01-01

    OBJECTIVES: The aim of this study was to examine the selling of cycle helmets in retail stores with particular reference to the adequacy of advice offered about the fit and securing of helmets. METHODS: All 55 retail outlets selling cycle helmets in Christchurch, New Zealand were studied by participant observation. A research entered each store as a prospective customer and requested assistance to purchase a helmet. She took detailed field notes of the ensuing encounter and these were subsequently transcribed, coded, and analysed. RESULTS: Adequate advice for helmet purchase was given in less than half of the stores. In general the sales assistants in specialist cycle shops were better informed and gave more adequate advice than those in department stores. Those who have good advice also tended to be more good advice also tended to be more active in helping with fitting the helmet. Knowledge about safety standards was apparent in one third of sales assistants. Few stores displayed information for customers about the correct fit of cycle helmets. CONCLUSIONS: These findings suggest that the advice and assistance being given to ensure that cycle helmets fit properly is often inadequate and thus the helmets may fail to fulfil their purpose in preventing injury. Consultation between retailers and policy makers is a necessary first step to improving this situation. PMID:9346053

  16. Welcome Address

    NASA Astrophysics Data System (ADS)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  17. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.

    PubMed

    Chasteen, Joseph E; Murphy, Gretchen; Forrey, Arden; Heid, David

    2004-08-15

    This article reviews the issues related to the Health Insurance Portability & Accountability Act (HIPAA) security rule that apply to dental practice. The security rule specifically addresses individually identifiable health information that is transmitted or maintained in electronic media. System security must be applied to the entire technical infrastructure for the practice environment as well as to the work culture on a daily basis and must be thought of as an enterprise asset. Security refers to all of the policies, procedures, tools, and techniques used to assure that privacy and confidentiality are adequately addressed in a healthcare system. HIPAA requires all covered entities that transmit or maintain electronic health information perform, and document, a risk assessment for security and develop a security plan to address major areas of concern. A self-assessment tool is provided in this article. PMID:15318267

  18. Is a vegetarian diet adequate for children.

    PubMed

    Hackett, A; Nathan, I; Burgess, L

    1998-01-01

    The number of people who avoid eating meat is growing, especially among young people. Benefits to health from a vegetarian diet have been reported in adults but it is not clear to what extent these benefits are due to diet or to other aspects of lifestyles. In children concern has been expressed concerning the adequacy of vegetarian diets especially with regard to growth. The risks/benefits seem to be related to the degree of restriction of he diet; anaemia is probably both the main and the most serious risk but this also applies to omnivores. Vegan diets are more likely to be associated with malnutrition, especially if the diets are the result of authoritarian dogma. Overall, lacto-ovo-vegetarian children consume diets closer to recommendations than omnivores and their pre-pubertal growth is at least as good. The simplest strategy when becoming vegetarian may involve reliance on vegetarian convenience foods which are not necessarily superior in nutritional composition. The vegetarian sector of the food industry could do more to produce foods closer to recommendations. Vegetarian diets can be, but are not necessarily, adequate for children, providing vigilance is maintained, particularly to ensure variety. Identical comments apply to omnivorous diets. Three threats to the diet of children are too much reliance on convenience foods, lack of variety and lack of exercise. PMID:9670174

  19. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  20. DARHT - an `adequate` EIS: A NEPA case study

    SciTech Connect

    Webb, M.D.

    1997-08-01

    The Dual Axis Radiographic Hydrodynamic Test (DARHT) Facility Environmental Impact Statement (EIS) provides a case study that is interesting for many reasons. The EIS was prepared quickly, in the face of a lawsuit, for a project with unforeseen environmental impacts, for a facility that was deemed urgently essential to national security. Following judicial review the EIS was deemed to be {open_quotes}adequate.{close_quotes} DARHT is a facility now being built at Los Alamos National Laboratory (LANL) as part of the Department of Energy (DOE) nuclear weapons stockpile stewardship program. DARHT will be used to evaluate the safety and reliability of nuclear weapons, evaluate conventional munitions and study high-velocity impact phenomena. DARHT will be equipped with two accelerator-driven, high-intensity X-ray machines to record images of materials driven by high explosives. DARHT will be used for a variety of hydrodynamic tests, and DOE plans to conduct some dynamic experiments using plutonium at DARHT as well.

  1. 21 CFR 201.5 - Drugs; adequate directions for use.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Drugs; adequate directions for use. 201.5 Section...) DRUGS: GENERAL LABELING General Labeling Provisions § 201.5 Drugs; adequate directions for use. Adequate directions for use means directions under which the layman can use a drug safely and for the purposes...

  2. 21 CFR 201.5 - Drugs; adequate directions for use.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 4 2011-04-01 2011-04-01 false Drugs; adequate directions for use. 201.5 Section...) DRUGS: GENERAL LABELING General Labeling Provisions § 201.5 Drugs; adequate directions for use. Adequate directions for use means directions under which the layman can use a drug safely and for the purposes...

  3. 4 CFR 200.14 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Responsibility for maintaining adequate safeguards. 200.14 Section 200.14 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.14 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate technical, physical, and...

  4. Addressing the workforce pipeline challenge

    SciTech Connect

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  5. How Much and What Kind? Identifying an Adequate Technology Infrastructure for Early Childhood Education. Policy Brief

    ERIC Educational Resources Information Center

    Daugherty, Lindsay; Dossani, Rafiq; Johnson, Erin-Elizabeth; Wright, Cameron

    2014-01-01

    To realize the potential benefits of technology use in early childhood education (ECE), and to ensure that technology can help to address the digital divide, providers, families of young children, and young children themselves must have access to an adequate technology infrastructure. The goals for technology use in ECE that a technology…

  6. Nuclear security

    SciTech Connect

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  7. Social Security and Undergraduates with Disabilities: An Analysis of the National Postsecondary Student Aid Survey. Addressing Trends in Development in Secondary Education and Transition. Information Brief. Vol. 3, Issue 4.

    ERIC Educational Resources Information Center

    Berry, Hugh; Conway, Megan A.; Change, Kelly B.T.

    2004-01-01

    The purpose of this brief is to describe the characteristics of undergraduate students receiving Social Security Disability Insurance (SSDI) and Social Security Administration (SSI) benefits as they relate to issues of participation in postsecondary education and employment. This brief describes results from the National Postsecondary Student Aid…

  8. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  9. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  10. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 12 2012-01-01 2012-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect...

  11. 27 CFR 19.281 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.281 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment and Security § 19.281 Security. (a) General. The proprietor shall provide adequate security measures at the distilled spirits...

  12. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 12 2013-01-01 2013-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect...

  13. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 12 2014-01-01 2013-01-01 true Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect...

  14. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  15. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  16. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  17. 7 CFR 1780.14 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect...

  18. 27 CFR 19.966 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the...

  19. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  20. 7 CFR 4290.200 - Adequate capital for RBICs.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Adequate capital for RBICs. 4290.200 Section 4290.200 Agriculture Regulations of the Department of Agriculture (Continued) RURAL BUSINESS-COOPERATIVE SERVICE AND... Qualifications for the RBIC Program Capitalizing A Rbic § 4290.200 Adequate capital for RBICs. You must meet...

  1. 13 CFR 107.200 - Adequate capital for Licensees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Adequate capital for Licensees... INVESTMENT COMPANIES Qualifying for an SBIC License Capitalizing An Sbic § 107.200 Adequate capital for... Licensee, and to receive Leverage. (a) You must have enough Regulatory Capital to provide...

  2. 13 CFR 107.200 - Adequate capital for Licensees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Adequate capital for Licensees... INVESTMENT COMPANIES Qualifying for an SBIC License Capitalizing An Sbic § 107.200 Adequate capital for... Licensee, and to receive Leverage. (a) You must have enough Regulatory Capital to provide...

  3. 7 CFR 4290.200 - Adequate capital for RBICs.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Adequate capital for RBICs. 4290.200 Section 4290.200 Agriculture Regulations of the Department of Agriculture (Continued) RURAL BUSINESS-COOPERATIVE SERVICE AND... Qualifications for the RBIC Program Capitalizing A Rbic § 4290.200 Adequate capital for RBICs. You must meet...

  4. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining...

  5. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of...

  6. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 2 2011-07-01 2011-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  7. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 2 2012-07-01 2012-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  8. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 2 2014-07-01 2014-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  9. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 2 2013-07-01 2013-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  10. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Adequate file search. 716.25 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a person's responsibility to search records is limited to records in the location(s) where the...

  11. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Adequate file search. 716.25 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a person's responsibility to search records is limited to records in the location(s) where the...

  12. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Adequate file search. 716.25 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a person's responsibility to search records is limited to records in the location(s) where the...

  13. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Adequate file search. 716.25 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a person's responsibility to search records is limited to records in the location(s) where the...

  14. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining...

  15. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining...

  16. 10 CFR 503.35 - Inability to obtain adequate capital.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Inability to obtain adequate capital. 503.35 Section 503.35 Energy DEPARTMENT OF ENERGY (CONTINUED) ALTERNATE FUELS NEW FACILITIES Permanent Exemptions for New Facilities § 503.35 Inability to obtain adequate capital. (a) Eligibility. Section 212(a)(1)(D)...

  17. 10 CFR 503.35 - Inability to obtain adequate capital.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Inability to obtain adequate capital. 503.35 Section 503.35 Energy DEPARTMENT OF ENERGY (CONTINUED) ALTERNATE FUELS NEW FACILITIES Permanent Exemptions for New Facilities § 503.35 Inability to obtain adequate capital. (a) Eligibility. Section 212(a)(1)(D)...

  18. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must find... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Adequate exploration plan....

  19. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must find... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Adequate exploration plan....

  20. "Something Adequate"? In Memoriam Seamus Heaney, Sister Quinlan, Nirbhaya

    ERIC Educational Resources Information Center

    Parker, Jan

    2014-01-01

    Seamus Heaney talked of poetry's responsibility to represent the "bloody miracle", the "terrible beauty" of atrocity; to create "something adequate". This article asks, what is adequate to the burning and eating of a nun and the murderous gang rape and evisceration of a medical student? It considers Njabulo…

  1. Applications for cyber security - System and application monitoring

    SciTech Connect

    Marron, J. E.

    2006-07-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  2. Foreign Languages: Workforce Planning Could Help Address Staffing and Proficiency Shortfalls. Testimony before the Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate.

    ERIC Educational Resources Information Center

    Westin, Susan S.

    This statement examines the nature and impact of foreign language proficiency and personnel shortages in the Army, State Department, Central Intelligence Agency, and Federal Bureau of Investigation (FBI), discussing strategies used to address these shortages and efforts made to address current and projected shortages. All four agencies reported…

  3. 33 CFR 151.2065 - What is the standard of adequate compliance determined by the ANSTF for this subpart? [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false What is the standard of adequate... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR COMMERCIAL WASTE, AND BALLAST WATER Ballast Water Management...

  4. Awards and Addresses Summary

    PubMed Central

    2008-01-01

    Each year at the annual ASHG meeting, addresses are given in honor of the society and a number of award winners. A summary of each of these addresses is given below. On the next pages, we have printed the Presidential Address and the addresses for the William Allan Award. The other addresses, accompanied by pictures of the speakers, can be found at www.ashg.org.

  5. 45 CFR 1182.15 - Institute responsibility for maintaining adequate technical, physical, and security safeguards to...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Institute. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked filing cabinet. Some systems of records are not of such confidential... cards, magnetic tapes, or discs, are not under the personal control of an authorized person,...

  6. 45 CFR 1182.15 - Institute responsibility for maintaining adequate technical, physical, and security safeguards to...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Institute. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked filing cabinet. Some systems of records are not of such confidential... cards, magnetic tapes, or discs, are not under the personal control of an authorized person,...

  7. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  8. 17 CFR 10.4 - Business address; hours.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three...

  9. 17 CFR 12.3 - Business address; hours.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours....

  10. 17 CFR 10.4 - Business address; hours.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three...

  11. 17 CFR 10.4 - Business address; hours.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three...

  12. 17 CFR 171.3 - Business address; hours.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office...

  13. 17 CFR 12.3 - Business address; hours.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours....

  14. 17 CFR 171.3 - Business address; hours.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office...

  15. 17 CFR 12.3 - Business address; hours.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours....

  16. 17 CFR 171.3 - Business address; hours.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office...

  17. 17 CFR 12.3 - Business address; hours.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours....

  18. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  19. Arabidopsis: An Adequate Model for Dicot Root Systems?

    PubMed

    Zobel, Richard W

    2016-01-01

    The Arabidopsis root system is frequently considered to have only three classes of root: primary, lateral, and adventitious. Research with other plant species has suggested up to eight different developmental/functional classes of root for a given plant root system. If Arabidopsis has only three classes of root, it may not be an adequate model for eudicot plant root systems. Recent research, however, can be interpreted to suggest that pre-flowering Arabidopsis does have at least five (5) of these classes of root. This then suggests that Arabidopsis root research can be considered an adequate model for dicot plant root systems. PMID:26904040

  20. 36 CFR 1275.22 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials....

  1. 7 CFR 3575.48 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the...

  2. 7 CFR 762.126 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 762.126 Section 762.126... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The lender is responsible for ensuring that proper and adequate security is obtained and maintained to...

  3. 36 CFR 1275.22 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials....

  4. 36 CFR 1275.22 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Security. 1275.22 Section 1275... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials....

  5. 36 CFR 1275.22 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials....

  6. 7 CFR 3575.48 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the...

  7. 36 CFR 1275.22 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials....

  8. 7 CFR 3575.48 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the...

  9. 7 CFR 3575.48 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the...

  10. 7 CFR 3575.48 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the...

  11. 7 CFR 762.126 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 762.126 Section 762.126... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The lender is responsible for ensuring that proper and adequate security is obtained and maintained to...

  12. 7 CFR 762.126 - Security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Security requirements. 762.126 Section 762.126... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The lender is responsible for ensuring that proper and adequate security is obtained and maintained to...

  13. 7 CFR 762.126 - Security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Security requirements. 762.126 Section 762.126... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The lender is responsible for ensuring that proper and adequate security is obtained and maintained to...

  14. Is the Marketing Concept Adequate for Continuing Education?

    ERIC Educational Resources Information Center

    Rittenburg, Terri L.

    1984-01-01

    Because educators have a social responsibility to those they teach, the marketing concept may not be adequate as a philosophy for continuing education. In attempting to broaden the audience for continuing education, educators should consider a societal marketing concept to meet the needs of the educationally disadvantaged. (SK)

  15. Comparability and Reliability Considerations of Adequate Yearly Progress

    ERIC Educational Resources Information Center

    Maier, Kimberly S.; Maiti, Tapabrata; Dass, Sarat C.; Lim, Chae Young

    2012-01-01

    The purpose of this study is to develop an estimate of Adequate Yearly Progress (AYP) that will allow for reliable and valid comparisons among student subgroups, schools, and districts. A shrinkage-type estimator of AYP using the Bayesian framework is described. Using simulated data, the performance of the Bayes estimator will be compared to…

  16. 9 CFR 305.3 - Sanitation and adequate facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Sanitation and adequate facilities. 305.3 Section 305.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION...

  17. Understanding Your Adequate Yearly Progress (AYP), 2011-2012

    ERIC Educational Resources Information Center

    Missouri Department of Elementary and Secondary Education, 2011

    2011-01-01

    The "No Child Left Behind Act (NCLB) of 2001" requires all schools, districts/local education agencies (LEAs) and states to show that students are making Adequate Yearly Progress (AYP). NCLB requires states to establish targets in the following ways: (1) Annual Proficiency Target; (2) Attendance/Graduation Rates; and (3) Participation Rates.…

  18. Assessing Juvenile Sex Offenders to Determine Adequate Levels of Supervision.

    ERIC Educational Resources Information Center

    Gerdes, Karen E.; And Others

    1995-01-01

    This study analyzed the internal consistency of four inventories used by Utah probation officers to determine adequate and efficacious supervision levels and placement for juvenile sex offenders. Three factors accounted for 41.2 percent of variance (custodian's and juvenile's attitude toward intervention, offense characteristics, and historical…

  19. 34 CFR 200.13 - Adequate yearly progress in general.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 1 2011-07-01 2011-07-01 false Adequate yearly progress in general. 200.13 Section 200.13 Education Regulations of the Offices of the Department of Education OFFICE OF ELEMENTARY AND SECONDARY EDUCATION, DEPARTMENT OF EDUCATION TITLE I-IMPROVING THE ACADEMIC ACHIEVEMENT OF THE...

  20. 34 CFR 200.20 - Making adequate yearly progress.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 1 2011-07-01 2011-07-01 false Making adequate yearly progress. 200.20 Section 200.20 Education Regulations of the Offices of the Department of Education OFFICE OF ELEMENTARY AND SECONDARY EDUCATION, DEPARTMENT OF EDUCATION TITLE I-IMPROVING THE ACADEMIC ACHIEVEMENT OF THE DISADVANTAGED...

  1. Do Beginning Teachers Receive Adequate Support from Their Headteachers?

    ERIC Educational Resources Information Center

    Menon, Maria Eliophotou

    2012-01-01

    The article examines the problems faced by beginning teachers in Cyprus and the extent to which headteachers are considered to provide adequate guidance and support to them. Data were collected through interviews with 25 school teachers in Cyprus, who had recently entered teaching (within 1-5 years) in public primary schools. According to the…

  2. The Role of Food Banks in Addressing Food Insecurity: A Systematic Review.

    PubMed

    Bazerghi, Chantelle; McKay, Fiona H; Dunn, Matthew

    2016-08-01

    Food banks play a major role in the food aid sector by distributing donated and purchased groceries directly to food insecure families. The public health implications of food insecurity are significant, particularly as food insecurity has a higher prevalence among certain population groups. This review consolidates current knowledge about the function and efficacy of food banks to address food insecurity. A systematic review was conducted. Thirty-five publications were reviewed, of which 14 examined food security status, 13 analysed nutritional quality of food provided, and 24 considered clients' needs in relation to food bank use. This review found that while food banks have an important role to play in providing immediate solutions to severe food deprivation, they are limited in their capacity to improve overall food security outcomes due to the limited provision of nutrient-dense foods in insufficient amounts, especially from dairy, vegetables and fruits. Food banks have the potential to improve food security outcomes when operational resources are adequate, provisions of perishable food groups are available, and client needs are identified and addressed. PMID:26728281

  3. Security Considerations for E-Mental Health Interventions

    PubMed Central

    Bennett, Anthony James; Griffiths, Kathleen Margaret

    2010-01-01

    Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. PMID:21169173

  4. Maintaining adequate hydration and nutrition in adult enteral tube feeding.

    PubMed

    Dunn, Sasha

    2015-01-01

    Predicting the nutritional and fluid requirements of enterally-fed patients can be challenging and the practicalities of ensuring adequate delivery must be taken into consideration. Patients who are enterally fed can be more reliant on clinicians, family members and carers to meet their nutrition and hydration needs and identify any deficiencies, excesses or problems with delivery. Estimating a patient's requirements can be challenging due to the limitations of using predictive equations in the clinical setting. Close monitoring by all those involved in the patient's care, as well as regular review by a dietitian, is therefore required to balance the delivery of adequate feed and fluids to meet each patient's individual needs and prevent the complications of malnutrition and dehydration. Increasing the awareness of the signs of malnutrition and dehydration in patients receiving enteral tube feeding among those involved in a patient's care will help any deficiencies to be detected early on and rectified before complications occur. PMID:26087203

  5. Assessing juvenile sex offenders to determine adequate levels of supervision.

    PubMed

    Gerdes, K E; Gourley, M M; Cash, M C

    1995-08-01

    The present study analyzed the internal consistency of four inventories currently being used by probation officers in the state of Utah to determine adequate and efficacious supervision levels and placement for juvenile sex offenders. The internal consistency or reliability of the inventories ranged from moderate to good. Factor analysis was utilized to significantly increase the reliability of the four inventories by collapsing them into the following three factors: (a) Custodian's and Juvenile's Attitude Toward Intervention; (b) Offense Characteristics; and (c) Historical Risk Factors. These three inventories/factors explained 41.2% of the variance in the combined inventories' scores. Suggestions are made regarding the creation of an additional inventory. "Characteristics of the Victim" to account for more of the variance. In addition, suggestions as to how these inventories can be used by probation officers to make objective and consistent decisions about adequate supervision levels and placement for juvenile sex offenders are discussed. PMID:7583754

  6. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  7. Addressing Employer Services.

    ERIC Educational Resources Information Center

    Perspective: Essays and Reviews of Issues in Employment Security and Employment and Training Programs, 1986

    1986-01-01

    This volume of an annual journal contains 21 articles focusing on the many services that state Employment Security (ES) agencies are providing to improve outreach to employers who pay for the programs through the dedicated revenues of the Federal Unemployment Tax Act and state benefit taxes and to improve their own staff ability to deliver…

  8. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  9. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  10. Addressivity in cogenerative dialogues

    NASA Astrophysics Data System (ADS)

    Hsu, Pei-Ling

    2014-03-01

    Ashraf Shady's paper provides a first-hand reflection on how a foreign teacher used cogens as culturally adaptive pedagogy to address cultural misalignments with students. In this paper, Shady drew on several cogen sessions to showcase his journey of using different forms of cogens with his students. To improve the quality of cogens, one strategy he used was to adjust the number of participants in cogens. As a result, some cogens worked and others did not. During the course of reading his paper, I was impressed by his creative and flexible use of cogens and at the same time was intrigued by the question of why some cogens work and not others. In searching for an answer, I found that Mikhail Bakhtin's dialogism, especially the concept of addressivity, provides a comprehensive framework to address this question. In this commentary, I reanalyze the cogen episodes described in Shady's paper in the light of dialogism. My analysis suggests that addressivity plays an important role in mediating the success of cogens. Cogens with high addressivity function as internally persuasive discourse that allows diverse consciousnesses to coexist and so likely affords productive dialogues. The implications of addressivity in teaching and learning are further discussed.

  11. Adequation of mini satellites to oceanic altimetry missions

    NASA Astrophysics Data System (ADS)

    Bellaieche, G.; Aguttes, J. P.

    1993-01-01

    Association of the mini satellite concept and oceanic altimetry missions is discussed. Mission definition and most constraining requirements (mesoscale for example) demonstrate mini satellites to be quite adequate for such missions. Progress in altimeter characteristics, orbit determination, and position reporting allow consideration of oceanic altimetry missions using low Earth orbit satellites. Satellite constellation, trace keeping and orbital period, and required payload characteristics are exposed. The mission requirements covering Sun synchronous orbit, service area, ground system, and launcher characteristics as well as constellation maintenance strategy are specified. Two options for the satellite, orbital mechanics, propulsion, onboard power and stabilizing subsystems, onboard management, satellite ground linkings, mechanical and thermal subsystems, budgets, and planning are discussed.

  12. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Information (SSI) and must be handled and protected in accordance with 49 CFR part 1520. ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in...

  13. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Information (SSI) and must be handled and protected in accordance with 49 CFR part 1520. ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in...

  14. Quantifying dose to the reconstructed breast: Can we adequately treat?

    SciTech Connect

    Chung, Eugene; Marsh, Robin B.; Griffith, Kent A.; Moran, Jean M.; Pierce, Lori J.

    2013-04-01

    To evaluate how immediate reconstruction (IR) impacts postmastectomy radiotherapy (PMRT) dose distributions to the reconstructed breast (RB), internal mammary nodes (IMN), heart, and lungs using quantifiable dosimetric end points. 3D conformal plans were developed for 20 IR patients, 10 autologous reconstruction (AR), and 10 expander-implant (EI) reconstruction. For each reconstruction type, 5 right- and 5 left-sided reconstructions were selected. Two plans were created for each patient, 1 with RB coverage alone and 1 with RB + IMN coverage. Left-sided EI plans without IMN coverage had higher heart Dmean than left-sided AR plans (2.97 and 0.84 Gy, p = 0.03). Otherwise, results did not vary by reconstruction type and all remaining metrics were evaluated using a combined AR and EI dataset. RB coverage was adequate regardless of laterality or IMN coverage (Dmean 50.61 Gy, D95 45.76 Gy). When included, IMN Dmean and D95 were 49.57 and 40.96 Gy, respectively. Mean heart doses increased with left-sided treatment plans and IMN inclusion. Right-sided treatment plans and IMN inclusion increased mean lung V{sub 20}. Using standard field arrangements and 3D planning, we observed excellent coverage of the RB and IMN, regardless of laterality or reconstruction type. Our results demonstrate that adequate doses can be delivered to the RB with or without IMN coverage.

  15. Adequate drainage system design for heap leaching structures.

    PubMed

    Majdi, Abbas; Amini, Mehdi; Nasab, Saeed Karimi

    2007-08-17

    The paper describes an optimum design of a drainage system for a heap leaching structure which has positive impacts on both mine environment and mine economics. In order to properly design a drainage system the causes of an increase in the acid level of the heap which in turn produces severe problems in the hydrometallurgy processes must be evaluated. One of the most significant negative impacts induced by an increase in the acid level within a heap structure is the increase of pore acid pressure which in turn increases the potential of a heap-slide that may endanger the mine environment. In this paper, initially the thickness of gravelly drainage layer is determined via existing empirical equations. Then by assuming that the calculated thickness is constant throughout the heap structure, an approach has been proposed to calculate the required internal diameter of the slotted polyethylene pipes which are used for auxiliary drainage purposes. In order to adequately design this diameter, the pipe's cross-sectional deformation due to stepped heap structure overburden pressure is taken into account. Finally, a design of an adequate drainage system for the heap structure 2 at Sarcheshmeh copper mine is presented and the results are compared with those calculated by exiting equations. PMID:17321044

  16. Novel Duplicate Address Detection with Hash Function.

    PubMed

    Song, GuangJia; Ji, ZhenZhou

    2016-01-01

    Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the "Hash_64" field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901

  17. Novel Duplicate Address Detection with Hash Function

    PubMed Central

    Song, GuangJia; Ji, ZhenZhou

    2016-01-01

    Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901

  18. A Holistic Approach to School Security.

    ERIC Educational Resources Information Center

    Timm, Paul

    2002-01-01

    Asserts that school security requires a variety of methods combined into a single, cohesive solution that addresses five areas: management, building security, violence prevention and intervention, staff training, and crisis management. (EV)

  19. Are PPS payments adequate? Issues for updating and assessing rates

    PubMed Central

    Sheingold, Steven H.; Richter, Elizabeth

    1992-01-01

    Declining operating margins under Medicare's prospective payment system (PPS) have focused attention on the adequacy of payment rates. The question of whether annual updates to the rates have been too low or cost increases too high has become important. In this article we discuss issues relevant to updating PPS rates and judging their adequacy. We describe a modification to the current framework for recommending annual update factors. This framework is then used to retrospectively assess PPS payment and cost growth since 1985. The preliminary results suggest that current rates are more than adequate to support the cost of efficient care. Also discussed are why using financial margins to evaluate rates is problematic and alternative methods that might be employed. PMID:10127450

  20. Addressing Social Issues.

    ERIC Educational Resources Information Center

    Schoebel, Susan

    1991-01-01

    Maintains that advertising can help people become more aware of social responsibilities. Describes a successful nationwide newspaper advertising competition for college students in which ads address social issues such as literacy, drugs, teen suicide, and teen pregnancy. Notes how the ads have helped grassroots programs throughout the United…

  1. States Address Achievement Gaps.

    ERIC Educational Resources Information Center

    Christie, Kathy

    2002-01-01

    Summarizes 2 state initiatives to address the achievement gap: North Carolina's report by the Advisory Commission on Raising Achievement and Closing Gaps, containing an 11-point strategy, and Kentucky's legislation putting in place 10 specific processes. The North Carolina report is available at www.dpi.state.nc.us.closingthegap; Kentucky's…

  2. Address of the President

    ERIC Educational Resources Information Center

    Ness, Frederic W.

    1976-01-01

    The president of the Association of American Colleges addresses at the 62nd annual meeting the theme of the conference: "Looking to the Future--Liberal Education in a Radically Changing Society." Contributions to be made by AAC are examined. (LBH)

  3. Addressing Sexual Harassment

    ERIC Educational Resources Information Center

    Young, Ellie L.; Ashbaker, Betty Y.

    2008-01-01

    This article discusses ways on how to address the problem of sexual harassment in schools. Sexual harassment--simply defined as any unwanted and unwelcome sexual behavior--is a sensitive topic. Merely providing students, parents, and staff members with information about the school's sexual harassment policy is insufficient; schools must take…

  4. Space sciences - Keynote address

    NASA Technical Reports Server (NTRS)

    Alexander, Joseph K.

    1990-01-01

    The present status and projected future developments of the NASA Space Science and Applications Program are addressed. Emphasis is given to biochemistry experiments that are planned for the Space Station. Projects for the late 1990s which will study the sun, the earth's magnetosphere, and the geosphere are briefly discussed.

  5. 75 FR 11610 - Notice Announcing Addresses for Service of Process

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Notice Announcing Addresses for Service of Process AGENCY: Social Security Administration. ACTION... responsible for the jurisdiction in which the complaint has been filed. This notice replaces 70 FR...

  6. SPAN security policies and guidelines

    NASA Technical Reports Server (NTRS)

    Sisson, Patricia L.; Green, James L.

    1989-01-01

    A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.

  7. Initiative Addresses Subsurface Energy and Environment Problems

    NASA Astrophysics Data System (ADS)

    Bodvarsson, Gudmundur S.; Majer, Ernest L.; Wang, Joseph S. Y.; Colwell, Frederick; Redden, George

    2006-01-01

    Members of the geoscience community are cooperating in conceptualizing fundamental, crosscutting research to address major obstacles to solving energy and environmental problems related to the subsurface, through the SECUREarth initiative, which began in 2004. Addressing problems, such as reliable nuclear waste storage and safe carbon dioxide (CO2) sequestration, are critical to maintaining an economical and safe energy supply and clean environment. A recent workshop in Golden, Colo., helped to further the development of the SECUREarth (Scientific Energy/Environmental Crosscutting Underground Research for Urgent Solutions to Secure the Earth's Future) initiative by identifying the key scientific challenges in the geosciences, as well as to target possible approaches for overcoming roadblocks.

  8. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  9. Excerpts from keynote address

    SciTech Connect

    Creel, G.C.

    1995-06-01

    Excerpts from the keynote principally address emissions issues in the fossil power industry as related to heat rate improvements. Stack emissions of both sulfur and nitrogen oxides are discussed, and a number of examples are given: (1) PEPCO`s Potomac River Station, and (2) Morgantown station`s NOX reduction efforts. Circulating water emissions are also briefly discussed, as are O & M costs of emission controls.

  10. Holographic content addressable storage

    NASA Astrophysics Data System (ADS)

    Chao, Tien-Hsin; Lu, Thomas; Reyes, George

    2015-03-01

    We have developed a Holographic Content Addressable Storage (HCAS) architecture. The HCAS systems consists of a DMD (Digital Micromirror Array) as the input Spatial Light Modulator (SLM), a CMOS (Complementary Metal-oxide Semiconductor) sensor as the output photodetector and a photorefractive crystal as the recording media. The HCAS system is capable of performing optical correlation of an input image/feature against massive reference data set stored in the holographic memory. Detailed system analysis will be reported in this paper.

  11. Dose Limits for Man do not Adequately Protect the Ecosystem

    SciTech Connect

    Higley, Kathryn A.; Alexakhin, Rudolf M.; McDonald, Joseph C.

    2004-08-01

    It has been known for quite some time that different organisms display differing degrees of sensitivity to the effects of ionizing radiations. Some microorganisms such as the bacterium Micrococcus radiodurans, along with many species of invertebrates, are extremely radio-resistant. Humans might be categorized as being relatively sensitive to radiation, and are a bit more resistant than some pine trees. Therefore, it could be argued that maintaining the dose limits necessary to protect humans will also result in the protection of most other species of flora and fauna. This concept is usually referred to as the anthropocentric approach. In other words, if man is protected then the environment is also adequately protected. The ecocentric approach might be stated as; the health of humans is effectively protected only when the environment is not unduly exposed to radiation. The ICRP is working on new recommendations dealing with the protection of the environment, and this debate should help to highlight a number of relevant issues concerning that topic.

  12. ENSURING ADEQUATE SAFETY WHEN USING HYDROGEN AS A FUEL

    SciTech Connect

    Coutts, D

    2007-01-22

    Demonstration projects using hydrogen as a fuel are becoming very common. Often these projects rely on project-specific risk evaluations to support project safety decisions. This is necessary because regulations, codes, and standards (hereafter referred to as standards) are just being developed. This paper will review some of the approaches being used in these evolving standards, and techniques which demonstration projects can implement to bridge the gap between current requirements and stakeholder desires. Many of the evolving standards for hydrogen-fuel use performance-based language, which establishes minimum performance and safety objectives, as compared with prescriptive-based language that prescribes specific design solutions. This is being done for several reasons including: (1) concern that establishing specific design solutions too early will stifle invention, (2) sparse performance data necessary to support selection of design approaches, and (3) a risk-adverse public which is unwilling to accept losses that were incurred in developing previous prescriptive design standards. The evolving standards often contain words such as: ''The manufacturer shall implement the measures and provide the information necessary to minimize the risk of endangering a person's safety or health''. This typically implies that the manufacturer or project manager must produce and document an acceptable level of risk. If accomplished using comprehensive and systematic process the demonstration project risk assessment can ease the transition to widespread commercialization. An approach to adequately evaluate and document the safety risk will be presented.

  13. Adequate peritoneal dialysis: theoretical model and patient treatment.

    PubMed

    Tast, C

    1998-01-01

    The objective of this study was to evaluate the relationship between adequate PD with sufficient weekly Kt/V (2.0) and Creatinine clearance (CCR) (60l) and necessary daily dialysate volume. This recommended parameter was the result of a recent multi-centre study (CANUSA). For this there were 40 patients in our hospital examined and compared in 1996, who carried out PD for at least 8 weeks and up to 6 years. These goals (CANUSA) are easily attainable in the early treatment of many individuals with a low body surface area (BSA). With higher BSA or missing RRF (Residual Renal Function) the daily dose of dialysis must be adjusted. We found it difficult to obtain the recommended parameters and tried to find a solution to this problem. The simplest method is to increase the volume or exchange rate. The most expensive method is to change from CAPD to APD with the possibility of higher volume or exchange rates. Selection of therapy must take into consideration: 1. patient preference, 2. body mass, 3. peritoneal transport rates, 4. ability to perform therapy, 5. cost of therapy and 6. risk of peritonitis. With this information in mind, an individual prescription can be formulated and matched to the appropriate modality of PD. PMID:10392062

  14. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  15. One Health in food safety and security education: A curricular framework.

    PubMed

    Angelos, J; Arens, A; Johnson, H; Cadriel, J; Osburn, B

    2016-02-01

    The challenges of producing and distributing the food necessary to feed an anticipated 9 billion people in developed and developing societies by 2050 without destroying Earth's finite soil and water resources present extremely complex problems that lack simple solutions. The ability of modern societies to adequately address these and other food-related problems will require an educated workforce trained not only in traditional food safety, security, and public health, but also in other areas including food production, sustainable practices, and ecosystem health. To help address the need for such an educated workforce, a curricular framework was developed to assist those tasked with designing education and training for future food systems workers. One sentence summary: A curricular framework for education and training in food safety and security was developed that incorporates One Health concepts. PMID:26851591

  16. Cyber Security--Are You Prepared?

    ERIC Educational Resources Information Center

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  17. International Student Security: A View from Beijing

    ERIC Educational Resources Information Center

    Forbes-Mewett, Helen; Nyland, Chris; Shao, Sijun

    2010-01-01

    Security is an integral component of the relationships that shape the lives of students hosted by foreign countries. International student security became a source of contention between nations in 2008 when China's Government charged that Australia was failing to adequately provide for the safety of Chinese students. We discuss Beck's theorisation…

  18. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  19. Content addressable memory project

    NASA Technical Reports Server (NTRS)

    Hall, J. Storrs; Levy, Saul; Smith, Donald E.; Miyake, Keith M.

    1992-01-01

    A parameterized version of the tree processor was designed and tested (by simulation). The leaf processor design is 90 percent complete. We expect to complete and test a combination of tree and leaf cell designs in the next period. Work is proceeding on algorithms for the computer aided manufacturing (CAM), and once the design is complete we will begin simulating algorithms for large problems. The following topics are covered: (1) the practical implementation of content addressable memory; (2) design of a LEAF cell for the Rutgers CAM architecture; (3) a circuit design tool user's manual; and (4) design and analysis of efficient hierarchical interconnection networks.

  20. Bioreactors Addressing Diabetes Mellitus

    PubMed Central

    Minteer, Danielle M.; Gerlach, Jorg C.

    2014-01-01

    The concept of bioreactors in biochemical engineering is a well-established process; however, the idea of applying bioreactor technology to biomedical and tissue engineering issues is relatively novel and has been rapidly accepted as a culture model. Tissue engineers have developed and adapted various types of bioreactors in which to culture many different cell types and therapies addressing several diseases, including diabetes mellitus types 1 and 2. With a rising world of bioreactor development and an ever increasing diagnosis rate of diabetes, this review aims to highlight bioreactor history and emerging bioreactor technologies used for diabetes-related cell culture and therapies. PMID:25160666

  1. Managing information technology security risk

    NASA Technical Reports Server (NTRS)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  2. On Adequate Comparisons of Antenna Phase Center Variations

    NASA Astrophysics Data System (ADS)

    Schoen, S.; Kersten, T.

    2013-12-01

    One important part for ensuring the high quality of the International GNSS Service's (IGS) products is the collection and publication of receiver - and satellite antenna phase center variations (PCV). The PCV are crucial for global and regional networks, since they introduce a global scale factor of up to 16ppb or changes in the height component with an amount of up to 10cm, respectively. Furthermore, antenna phase center variations are also important for precise orbit determination, navigation and positioning of mobile platforms, like e.g. the GOCE and GRACE gravity missions, or for the accurate Precise Point Positioning (PPP) processing. Using the EUREF Permanent Network (EPN), Baire et al. (2012) showed that individual PCV values have a significant impact on the geodetic positioning. The statements are further supported by studies of Steigenberger et al. (2013) where the impact of PCV for local-ties are analysed. Currently, there are five calibration institutions including the Institut für Erdmessung (IfE) contributing to the IGS PCV file. Different approaches like field calibrations and anechoic chamber measurements are in use. Additionally, the computation and parameterization of the PCV are completely different within the methods. Therefore, every new approach has to pass a benchmark test in order to ensure that variations of PCV values of an identical antenna obtained from different methods are as consistent as possible. Since the number of approaches to obtain these PCV values rises with the number of calibration institutions, there is the necessity for an adequate comparison concept, taking into account not only the numerical values but also stochastic information and computational issues of the determined PCVs. This is of special importance, since the majority of calibrated receiver antennas published by the IGS origin from absolute field calibrations based on the Hannover Concept, Wübbena et al. (2000). In this contribution, a concept for the adequate

  3. Improving access to adequate pain management in Taiwan.

    PubMed

    Scholten, Willem

    2015-06-01

    There is a global crisis in access to pain management in the world. WHO estimates that 4.65 billion people live in countries where medical opioid consumption is near to zero. For 2010, WHO considered a per capita consumption of 216.7 mg morphine equivalents adequate, while Taiwan had a per capita consumption of 0.05 mg morphine equivalents in 2007. In Asia, the use of opioids is sensitive because of the Opium Wars in the 19th century and for this reason, the focus of controlled substances policies has been on the prevention of diversion and dependence. However, an optimal public health outcome requires that also the beneficial aspects of these substances are acknowledged. Therefore, WHO recommends a policy based on the Principle of Balance: ensuring access for medical and scientific purposes while preventing diversion, harmful use and dependence. Furthermore, international law requires that countries ensure access to opioid analgesics for medical and scientific purposes. There is evidence that opioid analgesics for chronic pain are not associated with a major risk for developing dependence. Barriers for access can be classified in the categories of overly restrictive laws and regulations; insufficient medical training on pain management and problems related to assessment of medical needs; attitudes like an excessive fear for dependence or diversion; and economic and logistical problems. The GOPI project found many examples of such barriers in Asia. Access to opioid medicines in Taiwan can be improved by analysing the national situation and drafting a plan. The WHO policy guidelines Ensuring Balance in National Policies on Controlled Substances can be helpful for achieving this purpose, as well as international guidelines for pain treatment. PMID:26068436

  4. Addressing Environmental Health Inequalities.

    PubMed

    Gouveia, Nelson

    2016-01-01

    Environmental health inequalities refer to health hazards disproportionately or unfairly distributed among the most vulnerable social groups, which are generally the most discriminated, poor populations and minorities affected by environmental risks. Although it has been known for a long time that health and disease are socially determined, only recently has this idea been incorporated into the conceptual and practical framework for the formulation of policies and strategies regarding health. In this Special Issue of the International Journal of Environmental Research and Public Health (IJERPH), "Addressing Environmental Health Inequalities-Proceedings from the ISEE Conference 2015", we incorporate nine papers that were presented at the 27th Conference of the International Society for Environmental Epidemiology (ISEE), held in Sao Paulo, Brazil, in 2015. This small collection of articles provides a brief overview of the different aspects of this topic. Addressing environmental health inequalities is important for the transformation of our reality and for changing the actual development model towards more just, democratic, and sustainable societies driven by another form of relationship between nature, economy, science, and politics. PMID:27618906

  5. 46 CFR 14.103 - Addresses of Coast Guard.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Addresses of Coast Guard. 14.103 Section 14.103 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.103 Addresses of Coast Guard. (a) U.S. postal mail: U.S....

  6. 46 CFR 14.103 - Addresses of Coast Guard.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Addresses of Coast Guard. 14.103 Section 14.103 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.103 Addresses of Coast Guard. (a) U.S. postal mail: U.S....

  7. 46 CFR 107.117 - Coast Guard addresses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Coast Guard addresses. 107.117 Section 107.117 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.117 Coast Guard addresses. When approval of the Commandant is required under...

  8. 46 CFR 107.117 - Coast Guard addresses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Coast Guard addresses. 107.117 Section 107.117 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.117 Coast Guard addresses. When approval of the Commandant is required under...

  9. 46 CFR 107.117 - Coast Guard addresses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Coast Guard addresses. 107.117 Section 107.117 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.117 Coast Guard addresses. When approval of the Commandant is required under...

  10. 46 CFR 107.117 - Coast Guard addresses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Coast Guard addresses. 107.117 Section 107.117 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.117 Coast Guard addresses. When approval of the Commandant is required under...

  11. 46 CFR 107.117 - Coast Guard addresses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Coast Guard addresses. 107.117 Section 107.117 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.117 Coast Guard addresses. When approval of the Commandant is required under...

  12. 46 CFR 14.103 - Addresses of Coast Guard.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Addresses of Coast Guard. 14.103 Section 14.103 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.103 Addresses of Coast Guard. (a) U.S. postal mail: U.S....

  13. 21 CFR 1321.01 - DEA mailing addresses.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false DEA mailing addresses. 1321.01 Section 1321.01 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE DEA MAILING ADDRESSES § 1321.01... substances certification request. DEA Regulatory Section 1301.71(d)—Security system compliance review...

  14. 46 CFR 184.610 - Public address systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Public address systems. 184.610 Section 184.610 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS....610 Public address systems. (a) Except as noted in paragraphs (d) and (e) below, each vessel must...

  15. Are the Psychological Needs of Adolescent Survivors of Pediatric Cancer Adequately Identified and Treated?

    PubMed Central

    Kahalley, Lisa S.; Wilson, Stephanie J.; Tyc, Vida L.; Conklin, Heather M.; Hudson, Melissa M.; Wu, Shengjie; Xiong, Xiaoping; Stancel, Heather H.; Hinds, Pamela S.

    2012-01-01

    Objectives To describe the psychological needs of adolescent survivors of acute lymphoblastic leukemia (ALL) or brain tumor (BT), we examined: (a) the occurrence of cognitive, behavioral, and emotional concerns identified during a comprehensive psychological evaluation, and (b) the frequency of referrals for psychological follow-up services to address identified concerns. Methods Psychological concerns were identified on measures according to predetermined criteria for 100 adolescent survivors. Referrals for psychological follow-up services were made for concerns previously unidentified in formal assessment or not adequately addressed by current services. Results Most survivors (82%) exhibited at least one concern across domains: behavioral (76%), cognitive (47%), and emotional (19%). Behavioral concerns emerged most often on scales associated with executive dysfunction, inattention, learning, and peer difficulties. CRT was associated with cognitive concerns, χ2(1,N=100)=5.63, p<0.05. Lower income was associated with more cognitive concerns for ALL survivors, t(47)=3.28, p<0.01, and more behavioral concerns for BT survivors, t(48)=2.93, p<0.01. Of survivors with concerns, 38% were referred for psychological follow-up services. Lower-income ALL survivors received more referrals for follow-up, χ2(1,N=41)=8.05, p<0.01. Referred survivors had more concerns across domains than non-referred survivors, ALL: t(39)=2.96, p<0.01, BT: t(39)=3.52, p<0.01. Trends suggest ALL survivors may be at risk for experiencing unaddressed cognitive needs. Conclusions Many adolescent survivors of cancer experience psychological difficulties that are not adequately managed by current services, underscoring the need for long-term surveillance. In addition to prescribing regular psychological evaluations, clinicians should closely monitor whether current support services appropriately meet survivors’ needs, particularly for lower-income survivors and those treated with CRT. PMID:22278930

  16. Content addressable memory project

    NASA Technical Reports Server (NTRS)

    Hall, Josh; Levy, Saul; Smith, D.; Wei, S.; Miyake, K.; Murdocca, M.

    1991-01-01

    The progress on the Rutgers CAM (Content Addressable Memory) Project is described. The overall design of the system is completed at the architectural level and described. The machine is composed of two kinds of cells: (1) the CAM cells which include both memory and processor, and support local processing within each cell; and (2) the tree cells, which have smaller instruction set, and provide global processing over the CAM cells. A parameterized design of the basic CAM cell is completed. Progress was made on the final specification of the CPS. The machine architecture was driven by the design of algorithms whose requirements are reflected in the resulted instruction set(s). A few of these algorithms are described.

  17. Bax: Addressed to kill.

    PubMed

    Renault, Thibaud T; Manon, Stéphen

    2011-09-01

    The pro-apoptototic protein Bax (Bcl-2 Associated protein X) plays a central role in the mitochondria-dependent apoptotic pathway. In healthy mammalian cells, Bax is essentially cytosolic and inactive. Following a death signal, the protein is translocated to the outer mitochondrial membrane, where it promotes a permeabilization that favors the release of different apoptogenic factors, such as cytochrome c. The regulation of Bax translocation is associated to conformational changes that are under the control of different factors. The evidences showing the involvement of different Bax domains in its mitochondrial localization are presented. The interactions between Bax and its different partners are described in relation to their ability to promote (or prevent) Bax conformational changes leading to mitochondrial addressing and to the acquisition of the capacity to permeabilize the outer mitochondrial membrane. PMID:21641962

  18. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  19. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  20. Magnetic content addressable memories

    NASA Astrophysics Data System (ADS)

    Jiang, Zhenye

    Content Addressable Memories are designed with comparison circuits built into every bit cell. This parallel structure can increase the speed of searching from O(n) (as with Random Access Memories) to O(1), where n is the number of entries being searched. The high cost in hardware limits the application of CAM within situations where higher searching speed is extremely desired. Spintronics technology can build non-volatile Magnetic RAM with only one device for one bit cell. There are various technologies involved, like Magnetic Tunnel Junctions, off-easy-axis programming method, Synthetic Anti-Ferromagnetic tri-layers, Domain Wall displacement, Spin Transfer Torque tri-layers and etc. With them, particularly the Tunnel Magneto-Resistance variation in MTJ due to difference in magnetization polarity of the two magnets, Magnetic CAM can be developed with reduced hardware cost. And this is demonstrated by the discussion in this dissertation. Six MCAM designs are discussed. In the first design, comparand (C), local information (S) and their complements are stored into 4 MTJs connected in XOR gate pattern. The other five designs have one or two stacks for both information storage and comparison, and full TMR ratio can be taken advantage of. Two challenges for the five are specifically programming C without changing S and selectively programming a cell out of an array. The solutions to specific programming are: by confining the programming field for C in a ring structure design; by using field programming and spin polarized current programming respectively for C and S in the SAF+DW and SAF+STT tri-layer design; by making use of the difference in thresholds between direct mode and toggle mode switching in the SAF+SAF design. The problem of selective programming is addressed by off-easy-axis method and by including SAF tri-layers. Cell with STT tri-layers for both C and S can completely avoid the problems of specific and selective programming, but subject to the limit of

  1. A security architecture for health information networks.

    PubMed

    Kailar, Rajashekar; Muralidhar, Vinod

    2007-01-01

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862

  2. 17 CFR 450.4 - Custodial holdings of government securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... efforts, is unable to provide the Federal Reserve Bank with an adequate security interest in other... safekeeping receipt for each security held for a customer in accordance with this section with the exception..., maturity date, par amount and coupon rate of the security being confirmed. The confirmation may be...

  3. 17 CFR 450.4 - Custodial holdings of government securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... efforts, is unable to provide the Federal Reserve Bank with an adequate security interest in other... safekeeping receipt for each security held for a customer in accordance with this section with the exception..., maturity date, par amount and coupon rate of the security being confirmed. The confirmation may be...

  4. 48 CFR 32.202-4 - Security for Government financing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Security for Government... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Commercial Item Purchase Financing 32.202-4 Security... Government to obtain adequate security for Government financing. The contracting officer shall specify in...

  5. A secure open system?

    NASA Astrophysics Data System (ADS)

    Crowe, James A.

    1993-08-01

    The notion of a large distributed computing system in support of a program like EOSDIS, carries with it the requirement that the system provide the user with guarantees about the integrity of the data and certain assurances about the security of the network of computing systems. This paper examines the challenges of providing a `secure' open system and how these challenges may be addressed from both an architectural as well as functional viewpoint. The role of discretionary access control, mandatory access control, and detection and control of computer viruses is discussed. It has often been observed that the role of the security engineer is one of restricting access to data, whereas the role of the system architect, of an open system that is encouraging research, should make data easy to obtain and utilize. This paradox is manifest in a system such a EOSDIS where to be useful, the systems data must be easy to obtain, but to ensure the integrity of the data it must exercise some level of security. This paper address the use and role of the Security Services of the OSF Distributed Computing Environment in support of networked applications, such as those that may be used in the implementation of the EOS Science Network. It further examines the role of mandatory access control mechanisms to provide data integrity guarantees. The paper further discusses how a system like EOSDIS may prevent computer viruses using a system of automated detection mechanisms and configuration control.

  6. 31 CFR 202.6 - Collateral security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... collateral security are addressed in 31 CFR part 380. For a current list of acceptable classes of securities and instruments described in 31 CFR part 380 and their valuations, see the Bureau of the Public Debt's... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Collateral security. 202.6 Section...

  7. 31 CFR 202.6 - Collateral security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... collateral security are addressed in 31 CFR part 380. For a current list of acceptable classes of securities and instruments described in 31 CFR part 380 and their valuations, see the Bureau of the Public Debt's... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Collateral security. 202.6...

  8. 31 CFR 202.6 - Collateral security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... collateral security are addressed in 31 CFR part 380. For a current list of acceptable classes of securities and instruments described in 31 CFR part 380 and their valuations, see the Bureau of the Public Debt's... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Collateral security. 202.6 Section...

  9. 31 CFR 202.6 - Collateral security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... collateral security are addressed in 31 CFR part 380. For a current list of acceptable classes of securities and instruments described in 31 CFR part 380 and their valuations, see the Bureau of the Public Debt's... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Collateral security. 202.6 Section...

  10. Safety, Security and Multicore

    NASA Astrophysics Data System (ADS)

    Parkinson, Paul

    Historically many safety-related and security-critical systems have been developed and qualified using single-core processors. These platforms could easily meet their increases in system performance requirements through higher processor clock speeds. However, the industry is now approaching the limit of relatively simple upgrade path, and there is an increasing trend towards the adoption of multicore processor architectures in critical systems to address higher performance demands. In this paper, we will review the challenges involved in migration to multicore processor architectures and the specific challenges related to their use in safety-critical and security-sensitive systems.

  11. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  12. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  13. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from National Strategy...

  14. Percentage of Adults with High Blood Pressure Whose Hypertension Is Adequately Controlled

    MedlinePlus

    ... is Adequately Controlled Percentage of Adults with High Blood Pressure Whose Hypertension is Adequately Controlled Heart disease ... Survey. Age Group Percentage of People with High Blood Pressure that is Controlled by Age Group f94q- ...

  15. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  16. ASIS healthcare security benchmarking study.

    PubMed

    2001-01-01

    Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented. PMID:11602980

  17. Double layer secure sketch

    NASA Astrophysics Data System (ADS)

    Li, Cai

    2012-09-01

    Secure sketch has been applied successfully in a wide variety of applications like cryptography, biometric authentication systems and so on. All of these secure sketches have properties in common namely error-tolerance and small entropy loss. The former ensures an input set w' can unlock the system if w' is substantially overlapped with a template set w while the latter means it is hard for an adversary to get the information of w even with the knowledge of s, which is produced by w and stored in the system publicly. In their constructions, they all consider w as a set of atomic elements. However, in the real word, it is very likely the elements in the template set are sets as well. In this paper, we propose a double layer secure sketch to address this issue.

  18. 21 CFR 514.117 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... production performance, or biased observation. One or more adequate and well-controlled studies are required... 21 Food and Drugs 6 2013-04-01 2013-04-01 false Adequate and well-controlled studies. 514.117... Applications § 514.117 Adequate and well-controlled studies. (a) Purpose. The primary purpose of...

  19. 21 CFR 514.117 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... production performance, or biased observation. One or more adequate and well-controlled studies are required... 21 Food and Drugs 6 2012-04-01 2012-04-01 false Adequate and well-controlled studies. 514.117... Applications § 514.117 Adequate and well-controlled studies. (a) Purpose. The primary purpose of...

  20. 21 CFR 514.117 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... production performance, or biased observation. One or more adequate and well-controlled studies are required... 21 Food and Drugs 6 2011-04-01 2011-04-01 false Adequate and well-controlled studies. 514.117... Applications § 514.117 Adequate and well-controlled studies. (a) Purpose. The primary purpose of...

  1. 21 CFR 514.117 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... production performance, or biased observation. One or more adequate and well-controlled studies are required... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Adequate and well-controlled studies. 514.117... Applications § 514.117 Adequate and well-controlled studies. (a) Purpose. The primary purpose of...

  2. 21 CFR 514.117 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... production performance, or biased observation. One or more adequate and well-controlled studies are required... 21 Food and Drugs 6 2014-04-01 2014-04-01 false Adequate and well-controlled studies. 514.117... Applications § 514.117 Adequate and well-controlled studies. (a) Purpose. The primary purpose of...

  3. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  4. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  5. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  6. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  7. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  8. 76 FR 51041 - Hemoglobin Standards and Maintaining Adequate Iron Stores in Blood Donors; Public Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ... HUMAN SERVICES Food and Drug Administration Hemoglobin Standards and Maintaining Adequate Iron Stores in... Standards and Maintaining Adequate Iron Stores in Blood Donors.'' The purpose of this public workshop is to... donor safety and blood availability, and potential measures to maintain adequate iron stores in...

  9. 36 CFR 13.960 - Who determines when there is adequate snow cover?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... adequate snow cover? 13.960 Section 13.960 Parks, Forests, and Public Property NATIONAL PARK SERVICE... Preserve Snowmachine (snowmobile) Operations § 13.960 Who determines when there is adequate snow cover? The superintendent will determine when snow cover is adequate for snowmachine use. The superintendent will follow...

  10. 36 CFR 13.960 - Who determines when there is adequate snow cover?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... adequate snow cover? 13.960 Section 13.960 Parks, Forests, and Public Property NATIONAL PARK SERVICE... Preserve Snowmachine (snowmobile) Operations § 13.960 Who determines when there is adequate snow cover? The superintendent will determine when snow cover is adequate for snowmachine use. The superintendent will follow...

  11. 36 CFR 13.960 - Who determines when there is adequate snow cover?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... adequate snow cover? 13.960 Section 13.960 Parks, Forests, and Public Property NATIONAL PARK SERVICE... Preserve Snowmachine (snowmobile) Operations § 13.960 Who determines when there is adequate snow cover? The superintendent will determine when snow cover is adequate for snowmachine use. The superintendent will follow...

  12. 36 CFR 13.960 - Who determines when there is adequate snow cover?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... adequate snow cover? 13.960 Section 13.960 Parks, Forests, and Public Property NATIONAL PARK SERVICE... Preserve Snowmachine (snowmobile) Operations § 13.960 Who determines when there is adequate snow cover? The superintendent will determine when snow cover is adequate for snowmachine use. The superintendent will follow...

  13. 36 CFR 13.960 - Who determines when there is adequate snow cover?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... adequate snow cover? 13.960 Section 13.960 Parks, Forests, and Public Property NATIONAL PARK SERVICE... Preserve Snowmachine (snowmobile) Operations § 13.960 Who determines when there is adequate snow cover? The superintendent will determine when snow cover is adequate for snowmachine use. The superintendent will follow...

  14. 17 CFR 230.154 - Delivery of prospectuses to investors at the same address.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... prospectus under the federal securities laws, for purposes of sections 5(b) and 2(a)(10) of the Act (15 U.S.C...; (iii) State the duration of the consent; (iv) Explain how an investor can revoke consent; (v) State... investors at the same address. 230.154 Section 230.154 Commodity and Securities Exchanges SECURITIES...

  15. 17 CFR 248.202 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Duties of card issuers regarding changes of address. 248.202 Section 248.202 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S-ID Regulation S-ID: Identity Theft Red...

  16. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  17. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  18. Nuclear Safeguards Infrastructure Development and Integration with Safety and Security

    SciTech Connect

    Kovacic, Donald N; Raffo-Caiado, Ana Claudia; McClelland-Kerr, John; Van sickle, Matthew; Bissani, Mo

    2009-01-01

    Faced with increasing global energy demands, many developing countries are considering building their first nuclear power plant. As a country embarks upon or expands its nuclear power program, it should consider how it will address the 19 issues laid out in the International Atomic Energy Agency (IAEA) document Milestones in Development of a National Infrastructure for Nuclear Power. One of those issues specifically addresses the international nonproliferation treaties and commitments and the implementation of safeguards to prevent diversion of nuclear material from peaceful purposes to nuclear weapons. Given the many legislative, economic, financial, environmental, operational, and other considerations preoccupying their planners, it is often difficult for countries to focus on developing the core strengths needed for effective safeguards implementation. Typically, these countries either have no nuclear experience or it is limited to the operation of research reactors used for radioisotope development and scientific research. As a result, their capacity to apply safeguards and manage fuel operations for a nuclear power program is limited. This paper argues that to address the safeguards issue effectively, a holistic approach must be taken to integrate safeguards with the other IAEA issues including safety and security - sometimes referred to as the '3S' concept. Taking a holistic approach means that a country must consider safeguards within the context of its entire nuclear power program, including operations best practices, safety, and security as well as integration with its larger nonproliferation commitments. The Department of Energy/National Nuclear Security Administration's International Nuclear Safeguards and Engagement Program (INSEP) has been involved in bilateral technical cooperation programs for over 20 years to promote nonproliferation and the peaceful uses of nuclear energy. INSEP is currently spearheading efforts to promote the development of

  19. 2014 ASHG Awards and Addresses

    PubMed Central

    2015-01-01

    Each year at the annual meeting of The American Society of Human Genetics (ASHG), addresses are given in honor of The Society and a number of award winners. A summary of each of these addresses is given below. On the following pages, we have printed the presidential address and the addresses for the William Allan Award, the Curt Stern Award, and the Victor A. McKusick Leadership Award. Webcasts of these addresses, as well as those of many other presentations, can be found at http://www.ashg.org.

  20. 2013 ASHG Awards and Addresses

    PubMed Central

    2014-01-01

    Each year at the annual meeting of The American Society of Human Genetics (ASHG), addresses are given in honor of The Society and a number of award winners. A summary of each of these addresses is given below. On the following pages, we have printed the Presidential Address and the addresses for the William Allan Award, the Curt Stern Award, and the Victor A. McKusick Leadership Award. Webcasts of these addresses, as well as those of many other presentations, can be found at http://www.ashg.org.

  1. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  2. 45 CFR 2508.10 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Corporation. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked metal filing cabinet. Some systems of records are not of such... not under the personal control of an authorized person, such information must be stored in a locked...

  3. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... access by persons within or outside the Endowment. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked metal filing cabinet. Some... the personal control of an authorized person, such information must be stored in a locked or...

  4. 45 CFR 2508.10 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Corporation. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked metal filing cabinet. Some systems of records are not of such... not under the personal control of an authorized person, such information must be stored in a locked...

  5. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access by persons within or outside the Endowment. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked metal filing cabinet. Some... the personal control of an authorized person, such information must be stored in a locked or...

  6. 45 CFR 2508.10 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Corporation. (2) All records, when not under the personal control of the employees authorized to use the records, must be stored in a locked metal filing cabinet. Some systems of records are not of such... not under the personal control of an authorized person, such information must be stored in a locked...

  7. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  8. School Security: For Whom and with What Results?

    ERIC Educational Resources Information Center

    Servoss, Timothy J.; Finn, Jeremy D.

    2014-01-01

    This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…

  9. The rat adequately reflects human responses to exercise in blood biochemical profile: a comparative study.

    PubMed

    Goutianos, Georgios; Tzioura, Aikaterini; Kyparos, Antonios; Paschalis, Vassilis; Margaritelis, Nikos V; Veskoukis, Aristidis S; Zafeiridis, Andreas; Dipla, Konstantina; Nikolaidis, Michalis G; Vrabas, Ioannis S

    2015-02-01

    Animal models are widely used in biology and the findings of animal research are traditionally projected to humans. However, recent publications have raised concerns with regard to what extent animals and humans respond similar to physiological stimuli. Original data on direct in vivo comparison between animals and humans are scarce and no study has addressed this issue after exercise. We aimed to compare side by side in the same experimental setup rat and human responses to an acute exercise bout of matched intensity and duration. Rats and humans ran on a treadmill at 86% of maximal velocity until exhaustion. Pre and post exercise we measured 30 blood chemistry parameters, which evaluate iron status, lipid profile, glucose regulation, protein metabolism, liver, and renal function. ANOVA indicated that almost all biochemical parameters followed a similar alteration pattern post exercise in rats and humans. In fact, there were only 2/30 significant species × exercise interactions (in testosterone and globulins), indicating different responses to exercise between rats and humans. On the contrary, the main effect of exercise was significant in 15/30 parameters and marginally nonsignificant in other two parameters (copper, P = 0.060 and apolipoprotein B, P = 0.058). Our major finding is that the rat adequately mimics human responses to exercise in those basic blood biochemical parameters reported here. The physiological resemblance of rat and human blood responses after exercise to exhaustion on a treadmill indicates that the use of blood chemistry in rats for exercise physiology research is justified. PMID:25677548

  10. Presidential address, 2001. Advice to young surgeons

    PubMed Central

    MacFarlane, John K.

    2002-01-01

    In his 2001 presidential address to the Canadian Association of General Surgeons, the author offers advice to young surgeons, based on his lifetime experience as a surgical educator, researcher and practitioner. He offers the following samples of wisdom for young surgeons: they should be prepared for a lifetime of learning and be willing and able to adapt to new advances; they should listen to their patients as they describe their presenting complaints and not be tempted to interrupt; they should take time in an emergency situation and remember that split-second decisions can affect the patient for a lifetime; they should be willing to take advice from fellow professionals; they should take time to maintain a quality family life and take adequate time away from the workplace; they should be active be a role model in their community; and, finally, they should get involved and adopt an advocacy role in their profession. PMID:11939654

  11. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  12. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect

    Sweeney, D.J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  13. 46 CFR 14.103 - Addresses of Coast Guard.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Addresses of Coast Guard. 14.103 Section 14.103 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.103 Addresses of Coast Guard. (a) U.S. postal mail: U.S. Coast Guard National Maritime Center (NMC-42),...

  14. 46 CFR 14.103 - Addresses of Coast Guard.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Addresses of Coast Guard. 14.103 Section 14.103 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN SHIPMENT AND DISCHARGE OF MERCHANT MARINERS General § 14.103 Addresses of Coast Guard. (a) U.S. postal mail: U.S. Coast Guard National Maritime Center (NMC-42),...

  15. The adoption of IT security standards in a healthcare environment.

    PubMed

    Gomes, Rui; Lapão, Luís Velez

    2008-01-01

    Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls. PMID:18487824

  16. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  17. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... ] Executive Order 13629 of October 26, 2012 Establishing the White House Homeland Security Partnership Council... homeland security priorities. Partnerships are collaborative working relationships in which the goals... improve performance. Partnerships enhance our ability to address homeland security priorities,...

  18. NINJA: a noninvasive framework for internal computer security hardening

    NASA Astrophysics Data System (ADS)

    Allen, Thomas G.; Thomson, Steve

    2004-07-01

    Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive

  19. 76 FR 73777 - Guidance on Due Diligence Requirements in Determining Whether Investment Securities Are Eligible...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-29

    ... the issuer has an adequate capacity to meet the financial commitments under the security for the projected life of the investment. An issuer has an adequate capacity to meet financial commitments if the... financial commitments under the security for the projected life of the investment. An issuer has an...

  20. 33 CFR 174.125 - Coast Guard address.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Coast Guard address. 174.125 Section 174.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY STATE NUMBERING AND CASUALTY REPORTING SYSTEMS State Reports § 174.125 Coast Guard...

  1. 33 CFR 174.125 - Coast Guard address.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Coast Guard address. 174.125 Section 174.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY STATE NUMBERING AND CASUALTY REPORTING SYSTEMS State Reports § 174.125 Coast Guard...

  2. 33 CFR 174.125 - Coast Guard address.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Coast Guard address. 174.125 Section 174.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY STATE NUMBERING AND CASUALTY REPORTING SYSTEMS State Reports § 174.125 Coast Guard...

  3. 33 CFR 174.125 - Coast Guard address.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Coast Guard address. 174.125 Section 174.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY STATE NUMBERING AND CASUALTY REPORTING SYSTEMS State Reports § 174.125 Coast Guard...

  4. 33 CFR 174.125 - Coast Guard address.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Coast Guard address. 174.125 Section 174.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY STATE NUMBERING AND CASUALTY REPORTING SYSTEMS State Reports § 174.125 Coast Guard...

  5. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema

    Eric Isaccs

    2010-01-08

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  6. 33 CFR 67.35-15 - To whom addressed.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false To whom addressed. 67.35-15 Section 67.35-15 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-15 To...

  7. 33 CFR 67.35-15 - To whom addressed.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false To whom addressed. 67.35-15 Section 67.35-15 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-15 To...

  8. 33 CFR 67.35-15 - To whom addressed.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false To whom addressed. 67.35-15 Section 67.35-15 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-15 To...

  9. 33 CFR 67.35-15 - To whom addressed.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false To whom addressed. 67.35-15 Section 67.35-15 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-15 To...

  10. 33 CFR 67.35-15 - To whom addressed.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false To whom addressed. 67.35-15 Section 67.35-15 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-15 To...

  11. Argonne Director Eric Isaacs addresses the National Press Club

    SciTech Connect

    Eric Isaccs

    2009-09-17

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  12. Multi-cultural network security

    SciTech Connect

    Stevens, D.F.

    1996-04-01

    Education and awareness are widely acknowledged to be among the fundamental issues of Internet security, but only in the sense of making Internet users more security conscious. For the Internet to achieve its promise as an information highway, however, a complementary education effort is needed. If adequate Internet security is to be achieved, we must also increase the awareness of the professional security community of the requirements, attitudes, and habits of the many different cultures that participate in the Internet. Discussions of {open_quotes}the Internet{close_quotes} encourage the misapprehension that there is a single, uniform user community instead of a loose alliance of many cultures that differ in many fundamental aspects. This is true even if we limit our consideration to ethical cultures. At this Workshop alone we have representatives of administrative and military cultures, Governmental and commercial cultures, profit-cultures and non-profit cultures, research and operational cultures. Internet cultures are united in their desire to exploit the connectivity, flexibility, and rapidity of communication provided by the net, but differ greatly in their motivations, their attitudes towards authority, their willingness to cooperate within their own communities, their interest in technical arcana, and the patience with which they will put up with - or the enthusiasm with which they will embrace - the growing list of procedures deemed necessary for acceptable security. They even differ in how they define {open_quotes}acceptable security{close_quotes}.

  13. Los Alamos Center for Computer Security formal computer security model

    SciTech Connect

    Dreicer, J.S.; Hunteman, W.J.; Markin, J.T.

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The need to test and verify DOE computer security policy implementation first motivated this effort. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present formal mathematical models for computer security. The fundamental objective of computer security is to prevent the unauthorized and unaccountable access to a system. The inherent vulnerabilities of computer systems result in various threats from unauthorized access. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The model is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell and LaPadula abstract sets of objects and subjects. 6 refs.

  14. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  15. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  16. Securing smart grid technology

    NASA Astrophysics Data System (ADS)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  17. Emotional Experiences of Obese Women with Adequate Gestational Weight Variation: A Qualitative Study

    PubMed Central

    Faria-Schützer, Débora Bicudo; Surita, Fernanda Garanhani de Castro; Alves, Vera Lucia Pereira; Vieira, Carla Maria; Turato, Egberto Ribeiro

    2015-01-01

    Background As a result of the growth of the obese population, the number of obese women of fertile age has increased in the last few years. Obesity in pregnancy is related to greater levels of anxiety, depression and physical harm. However, pregnancy is an opportune moment for the intervention of health care professionals to address obesity. The objective of this study was to describe how obese pregnant women emotionally experience success in adequate weight control. Methods and Findings Using a qualitative design that seeks to understand content in the field of health, the sample of subjects was deliberated, with thirteen obese pregnant women selected to participate in an individual interview. Data was analysed by inductive content analysis and includes complete transcription of the interviews, re-readings using suspended attention, categorization in discussion topics and the qualitative and inductive analysis of the content. The analysis revealed four categories, three of which show the trajectory of body care that obese women experience during pregnancy: 1) The obese pregnant woman starts to think about her body;2) The challenge of the diet for the obese pregnant woman; 3) The relation of the obese pregnant woman with the team of antenatal professionals. The fourth category reveals the origin of the motivation for the change: 4) The potentializing factors for change: the motivation of the obese woman while pregnant. Conclusions During pregnancy, obese women are more in touch with themselves and with their emotional conflicts. Through the transformations of their bodies, women can start a more refined self-care process and experience of the body-mind unit. The fear for their own and their baby's life, due to the risks posed by obesity, appears to be a great potentializing factor for change. The relationship with the professionals of the health care team plays an important role in the motivational support of the obese pregnant woman. PMID:26529600

  18. The rat adequately reflects human responses to exercise in blood biochemical profile: a comparative study

    PubMed Central

    Goutianos, Georgios; Tzioura, Aikaterini; Kyparos, Antonios; Paschalis, Vassilis; Margaritelis, Nikos V; Veskoukis, Aristidis S; Zafeiridis, Andreas; Dipla, Konstantina; Nikolaidis, Michalis G; Vrabas, Ioannis S

    2015-01-01

    Animal models are widely used in biology and the findings of animal research are traditionally projected to humans. However, recent publications have raised concerns with regard to what extent animals and humans respond similar to physiological stimuli. Original data on direct in vivo comparison between animals and humans are scarce and no study has addressed this issue after exercise. We aimed to compare side by side in the same experimental setup rat and human responses to an acute exercise bout of matched intensity and duration. Rats and humans ran on a treadmill at 86% of maximal velocity until exhaustion. Pre and post exercise we measured 30 blood chemistry parameters, which evaluate iron status, lipid profile, glucose regulation, protein metabolism, liver, and renal function. ANOVA indicated that almost all biochemical parameters followed a similar alteration pattern post exercise in rats and humans. In fact, there were only 2/30 significant species × exercise interactions (in testosterone and globulins), indicating different responses to exercise between rats and humans. On the contrary, the main effect of exercise was significant in 15/30 parameters and marginally nonsignificant in other two parameters (copper, P = 0.060 and apolipoprotein B, P = 0.058). Our major finding is that the rat adequately mimics human responses to exercise in those basic blood biochemical parameters reported here. The physiological resemblance of rat and human blood responses after exercise to exhaustion on a treadmill indicates that the use of blood chemistry in rats for exercise physiology research is justified. PMID:25677548

  19. Applying evolutionary biology to address global challenges

    PubMed Central

    Carroll, Scott P.; Jørgensen, Peter Søgaard; Kinnison, Michael T.; Bergstrom, Carl T.; Denison, R. Ford; Gluckman, Peter; Smith, Thomas B.; Strauss, Sharon Y.; Tabashnik, Bruce E.

    2014-01-01

    Two categories of evolutionary challenges result from escalating human impacts on the planet. The first arises from cancers, pathogens and pests that evolve too quickly, and the second from the inability of many valued species to adapt quickly enough. Applied evolutionary biology provides a suite of strategies to address these global challenges that threaten human health, food security, and biodiversity. This review highlights both progress and gaps in genetic, developmental and environmental manipulations across the life sciences that either target the rate and direction of evolution, or reduce the mismatch between organisms and human-altered environments. Increased development and application of these underused tools will be vital in meeting current and future targets for sustainable development. PMID:25213376

  20. Applying evolutionary biology to address global challenges.

    PubMed

    Carroll, Scott P; Jørgensen, Peter Søgaard; Kinnison, Michael T; Bergstrom, Carl T; Denison, R Ford; Gluckman, Peter; Smith, Thomas B; Strauss, Sharon Y; Tabashnik, Bruce E

    2014-10-17

    Two categories of evolutionary challenges result from escalating human impacts on the planet. The first arises from cancers, pathogens, and pests that evolve too quickly and the second, from the inability of many valued species to adapt quickly enough. Applied evolutionary biology provides a suite of strategies to address these global challenges that threaten human health, food security, and biodiversity. This Review highlights both progress and gaps in genetic, developmental, and environmental manipulations across the life sciences that either target the rate and direction of evolution or reduce the mismatch between organisms and human-altered environments. Increased development and application of these underused tools will be vital in meeting current and future targets for sustainable development. PMID:25213376

  1. 21 CFR 314.126 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...-evident (general anesthetics, drug metabolism). (3) The method of selection of subjects provides adequate... respect to pertinent variables such as age, sex, severity of disease, duration of disease, and use of... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Adequate and well-controlled studies....

  2. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  3. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  4. Calculation of the Cost of an Adequate Education in Kentucky: A Professional Judgment Approach

    ERIC Educational Resources Information Center

    Verstegen, Deborah A.

    2004-01-01

    What is an adequate education and how much does it cost? In 1989, Kentucky's State Supreme Court found the entire system of education unconstitutional--"all of its parts and parcels". The Court called for all children to have access to an adequate education, one that is uniform and has as its goal the development of seven capacities, including:…

  5. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Attending veterinarian and adequate veterinary care. 2.33 Section 2.33 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Research Facilities § 2.33 Attending veterinarian and adequate veterinary care. (a)...

  6. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Attending veterinarian and adequate veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Attending Veterinarian and Adequate Veterinary Care §...

  7. 75 FR 69648 - Safety Analysis Requirements for Defining Adequate Protection for the Public and the Workers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... SAFETY BOARD Safety Analysis Requirements for Defining Adequate Protection for the Public and the Workers... TO THE SECRETARY OF ENERGY Safety Analysis Requirements for Defining Adequate Protection for the... safety analysis, or DSA, is to be prepared for every DOE nuclear facility. This DSA, once approved by...

  8. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 3 2012-10-01 2012-10-01 false Adequate financial records, statistical data, and....568 Adequate financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination...

  9. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 3 2013-10-01 2013-10-01 false Adequate financial records, statistical data, and....568 Adequate financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination...

  10. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 3 2014-10-01 2014-10-01 false Adequate financial records, statistical data, and....568 Adequate financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination...

  11. Strengthening the Security of ESA Ground Data Systems

    NASA Astrophysics Data System (ADS)

    Flentge, Felix; Eggleston, James; Garcia Mateos, Marc

    2013-08-01

    A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.

  12. How To Secure E-Rate Funding.

    ERIC Educational Resources Information Center

    Dietrich, Donald

    2003-01-01

    Describes how to secure E-Rate funding from the Universal Service Administrative Company's School and Libraries Division (SLD) to help school districts obtain telecommunications and Internet access. The SLD Web site address is www.sl.universalservice.org. (PKP)

  13. 7 CFR 1735.22 - Loan security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... security therefor is reasonably adequate and the loan will be repaid within the time agreed. See 7 CFR 1735.18 and 7 CFR 1735.51. (b) RUS generally requires that borrowers provide it with a first lien on all of the borrower's property. See 7 CFR 1735.46. (c) The RUS will consider Government-imposed...

  14. 7 CFR 1735.22 - Loan security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... security therefor is reasonably adequate and the loan will be repaid within the time agreed. See 7 CFR 1735.18 and 7 CFR 1735.51. (b) RUS generally requires that borrowers provide it with a first lien on all of the borrower's property. See 7 CFR 1735.46. (c) The RUS will consider Government-imposed...

  15. 7 CFR 1735.22 - Loan security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security therefor is reasonably adequate and the loan will be repaid within the time agreed. See 7 CFR 1735.18 and 7 CFR 1735.51. (b) RUS generally requires that borrowers provide it with a first lien on all of the borrower's property. See 7 CFR 1735.46. (c) In the case of loans that include the financing...

  16. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  17. 7 CFR 1735.22 - Loan security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... security therefor is reasonably adequate and the loan will be repaid within the time agreed. See 7 CFR 1735.18 and 7 CFR 1735.51. (b) RUS generally requires that borrowers provide it with a first lien on all of the borrower's property. See 7 CFR 1735.46. (c) The RUS will consider Government-imposed...

  18. 7 CFR 1735.22 - Loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security therefor is reasonably adequate and the loan will be repaid within the time agreed. See 7 CFR 1735.18 and 7 CFR 1735.51. (b) RUS generally requires that borrowers provide it with a first lien on all of the borrower's property. See 7 CFR 1735.46. (c) In the case of loans that include the financing...

  19. Bovine hemoglobin as the sole source of dietary iron does not support adequate iron status in copper-adequate or copper-deficient rats

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This experiment was designed to determine whether hemoglobin as the sole source of dietary iron (Fe) could sustain normal Fe status in growing rats. Because adequate copper (Cu) status is required for efficient Fe absorption in the rat, we also determined the effects of Cu deficiency on Fe status of...

  20. 48 CFR 32.202-4 - Security for Government financing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contractor assets of adequate worth. (e) Management of risk and security. In establishing contract financing... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Security for Government... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Commercial Item Purchase Financing 32.202-4...

  1. 48 CFR 832.202-4 - Security for Government financing.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Security for Government... for Government financing. An offeror's financial condition may be considered adequate security to protect the Government's interest when the Government provides contract financing. In assessing...

  2. 48 CFR 832.202-4 - Security for Government financing.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Security for Government... for Government financing. An offeror's financial condition may be considered adequate security to protect the Government's interest when the Government provides contract financing. In assessing...

  3. 48 CFR 832.202-4 - Security for Government financing.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Security for Government... for Government financing. An offeror's financial condition may be considered adequate security to protect the Government's interest when the Government provides contract financing. In assessing...

  4. 48 CFR 832.202-4 - Security for Government financing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Security for Government... for Government financing. An offeror's financial condition may be considered adequate security to protect the Government's interest when the Government provides contract financing. In assessing...

  5. What's Ahead for Campus Security?

    ERIC Educational Resources Information Center

    Queeno, Cam

    2000-01-01

    Identifies five trends in security technology and what they mean for colleges and universities in the near future. Trends addressed are: less emphasis on complete system integration; increased prevalence of open networking protocol systems; rising use of proximity and smart cards; increased use of digital technology and remote video surveillance;…

  6. Dynamic security assessment processing system

    NASA Astrophysics Data System (ADS)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  7. Barriers to creating a secure MPI

    SciTech Connect

    Brightwell, R.; Greenberg, D.S.; Matt, B.J.; Davida, G.I.

    1997-08-01

    This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

  8. Secure and interoperable communication infrastructures for PPDR organisations

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  9. Security Services Discovery by ATM Endsystems

    SciTech Connect

    Sholander, Peter; Tarman, Thomas

    1999-07-15

    This contribution proposes strawman techniques for Security Service Discovery by ATM endsystems in ATM networks. Candidate techniques include ILMI extensions, ANS extensions and new ATM anycast addresses. Another option is a new protocol based on an IETF service discovery protocol, such as Service Location Protocol (SLP). Finally, this contribution provides strawman requirements for Security-Based Routing in ATM networks.

  10. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  11. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    ERIC Educational Resources Information Center

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  12. Linking hospital security to customer service: making the case for 'world class' security.

    PubMed

    Hill, Scott A

    2011-01-01

    The reluctance of many hospitals today to invest money and resources into security and safety while at the same time promoting customer good will is a fallacy that has to be corrected, according to the author. He demonstrates how high customer satisfaction scores, as well as regulatory compliance, can only be achieved if a hospital takes the steps necessary to provide adequate safety and security to patients, visitors, physicians and to all who come to the hospital. PMID:21916286

  13. Inferential Processing among Adequate and Struggling Adolescent Comprehenders and Relations to Reading Comprehension

    PubMed Central

    Barth, Amy E.; Barnes, Marcia; Francis, David J.; Vaughn, Sharon; York, Mary

    2015-01-01

    Separate mixed model analyses of variance (ANOVA) were conducted to examine the effect of textual distance on the accuracy and speed of text consistency judgments among adequate and struggling comprehenders across grades 6–12 (n = 1203). Multiple regressions examined whether accuracy in text consistency judgments uniquely accounted for variance in comprehension. Results suggest that there is considerable growth across the middle and high school years, particularly for adequate comprehenders in those text integration processes that maintain local coherence. Accuracy in text consistency judgments accounted for significant unique variance for passage-level, but not sentence-level comprehension, particularly for adequate comprehenders. PMID:26166946

  14. NERSC Cyber Security Challenges That Require DOE Development andSupport

    SciTech Connect

    Draney, Brent; Campbell, Scott; Walter, Howard

    2007-01-16

    Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

  15. A life-cycle approach to food and nutrition security in India.

    PubMed

    Rai, Rajesh Kumar; Kumar, Sandhya; Sekher, Madhushree; Pritchard, Bill; Rammohan, Anu

    2015-04-01

    India's poor performance on critical food and nutrition security indicators despite substantial economic prosperity has been widely documented. These failings not only hamper national progress, but also contribute significantly to the global undernourished population, particularly children. While the recently passed National Food Security Act 2013 adopts a life-cycle approach to expand coverage of subsidized food grains to the most vulnerable households and address food security, there remains much to be desired in the legislation. Access to adequate food for 1.24 billion people is a multifaceted problem requiring an interconnected set of policy measures to tackle the various factors affecting food and nutrition security in India. In the present opinion paper, we discuss a fivefold strategy that incorporates a life-cycle approach, spanning reproductive health, bolstering citizen participation in existing national programmes, empowering women, advancing agriculture and better monitoring the Public Distribution System in order to fill the gaps in both access and adequacy of food and nutrition. PMID:24866692

  16. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  17. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  18. Addressing problems of employee performance.

    PubMed

    McConnell, Charles R

    2011-01-01

    Employee performance problems are essentially of 2 kinds: those that are motivational in origin and those resulting from skill deficiencies. Both kinds of problems are the province of the department manager. Performance problems differ from problems of conduct in that traditional disciplinary processes ordinarily do not apply. Rather, performance problems are addressed through educational and remedial processes. The manager has a basic responsibility in ensuring that everything reasonable is done to help each employee succeed. There are a number of steps the manager can take to address employee performance problems. PMID:21537142

  19. Addressing the Need for Independence in the CSE Model

    SciTech Connect

    Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T; Grimaila, Michael R

    2011-01-01

    Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.

  20. Barriers to help-seeking, detection, and adequate treatment for anxiety and mood disorders: implications for health care policy.

    PubMed

    Mechanic, David

    2007-01-01

    Recently, the focus of health policies and initiatives has been directed toward mental health. More precisely, depressive and anxiety disorders have received particular attention because of their disabling outcomes and prevalence among most populations. Despite this increased interest, numerous issues regarding patients' willingness to seek treatment and the adequate recognition and treatment of these disorders by clinicians remain to be addressed. This article considers the factors that influence patients and physicians in their reticence to acknowledge and adequately treat depression and anxiety disorders. It also reviews the impact of society and the media, together with other factors relating to health care organization and administration that affect the treatment of depression and anxiety. In view of the multifaceted challenge involved, efforts to achieve a consensus in determining treatment for those with depressive and anxiety disorders are essential. A consensus will require easy, measurable, and reliable disability indicators; evidence that treatment of patients with varying levels of need is cost effective; and that persons who most need and would benefit from care can be reliably identified among the highly prevalent population of persons with more transient symptoms. Governments and other policymakers should be encouraged to provide appropriate coverage for access to primary and secondary care, the treatments required, and sufficient resources so that care is available when necessary. An important aspect of the challenge is to incorporate these efforts within the realistic constraints of primary care. PMID:17288503

  1. Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study.

    PubMed

    Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy

    2015-01-01

    This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology. PMID:25868685

  2. Addressing Phonological Questions with Ultrasound

    ERIC Educational Resources Information Center

    Davidson, Lisa

    2005-01-01

    Ultrasound can be used to address unresolved questions in phonological theory. To date, some studies have shown that results from ultrasound imaging can shed light on how differences in phonological elements are implemented. Phenomena that have been investigated include transitional schwa, vowel coalescence, and transparent vowels. A study of…

  3. Communities Address Barriers to Connectivity.

    ERIC Educational Resources Information Center

    Byers, Anne

    1996-01-01

    Rural areas lag behind urban areas in access to information technologies. Public institutions play a critical role in extending the benefits of information technologies to those who would not otherwise have access. The most successful rural telecommunications plans address barriers to use, such as unawareness of the benefits, technophobia, the…

  4. Keynote Address: Rev. Mark Massa

    ERIC Educational Resources Information Center

    Massa, Mark S.

    2011-01-01

    Rev. Mark S. Massa, S.J., is the dean and professor of Church history at the School of Theology and Ministry at Boston College. He was invited to give a keynote to begin the third Catholic Higher Education Collaborative Conference (CHEC), cosponsored by Boston College and Fordham University. Fr. Massa's address posed critical questions about…

  5. State of the Lab Address

    ScienceCinema

    King, Alex

    2013-03-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  6. State of the Lab Address

    SciTech Connect

    King, Alex

    2010-01-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  7. 25 CFR 162.435 - What forms of security are acceptable under a business lease?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... WATER LEASES AND PERMITS Business Leases Bonding and Insurance § 162.435 What forms of security are... 25 Indians 1 2013-04-01 2013-04-01 false What forms of security are acceptable under a business... alternative form of security approved by us that provides adequate protection for the Indian landowners and...

  8. 25 CFR 162.435 - What forms of security are acceptable under a business lease?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... WATER LEASES AND PERMITS Business Leases Bonding and Insurance § 162.435 What forms of security are... 25 Indians 1 2014-04-01 2014-04-01 false What forms of security are acceptable under a business... alternative form of security approved by us that provides adequate protection for the Indian landowners and...

  9. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration When I fly can I bring my... ... to know if you could bring through the security checkpoint. Main menu Administrator Travel Security Screening Special ...

  10. Emergency preparedness: addressing a residency training gap.

    PubMed

    Uddin, Sayeedha Ghori; Barnett, Daniel J; Parker, Cindy L; Links, Jonathan M; Alexander, Miriam

    2008-03-01

    As the importance of physician involvement and leadership in crisis preparedness is recognized, the literature suggests that few physicians are adequately trained to practice effectively in a large-scale crisis situation. A logical method for addressing the emergency preparedness training deficiency identified across several medical specialties is to include disaster and emergency preparedness training in residency curricula. In this article, the authors outline the development and implementation of an emergency preparedness curriculum for the Johns Hopkins General Preventive Medicine Residency (JHGPMR) from 2004 to 2006. The curriculum consists of two components. The first was developed for the academic year in the JHGPMR and includes didactic lectures, practical exercises to apply new knowledge, and an opportunity to integrate the knowledge and skills in a real-world exercise. The second, developed for the practicum year of the residency, includes Web-based lectures and online content and culminates in a tabletop preparedness exercise. Topics for both components include weapons of mass destruction, risk communication and personal preparedness, aspects of local emergency response planning, and mental health and psychological aspects of terrorism. On the basis of the emergency preparedness training gap that has been identified in the literature, and the success of the three-year experience in implementing a preparedness training curriculum in the JHGPMR, the authors recommend incorporation of competency-based emergency preparedness training for residencies of all specialties, and offer insights into how the described curriculum could be adapted for use in other residency settings. PMID:18316882

  11. 17 CFR 3.30 - Current address for purpose of delivery of communications from the Commission or the National...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Current address for purpose of delivery of communications from the Commission or the National Futures Association. 3.30 Section 3.30 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGISTRATION Registration § 3.30 Current address for purpose of delivery...

  12. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts. PMID:22592944

  13. 5 CFR 9701.408 - Developing performance and addressing poor performance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Developing performance and addressing poor performance. 9701.408 Section 9701.408 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL...

  14. 39 CFR 267.4 - Information security standards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Information security standards. 267.4 Section 267... INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of information security standards which address the following functional aspects of information flow...

  15. SEED: A Suite of Instructional Laboratories for Computer Security Education

    ERIC Educational Resources Information Center

    Du, Wenliang; Wang, Ronghua

    2008-01-01

    The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…

  16. 77 FR 11385 - Security Considerations for Lavatory Oxygen Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-27

    ... (Amendment Nos. 21-94, 25-133, 121-354, 129-50; SFAR 111) on security considerations for lavatory oxygen systems (77 FR 12550). The interim final rule addresses a security vulnerability and is needed so the...-94, 25-133, 121-354, 129-50; SFAR 111] RIN 2120-AJ92 Security Considerations for Lavatory...

  17. 39 CFR 267.4 - Information security standards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 39 Postal Service 1 2011-07-01 2011-07-01 false Information security standards. 267.4 Section 267... INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of information security standards which address the following functional aspects of information flow...

  18. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  19. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  20. Climate change impact assessment on food security in Indonesia

    NASA Astrophysics Data System (ADS)

    Ettema, Janneke; Aldrian, Edvin; de Bie, Kees; Jetten, Victor; Mannaerts, Chris

    2013-04-01

    As Indonesia is the world's fourth most populous country, food security is a persistent challenge. The potential impact of future climate change on the agricultural sector needs to be addressed in order to allow early implementation of mitigation strategies. The complex island topography and local sea-land-air interactions cannot adequately be represented in large scale General Climate Models (GCMs) nor visualized by TRMM. Downscaling is needed. Using meteorological observations and a simple statistical downscaling tool, local future projections are derived from state-of-the-art, large-scale GCM scenarios, provided by the CMIP5 project. To support the agriculture sector, providing information on especially rainfall and temperature variability is essential. Agricultural production forecast is influenced by several rain and temperature factors, such as rainy and dry season onset, offset and length, but also by daily and monthly minimum and maximum temperatures and its rainfall amount. A simple and advanced crop model will be used to address the sensitivity of different crops to temperature and rainfall variability, present-day and future. As case study area, Java Island is chosen as it is fourth largest island in Indonesia but contains more than half of the nation's population and dominates it politically and economically. The objective is to identify regions at agricultural risk due to changing patterns in precipitation and temperature.

  1. Security engineering: systems engineering of security through the adaptation and application of risk management

    NASA Technical Reports Server (NTRS)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  2. Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing

    ERIC Educational Resources Information Center

    Ilvonen, Ilona

    2013-01-01

    Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…

  3. Addressing the vaccine confidence gap.

    PubMed

    Larson, Heidi J; Cooper, Louis Z; Eskola, Juhani; Katz, Samuel L; Ratzan, Scott

    2011-08-01

    Vaccines--often lauded as one of the greatest public health interventions--are losing public confidence. Some vaccine experts have referred to this decline in confidence as a crisis. We discuss some of the characteristics of the changing global environment that are contributing to increased public questioning of vaccines, and outline some of the specific determinants of public trust. Public decision making related to vaccine acceptance is neither driven by scientific nor economic evidence alone, but is also driven by a mix of psychological, sociocultural, and political factors, all of which need to be understood and taken into account by policy and other decision makers. Public trust in vaccines is highly variable and building trust depends on understanding perceptions of vaccines and vaccine risks, historical experiences, religious or political affiliations, and socioeconomic status. Although provision of accurate, scientifically based evidence on the risk-benefit ratios of vaccines is crucial, it is not enough to redress the gap between current levels of public confidence in vaccines and levels of trust needed to ensure adequate and sustained vaccine coverage. We call for more research not just on individual determinants of public trust, but on what mix of factors are most likely to sustain public trust. The vaccine community demands rigorous evidence on vaccine efficacy and safety and technical and operational feasibility when introducing a new vaccine, but has been negligent in demanding equally rigorous research to understand the psychological, social, and political factors that affect public trust in vaccines. PMID:21664679

  4. A method for determining adequate resistance form of complete cast crown preparations.

    PubMed

    Weed, R M; Baez, R J

    1984-09-01

    A diagram with various degrees of occlusal convergence, which takes into consideration the length and diameter of complete crown preparations, was designed as a guide to assist the dentist to obtain adequate resistance form. To test the validity of the diagram, five groups of complete cast crown stainless steel dies were prepared (3.5 mm long, occlusal convergence 10, 13, 16, 19, and 22 degrees). Gold copings were cast for each of the 50 preparations. Displacement force was applied to the casting perpendicularly to a simulated 30-degree cuspal incline until the casting was displaced. Castings were deformed at margins except for the 22-degree group. Castings from this group were displaced without deformation, and it was concluded that there was a lack of adequate resistance form as predicted by the diagram. The hypothesis that the diagram could be used to predict adequate or inadequate resistance form was confirmed by this study. PMID:6384470

  5. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  6. Nanoscale content-addressable memory

    NASA Technical Reports Server (NTRS)

    Davis, Bryan (Inventor); Principe, Jose C. (Inventor); Fortes, Jose (Inventor)

    2009-01-01

    A combined content addressable memory device and memory interface is provided. The combined device and interface includes one or more one molecular wire crossbar memories having spaced-apart key nanowires, spaced-apart value nanowires adjacent to the key nanowires, and configurable switches between the key nanowires and the value nanowires. The combination further includes a key microwire-nanowire grid (key MNG) electrically connected to the spaced-apart key nanowires, and a value microwire-nanowire grid (value MNG) electrically connected to the spaced-apart value nanowires. A key or value MNGs selects multiple nanowires for a given key or value.

  7. Identifying and Addressing Vaccine Hesitancy

    PubMed Central

    Kestenbaum, Lori A.; Feemster, Kristen A.

    2015-01-01

    In the 20th century, the introduction of multiple vaccines significantly reduced childhood morbidity, mortality, and disease outbreaks. Despite, and perhaps because of, their public health impact, an increasing number of parents and patients are choosing to delay or refuse vaccines. These individuals are described as vaccine hesitant. This phenomenon has developed due to the confluence of multiple social, cultural, political and personal factors. As immunization programs continue to expand, understanding and addressing vaccine hesitancy will be crucial to their successful implementation. This review explores the history of vaccine hesitancy, its causes, and suggested approaches for reducing hesitancy and strengthening vaccine acceptance. PMID:25875982

  8. Identifying and addressing vaccine hesitancy.

    PubMed

    Kestenbaum, Lori A; Feemster, Kristen A

    2015-04-01

    In the 20th century, the introduction of multiple vaccines significantly reduced childhood morbidity, mortality, and disease outbreaks. Despite, and perhaps because of, their public health impact, an increasing number of parents and patients are choosing to delay or refuse vaccines. These individuals are described as "vaccine hesitant." This phenomenon has developed due to the confluence of multiple social, cultural, political, and personal factors. As immunization programs continue to expand, understanding and addressing vaccine hesitancy will be crucial to their successful implementation. This review explores the history of vaccine hesitancy, its causes, and suggested approaches for reducing hesitancy and strengthening vaccine acceptance. PMID:25875982

  9. Comparison of four standards for determining adequate water intake of nursing home residents.

    PubMed

    Gaspar, Phyllis M

    2011-01-01

    Adequate hydration for nursing home residents is problematic. The purpose of this study was to compare four standards used to determine a recommended water intake among nursing home residents. Inconsistencies in the amount of water intake recommended based on the standards compared were identified. The standard based on height and weight provides the most individualized recommendation. An individualized recommendation would facilitate goal setting for the care plan of each older person and assist in the prevention of dehydration. It is essential that a cost-effective and clinically feasible approach to determine adequate water intake be determined for this population to prevent the adverse outcomes associated with dehydration. PMID:21469538

  10. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking. PMID:25991144

  11. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  12. 5 CFR 9701.408 - Developing performance and addressing poor performance.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Developing performance and addressing poor performance. 9701.408 Section 9701.408 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY... Developing performance and addressing poor performance. (a) Subject to budgetary and other...

  13. 5 CFR 9701.408 - Developing performance and addressing poor performance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Developing performance and addressing poor performance. 9701.408 Section 9701.408 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY... Developing performance and addressing poor performance. (a) Subject to budgetary and other...

  14. 5 CFR 9701.408 - Developing performance and addressing poor performance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Developing performance and addressing poor performance. 9701.408 Section 9701.408 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY... Developing performance and addressing poor performance. (a) Subject to budgetary and other...

  15. 46 CFR 107.317 - Addresses for submittal of plans, specifications, and calculations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Addresses for submittal of plans, specifications, and calculations. 107.317 Section 107.317 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION Plan Approval § 107.317 Addresses for submittal of plans, specifications,...

  16. PCS Security Technology Evaluation Tool

    2007-01-30

    P-STET assists in the security technology decision making process from a costlbeneflt perspective. It aids in addressing such questions as whether to acquire and deploy new security technology, to re-configure an existing product or system, or to maintain status quo. P-STET offers both a qualitative and quantitative option. P-STET is most efficient when tailored to an organization’s security cost/benefit environment. It then serves as both a guide to show what types of security questions shouldmore » be addressed and as a means to analyze the data gathered from the questions to make an informed decision. The quantitative option provides a straightforward way to express costs/benefits in terms of dollars. It relies on the organization to quantify benefits or cost avoidances, and, therefore, best serves as a guide to ensure various cost and benefit angles are evaluated. The qualitative option allows the organization to assess costs by levels with respect to security and PCS budgets, operational impacts, and opportunity costs. Benefits are represented in terms of improvements to the organization’s operations and are also assessed by levels with respect to some benchmark such as compliance with best practices. Results are displayed graphically using radar charts, allowing the user to make a more intuitive decision. The shaded area of each chart represents the overall cost and benefit of the security investment. A good investment is denoted when the ratio of benefit shaded area to cost shaded area is large.« less

  17. The Relationship between Parental Involvement and Adequate Yearly Progress among Urban, Suburban, and Rural Schools

    ERIC Educational Resources Information Center

    Ma, Xin; Shen, Jianping; Krenn, Huilan Y.

    2014-01-01

    Using national data from the 2007-08 School and Staffing Survey, we compared the relationships between parental involvement and school outcomes related to adequate yearly progress (AYP) in urban, suburban, and rural schools. Parent-initiated parental involvement demonstrated significantly positive relationships with both making AYP and staying off…

  18. Influenza 2005-2006: vaccine supplies adequate, but bird flu looms.

    PubMed

    Mossad, Sherif B

    2005-11-01

    Influenza vaccine supplies appear to be adequate for the 2005-2006 season, though delivery has been somewhat delayed. However, in the event of a pandemic of avian flu-considered inevitable by most experts, although no one knows when it will happen-the United States would be woefully unprepared. PMID:16315443

  19. Calculating and Reducing Errors Associated with the Evaluation of Adequate Yearly Progress.

    ERIC Educational Resources Information Center

    Hill, Richard

    In the Spring, 1996, issue of "CRESST Line," E. Baker and R. Linn commented that, in efforts to measure the progress of schools, "the fluctuations due to differences in the students themselves could conceal differences in instructional effects." This is particularly true in the context of the evaluation of adequate yearly progress required by…

  20. Prenatal zinc supplementation of zinc-adequate rats adversely affects immunity in offspring

    Technology Transfer Automated Retrieval System (TEKTRAN)

    We previously showed that zinc (Zn) supplementation of Zn-adequate dams induced immunosuppressive effects that persist in the offspring after weaning. We investigated whether the immunosuppressive effects were due to in utero exposure and/or mediated via milk using a cross-fostering design. Pregnant...

  1. 75 FR 5893 - Suspension of Community Eligibility for Failure To Maintain Adequate Floodplain Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... FR 51735. Executive Order 13132, Federalism. This rule involves no policies that have ] federalism....C. 4001 et seq., Reorganization Plan No. 3 of 1978, 3 CFR, 1978 Comp., p. 329; E.O. 12127, 44 FR... To Maintain Adequate Floodplain Management Regulations AGENCY: Federal Emergency Management...

  2. 26 CFR 1.467-2 - Rent accrual for section 467 rental agreements without adequate interest.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... provide for a variable rate of interest. For purposes of the adequate interest test under paragraph (b)(1) of this section, if a section 467 rental agreement provides for variable interest, the rental... date as the issue date) for the variable rates called for by the rental agreement. For purposes of...

  3. The Unequal Effect of Adequate Yearly Progress: Evidence from School Visits

    ERIC Educational Resources Information Center

    Brown, Abigail B.; Clift, Jack W.

    2010-01-01

    The authors report insights, based on annual site visits to elementary and middle schools in three states from 2004 to 2006, into the incentive effect of the No Child Left Behind Act's requirement that increasing percentages of students make Adequate Yearly Progress (AYP) in every public school. They develop a framework, drawing on the physics…

  4. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Attending veterinarian and adequate veterinary care. 2.33 Section 2.33 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Research Facilities § 2.33 Attending veterinarian...

  5. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Attending veterinarian and adequate veterinary care. 2.33 Section 2.33 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Research Facilities § 2.33 Attending veterinarian...

  6. Perceptions of Teachers in Their First Year of School Restructuring: Failure to Make Adequate Yearly Progress

    ERIC Educational Resources Information Center

    Moser, Sharon

    2010-01-01

    The 2007-2008 school year marked the first year Florida's Title I schools that did not made Adequate Yearly Progress (AYP) for five consecutive years entered into restructuring as mandated by the "No Child Left Behind Act" of 2001. My study examines the perceptions of teacher entering into their first year of school restructuring due to failure to…

  7. A Model for Touch Technique and Computation of Adequate Cane Length.

    ERIC Educational Resources Information Center

    Plain-Switzer, Karen

    1993-01-01

    This article presents a model for the motion of a long-cane executing the touch technique and presents formulas for the projected length of a cane adequate to protect an individual with blindness against wall-type and pole-type hazards. The paper concludes that the long-cane should reach from the floor to the user's armpit. (JDD)

  8. Towards Defining Adequate Lithium Trials for Individuals with Mental Retardation and Mental Illness.

    ERIC Educational Resources Information Center

    Pary, Robert J.

    1991-01-01

    Use of lithium with mentally retarded individuals with psychiatric conditions and/or behavior disturbances is discussed. The paper describes components of an adequate clinical trial and reviews case studies and double-blind cases. The paper concludes that aggression is the best indicator for lithium use, and reviews treatment parameters and…

  9. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... animal health, behavior, and well-being is conveyed to the attending veterinarian; (4) Guidance to... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Attending veterinarian and adequate veterinary care. 2.33 Section 2.33 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  10. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... on problems of animal health, behavior, and well-being is conveyed to the attending veterinarian; (4... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Attending veterinarian and adequate veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND...

  11. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... on problems of animal health, behavior, and well-being is conveyed to the attending veterinarian; (4... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Attending veterinarian and adequate veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND...

  12. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... on problems of animal health, behavior, and well-being is conveyed to the attending veterinarian; (4... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Attending veterinarian and adequate veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND...

  13. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... animal health, behavior, and well-being is conveyed to the attending veterinarian; (4) Guidance to... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Attending veterinarian and adequate veterinary care. 2.33 Section 2.33 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  14. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... on problems of animal health, behavior, and well-being is conveyed to the attending veterinarian; (4... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Attending veterinarian and adequate veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND...

  15. Special or Not so Special: Special Education Background Experiences of Principals and Adequate Yearly Progress

    ERIC Educational Resources Information Center

    Wilcox, Jennifer E.

    2011-01-01

    This mixed-methods study researched the special education background experience of principals and the effect on students in the subgroup of Students with Disabilities in making Adequate Yearly Progress (AYP). In the state of Ohio, schools and districts are expected to make AYP as a whole and additionally make AYP for each subgroup (various…

  16. Inferential Processing among Adequate and Struggling Adolescent Comprehenders and Relations to Reading Comprehension

    ERIC Educational Resources Information Center

    Barth, Amy E.; Barnes, Marcia; Francis, David; Vaughn, Sharon; York, Mary

    2015-01-01

    Separate mixed model analyses of variance were conducted to examine the effect of textual distance on the accuracy and speed of text consistency judgments among adequate and struggling comprehenders across grades 6-12 (n = 1,203). Multiple regressions examined whether accuracy in text consistency judgments uniquely accounted for variance in…

  17. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... with the State's requirements for availability of services, as set forth in § 438.206. (e) CMS' right... HUMAN SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE Quality Assessment and Performance... 42 Public Health 4 2010-10-01 2010-10-01 false Assurances of adequate capacity and services....

  18. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... requirements: (1) Offers an appropriate range of preventive, primary care, and specialty services that is adequate for the anticipated number of enrollees for the service area. (2) Maintains a network of providers... enrollment in its service area in accordance with the State's standards for access to care under this...

  19. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... requirements: (1) Offers an appropriate range of preventive, primary care, and specialty services that is adequate for the anticipated number of enrollees for the service area. (2) Maintains a network of providers... enrollment in its service area in accordance with the State's standards for access to care under this...

  20. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... requirements: (1) Offers an appropriate range of preventive, primary care, and specialty services that is adequate for the anticipated number of enrollees for the service area. (2) Maintains a network of providers... enrollment in its service area in accordance with the State's standards for access to care under this...

  1. Effect of tranquilizers on animal resistance to the adequate stimuli of the vestibular apparatus

    NASA Technical Reports Server (NTRS)

    Maksimovich, Y. B.; Khinchikashvili, N. V.

    1980-01-01

    The effect of tranquilizers on vestibulospinal reflexes and motor activity was studied in 900 centrifuged albino mice. Actometric studies have shown that the tranquilizers have a group capacity for increasing animal resistance to the action of adequate stimuli to the vestibular apparatus.

  2. 21 CFR 314.126 - Adequate and well-controlled studies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... conducting clinical investigations of a drug is to distinguish the effect of a drug from other influences... recognized by the scientific community as the essentials of an adequate and well-controlled clinical... randomization and blinding of patients or investigators, or both. If the intent of the trial is to...

  3. Final 2004 Report on Adequate Yearly Progress in the Montgomery County Public Schools

    ERIC Educational Resources Information Center

    Stevenson, Jose W.

    2005-01-01

    The vast majority of Montgomery County public schools made sufficient progress on state testing and accountability standards in 2004 to comply with the adequate yearly progress (AYP) requirements under the "No Child Left Behind (NCLB) Act of 2001." Information released by the Maryland State Department of Education (MSDE) in October 2004 shows that…

  4. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 3 2011-10-01 2011-10-01 false Adequate financial records, statistical data, and... financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination of costs payable by...

  5. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Adequate financial records, statistical data, and... financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination of costs payable by...

  6. Estimates of Adequate School Spending by State Based on National Average Service Levels.

    ERIC Educational Resources Information Center

    Miner, Jerry

    1983-01-01

    Proposes a method for estimating expenditures per student needed to provide educational adequacy in each state. Illustrates the method using U.S., Arkansas, New York, Texas, and Washington State data, covering instruction, special needs, operations and maintenance, administration, and other costs. Estimates ratios of "adequate" to actual spending…

  7. Leadership Style and Adequate Yearly Progress: A Correlational Study of Effective Principal Leadership

    ERIC Educational Resources Information Center

    Leapley-Portscheller, Claudia Iris

    2008-01-01

    Principals are responsible for leading efforts to reach increasingly higher levels of student academic proficiency in schools associated with adequate yearly progress (AYP) requirements. The purpose of this quantitative, correlational study was to identify the degree to which perceptions of principal transformational, transactional, and…

  8. Percentage of Adults with High Cholesterol Whose LDL Cholesterol Levels Are Adequately Controlled

    MedlinePlus

    ... of Adults with High Cholesterol Whose LDL Cholesterol Levels are Adequately Controlled High cholesterol can double a ... with High Cholesterol that is Controlled by Education Level 8k4c-k22f Download these data » Click on legends ...

  9. 42 CFR 413.24 - Adequate cost data and cost finding.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Adequate cost data and cost finding. 413.24 Section 413.24 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PRINCIPLES OF REASONABLE COST REIMBURSEMENT; PAYMENT FOR END-STAGE RENAL DISEASE SERVICES; OPTIONAL PROSPECTIVELY...

  10. Principals' Perceptions of Effective Strategies in Meeting Adequate Yearly Progress in Special Education

    ERIC Educational Resources Information Center

    Meyer, Jadie K.

    2012-01-01

    The purpose of this study was to examine the perceptions of principals who have met Adequate Yearly Progress (AYP) with the special education subgroup. This was a qualitative study, utilizing interviews to answer the research questions. The first three research questions analyzed the areas of assessment, building-level leadership, and curriculum…

  11. Human milk feeding supports adequate growth in infants

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Despite current nutritional strategies, premature infants remain at high risk for extrauterine growth restriction. The use of an exclusive human milk-based diet is associated with decreased incidence of necrotizing enterocolitis (NEC), but concerns exist about infants achieving adequate growth. The ...

  12. 75 FR 74022 - Safety Analysis Requirements for Defining Adequate Protection for the Public and the Workers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... November 15, 2010 (75 FR 69648). The corrected text of the recommendation approved by the Board is below... or telephone number (202) 694-7000. Correction: In the Federal Register of November 15, 2010 (75 FR... SAFETY BOARD Safety Analysis Requirements for Defining Adequate Protection for the Public and the...

  13. Evaluating Rural Progress in Mathematics Achievement: Threats to the Validity of "Adequate Yearly Progress"

    ERIC Educational Resources Information Center

    Lee, Jaekyung

    2003-01-01

    This article examines major threats to the validity of Adequate Yearly Progress (AYP) in the context of rural schools. Although rural students and their schools made significant academic progress in the past on national and state assessments, the current goal of AYP turns out to be highly unrealistic for them unless states set far lower…

  14. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Exemptions for pesticides adequately regulated by another Federal agency. 152.20 Section 152.20 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION...

  15. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Exemptions for pesticides adequately regulated by another Federal agency. 152.20 Section 152.20 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION...

  16. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Exemptions for pesticides adequately regulated by another Federal agency. 152.20 Section 152.20 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION...

  17. What Is the Cost of an Adequate Vermont High School Education?

    ERIC Educational Resources Information Center

    Rucker, Frank D.

    2010-01-01

    Access to an adequate education has been widely considered an undeniable right since Chief Justice Warren stated in his landmark decision that "Today, education is perhaps the most important function of state and local governments...it is doubtful that any child may reasonably be expected to succeed in life if he is denied the opportunity of an…

  18. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  19. Addressing viral resistance through vaccines

    PubMed Central

    Laughlin, Catherine; Schleif, Amanda; Heilman, Carole A

    2015-01-01

    Antimicrobial resistance is a serious healthcare concern affecting millions of people around the world. Antiviral resistance has been viewed as a lesser threat than antibiotic resistance, but it is important to consider approaches to address this growing issue. While vaccination is a logical strategy, and has been shown to be successful many times over, next generation viral vaccines with a specific goal of curbing antiviral resistance will need to clear several hurdles including vaccine design, evaluation and implementation. This article suggests that a new model of vaccination may need to be considered: rather than focusing on public health, this model would primarily target sectors of the population who are at high risk for complications from certain infections. PMID:26604979

  20. Addressing failures in exascale computing

    SciTech Connect

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  1. Light addressable photoelectrochemical cyanide sensor

    SciTech Connect

    Licht, S.; Myung, N.; Sun, Y.

    1996-03-15

    A sensor is demonstrated that is capable of spatial discrimination of cyanide with use of only a single stationary sensing element. Different spatial regions of the sensing element are light activated to reveal the solution cyanide concentration only at the point of illumination. In this light addressable photoelectrochemical (LAP) sensor the sensing element consists of an n-CdSe electrode immersed in solution, with the open-circuit potential determined under illumination. In alkaline ferro-ferri-cyanide solution, the open-circuit photopotential is highly responsive to cyanide, with a linear response of (120 mV) log [KCN]. LAP detection with a spatial resolution of {+-}1 mm for cyanide detection is demonstrated. The response is almost linear for 0.001-0.100 m cyanide with a resolution of 5 mV. 38 refs., 7 figs., 1 tab.

  2. Addressing Failures in Exascale Computing

    SciTech Connect

    Snir, Marc; Wisniewski, Robert; Abraham, Jacob; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, J.; Bose, Pradip; Cappello, Franck; Carlson, Bill; Chien, Andrew; Coteus, Paul; DeBardeleben, Nathan; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Fazzari, Saverio; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Rob; Stearley, Jon; Van Hensbergen, Eric

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  3. Biometrics and Security

    NASA Astrophysics Data System (ADS)

    Govindaraju, Venu

    The science of Biometrics is concerned with recognizing people based on their physiological or behavioral characteristics. It has emerged as a vibrant field of research in today's security conscious society. In this talk we will introduce the important research challenges in Biometrics and specifically address the following topics: i) unobtrusive people tracking using a novel evolutionary recognition paradigm, ii) efficient indexing and searching of large fingerprint databases, iii) cancelability of templates where the task is to ensure that enrolled biometric templates can be revoked and new templates issued, and iv) fusion of fingerprints with other biometric modalities such as face where we will explore optimal trainable functions that operate on the scores returned by individual matchers.

  4. Congress and national security

    NASA Astrophysics Data System (ADS)

    Sharfman, Peter

    1983-10-01

    The starting point for any serious discussion of Congress role in matters of national security is the recognition that Congress does some kinds of things very effectively, but generally fails when it tries to do other kinds of things. Consequently, a citizen with a desire to shape national policy may find Congress to be the focal point of national decision, or largely irrelevant, depending almost, entirely on the nature of the issue. As a political scientist, I am tempted to relate this to the provisions of the U.S. Constitution and to the differing structures of the Executive and Legislative institutions; since I am addressing an audience of physicists, I will confine my explanation of causes to the observation that you cannot easily push on a string.

  5. Prevalence and Predictors of Chronic Health Conditions of Inmates Newly Admitted to Maximum Security Prisons.

    PubMed

    Bai, Jennifer R; Befus, Montina; Mukherjee, Dhritiman V; Lowy, Franklin D; Larson, Elaine L

    2015-07-01

    This study estimated the prevalence of chronic medical conditions and risk predictors of 759 newly admitted inmates in two New York State maximum-security prisons. The most prevalent conditions were respiratory (34.1%), cardiovascular (17.4%), and sexually transmitted diseases (STD; 16.1%); least prevalent were HIV (3.6%), cancer (1.7%), and kidney disease (1.7%). Results of the multivariable logistic regression showed that females had higher risk for all conditions except cardiovascular and liver disease; individuals aged 40 years and older had significantly higher risk for all conditions except asthma and STD; non-Hispanic Black inmates had higher risk for respiratory disease and STD; cigarette smoking was associated with asthma; and obesity was significantly associated with diabetes, asthma, and cardiovascular conditions. These findings highlight the heavy burden of chronic illnesses among newly admitted inmates and the need to address adequate screening, prevention, and treatment services. PMID:26084947

  6. Prevalence and Predictors of Chronic Health Conditions of Inmates Newly Admitted to Maximum Security Prisons

    PubMed Central

    Bai, Jennifer R.; Befus, Montina; Mukherjee, Dhritiman V.; Lowy, Franklin D.; Larson, Elaine L.

    2015-01-01

    This study estimated the prevalence of chronic medical conditions and risk predictors of 759 newly admitted inmates in two New York State maximum-security prisons. The most prevalent conditions were respiratory (34.1%), cardiovascular (17.4%), and sexually transmitted diseases (STD; 16.1%); least prevalent were HIV (3.6%), cancer (1.7%), and kidney disease (1.7%). Results of the multivariable logistic regression showed that females had higher risk for all conditions except cardiovascular and liver disease; individuals aged 40 years and older had significantly higher risk for all conditions except asthma and STD; non-Hispanic Black inmates had higher risk for respiratory disease and STD; cigarette smoking was associated with asthma; and obesity was significantly associated with diabetes, asthma, and cardiovascular conditions. These findings highlight the heavy burden of chronic illnesses among newly admitted inmates and the need to address adequate screening, prevention, and treatment services. PMID:26084947

  7. Does Financial Literacy Contribute to Food Security?

    PubMed Central

    Carman, Katherine G.; Zamarro, Gema

    2016-01-01

    Food insecurity, not having consistent access to adequate food for active, healthy lives for all household members, is most common among low income households. However, income alone is not sufficient to explain who experiences food insecurity. This study investigates the relationship between financial literacy and food security. We find that low income households who exhibit financial literacy are less likely to experience food insecurity. PMID:26949563

  8. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  9. 17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities...

  10. 17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities...

  11. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-04

    ... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on March 21... business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS), Science...

  12. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  13. Addressing neurological disorders with neuromodulation.

    PubMed

    Oluigbo, Chima O; Rezai, Ali R

    2011-07-01

    Neurological disorders are becoming increasingly common in developed countries as a result of the aging population. In spite of medications, these disorders can result in progressive loss of function as well as chronic physical, cognitive, and emotional disability that ultimately places enormous emotional and economic on the patient, caretakers, and the society in general. Neuromodulation is emerging as a therapeutic option in these patients. Neuromodulation is a field, which involves implantable devices that allow for the reversible adjustable application of electrical, chemical, or biological agents to the central or peripheral nervous system with the objective of altering its functioning with the objective of achieving a therapeutic or clinically beneficial effect. It is a rapidly evolving field that brings together many different specialties in the fields of medicine, materials science, computer science and technology, biomedical, and neural engineering as well as the surgical or interventional specialties. It has multiple current and emerging indications, and an enormous potential for growth. The main challenges before it are in the need for effective collaboration between engineers, basic scientists, and clinicians to develop innovations that address specific problems resulting in new devices and clinical applications. PMID:21193369

  14. Gender: addressing a critical focus.

    PubMed

    Thornton, L; Wegner, M N

    1995-01-01

    The definition of gender was addressed at the Fourth World Conference on Women (Beijing, China). After extensive debate, the definition developed by the UN Population Fund in 1995 was adopted: "a set of qualities and behaviors expected from a female or male by society." The sustainability of family planning (FP) programs depends on acknowledgment of the role gender plays in contraceptive decision-making and use. For example, programs must consider the fact that women in many cultures do not make FP decisions without the consent of their spouse. AVSC is examining providers' gender-based ideas about clients and the effects of these views on the quality of reproductive health services. Questions such as how service providers can encourage joint responsibility for contraception without requiring spousal consent or how they can make men feel comfortable about using a male method in a society where FP is considered a woman's issue are being discussed. Also relevant is how service providers can discuss sexual matters openly with female clients in cultures that do not allow women to enjoy their sexuality. Another concern is the potential for physical violence to a client as a result of the provision of FP services. PMID:12294397

  15. Secure coprocessing applications and research issues

    SciTech Connect

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  16. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  17. The concept of adequate causation and Max Weber's comparative sociology of religion.

    PubMed

    Buss, A

    1999-06-01

    Max Weber's The Protestant Ethic and the Spirit of Capitalism, studied in isolation, shows mainly an elective affinity or an adequacy on the level of meaning between the Protestant ethic and the 'spirit' of capitalism. Here it is suggested that Weber's subsequent essays on 'The Economic Ethics of World Religions' are the result of his opinion that adequacy on the level of meaning needs and can be verified by causal adequacy. After some introductory remarks, particularly on elective affinity, the paper tries to develop the concept of adequate causation and the related concept of objective possibility on the basis of the work of v. Kries on whom Weber heavily relied. In the second part, this concept is used to show how the study of the economic ethics of India, China, Rome and orthodox Russia can support the thesis that the 'spirit' of capitalism, although it may not have been caused by the Protestant ethic, was perhaps adequately caused by it. PMID:15260028

  18. Hybrid architecture for building secure sensor networks

    NASA Astrophysics Data System (ADS)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  19. A novel strategy to overcome resistance in stent placement at lesion site after adequate predilatation.

    PubMed

    Jain, D; Tolg, R; Katus, H A; Richardt, G

    2000-12-01

    Resistance was encountered in passing a 3 x 18 mm stent across a lesion in the proximal left anterior descending coronary artery. Successive changes in stent with repeated balloon dilatations did not succeed. Finally, a 9 mm stent was passed across the lesion and deployed at the site of maximal resistance. The 18 mm stent was then placed through this stent. A novel strategy to overcome resistance in the stent passage through the lesion after an adequate balloon predilatation is reported. PMID:11103034

  20. Myth 19: Is Advanced Placement an Adequate Program for Gifted Students?

    ERIC Educational Resources Information Center

    Gallagher, Shelagh A.

    2009-01-01

    Is it a myth that Advanced Placement (AP) is an adequate program for gifted students? AP is so covered with myths and assumptions that it is hard to get a clear view of the issues. In this article, the author finds the answer about AP by looking at current realties. First, AP is hard for gifted students to avoid. Second, AP never was a program…

  1. Global risk assessment of aflatoxins in maize and peanuts: are regulatory standards adequately protective?

    PubMed

    Wu, Felicia; Stacy, Shaina L; Kensler, Thomas W

    2013-09-01

    The aflatoxins are a group of fungal metabolites that contaminate a variety of staple crops, including maize and peanuts, and cause an array of acute and chronic human health effects. Aflatoxin B1 in particular is a potent liver carcinogen, and hepatocellular carcinoma (HCC) risk is multiplicatively higher for individuals exposed to both aflatoxin and chronic infection with hepatitis B virus (HBV). In this work, we sought to answer the question: do current aflatoxin regulatory standards around the world adequately protect human health? Depending upon the level of protection desired, the answer to this question varies. Currently, most nations have a maximum tolerable level of total aflatoxins in maize and peanuts ranging from 4 to 20ng/g. If the level of protection desired is that aflatoxin exposures would not increase lifetime HCC risk by more than 1 in 100,000 cases in the population, then most current regulatory standards are not adequately protective even if enforced, especially in low-income countries where large amounts of maize and peanuts are consumed and HBV prevalence is high. At the protection level of 1 in 10,000 lifetime HCC cases in the population, however, almost all aflatoxin regulations worldwide are adequately protective, with the exception of several nations in Africa and Latin America. PMID:23761295

  2. Global Risk Assessment of Aflatoxins in Maize and Peanuts: Are Regulatory Standards Adequately Protective?

    PubMed Central

    Wu, Felicia

    2013-01-01

    The aflatoxins are a group of fungal metabolites that contaminate a variety of staple crops, including maize and peanuts, and cause an array of acute and chronic human health effects. Aflatoxin B1 in particular is a potent liver carcinogen, and hepatocellular carcinoma (HCC) risk is multiplicatively higher for individuals exposed to both aflatoxin and chronic infection with hepatitis B virus (HBV). In this work, we sought to answer the question: do current aflatoxin regulatory standards around the world adequately protect human health? Depending upon the level of protection desired, the answer to this question varies. Currently, most nations have a maximum tolerable level of total aflatoxins in maize and peanuts ranging from 4 to 20ng/g. If the level of protection desired is that aflatoxin exposures would not increase lifetime HCC risk by more than 1 in 100,000 cases in the population, then most current regulatory standards are not adequately protective even if enforced, especially in low-income countries where large amounts of maize and peanuts are consumed and HBV prevalence is high. At the protection level of 1 in 10,000 lifetime HCC cases in the population, however, almost all aflatoxin regulations worldwide are adequately protective, with the exception of several nations in Africa and Latin America. PMID:23761295

  3. Self-esteem, social support, and satisfaction differences in women with adequate and inadequate prenatal care.

    PubMed

    Higgins, P; Murray, M L; Williams, E M

    1994-03-01

    This descriptive, retrospective study examined levels of self-esteem, social support, and satisfaction with prenatal care in 193 low-risk postpartal women who obtained adequate and inadequate care. The participants were drawn from a regional medical center and university teaching hospital in New Mexico. A demographic questionnaire, the Coopersmith self-esteem inventory, the personal resource questionnaire part 2, and the prenatal care satisfaction inventory were used for data collection. Significant differences were found in the level of education, income, insurance, and ethnicity between women who received adequate prenatal care and those who received inadequate care. Women who were likely to seek either adequate or inadequate prenatal care were those whose total family income was $10,000 to $19,999 per year and high school graduates. Statistically significant differences were found in self-esteem, social support, and satisfaction between the two groups of women. Strategies to enhance self-esteem and social support have to be developed to reach women at risk for receiving inadequate prenatal care. PMID:8155221

  4. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ....m. ADDRESSES: The meeting will be held at the National Security Education Program; 1101 Wilson Blvd..., National Security Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209-2248;...

  5. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  7. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  8. A security mediator for health care information.

    PubMed Central

    Wiederhold, G.; Bilello, M.; Sarathy, V.; Qian, X.

    1996-01-01

    The TIHI (Trusted Interoperation of Healthcare Information) project addresses a security issue that arises when some information is being shared among collaborating enterprises, although not all enterprise information is sharable. It assumes that protection exists to prevent intrusion by adversaries through secure transmission and firewalls. The TIHI system design provides a gateway, owned by the enterprise security officer, to mediate queries and responses. The latter are typically transmitted via the Internet. The enterprise policy is determined by rules provided to the mediator. We show examples of typical rules. The problem and our solution, although developed in a healthcare context, is equally valid among collaborating enterprises. PMID:8947640

  9. Recommended Practice for Securing Control System Modems

    SciTech Connect

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area....

  11. An address geocoding solution for Chinese cities

    NASA Astrophysics Data System (ADS)

    Zhang, Xuehu; Ma, Haoming; Li, Qi

    2006-10-01

    We introduce the challenges of address geocoding for Chinese cities and present a potential solution along with a prototype system that deal with these challenges by combining and extending current geocoding solutions developed for United States and Japan. The proposed solution starts by separating city addresses into "standard" addresses which meet a predefined address model and non-standard ones. The standard addresses are stored in a structured relational database in their normalized forms, while a selected portion of the non-standard addresses are stored as aliases to the standard addresses. An in-memory address index is then constructed from the address database and serves as the basis for real-time address matching. Test results were obtained from two trials conducted in the city Beijing. On average 80% matching rate were achieved. Possible improvements to the current design are also discussed.

  12. A Graduate Level Course on Adolescent Suicide: Addressing Assessment, Intervention, and Postvention

    ERIC Educational Resources Information Center

    Floor, Jennifer

    2010-01-01

    Adolescent suicide is a growing phenomenon that is not adequately addressed in graduate education. Students and clinicians who experience a patient suicide respond negatively which in turn affects perceived competence. As a result, education in adolescent suicide is warranted. Therefore, this dissertation is a graduate level course on adolescent…

  13. Minimally adequate mental health care and latent classes of PTSD symptoms in female Iraq and Afghanistan veterans.

    PubMed

    Hebenstreit, Claire L; Madden, Erin; Koo, Kelly H; Maguen, Shira

    2015-11-30

    Female veterans of Operations Enduring and Iraqi Freedom, and Operation New Dawn (OEF/OIF/OND) represent a growing segment of Department of Veterans Affairs (VA) health care users. A retrospective analysis used national VA medical records to identify factors associated with female OEF/OIF/OND veterans' completion of minimally adequate care (MAC) for PTSD, defined as the completion of at least nine mental health outpatient visits within a 15-week period or at least twelve consecutive weeks of medication use. The sample included female OEF/OIF/OND veterans with PTSD who initiated VA health care between 2007-2013, and were seen in outpatient mental health (N=2183). Multivariable logistic regression models examined factors associated with completing MAC for PTSD, including PTSD symptom expression (represented by latent class analysis), sociodemographic, military, clinical, and VA access factors. Within one year of initiating mental health care, 48.3% of female veterans completed MAC. Race/ethnicity, age, PTSD symptom class, additional psychiatric diagnoses, and VA primary care use were significantly associated with completion of MAC for PTSD. Results suggest that veterans presenting for PTSD treatment should be comprehensively evaluated to identify factors associated with inadequate completion of care. Treatments that are tailored to PTSD symptom class may help to address potential barriers. PMID:26330305

  14. Technical Reference Suite Addressing Challenges of Providing Assurance for Fault Management Architectural Design

    NASA Technical Reports Server (NTRS)

    Fitz, Rhonda; Whitman, Gerek

    2016-01-01

    Research into complexities of software systems Fault Management (FM) and how architectural design decisions affect safety, preservation of assets, and maintenance of desired system functionality has coalesced into a technical reference (TR) suite that advances the provision of safety and mission assurance. The NASA Independent Verification and Validation (IV&V) Program, with Software Assurance Research Program support, extracted FM architectures across the IV&V portfolio to evaluate robustness, assess visibility for validation and test, and define software assurance methods applied to the architectures and designs. This investigation spanned IV&V projects with seven different primary developers, a wide range of sizes and complexities, and encompassed Deep Space Robotic, Human Spaceflight, and Earth Orbiter mission FM architectures. The initiative continues with an expansion of the TR suite to include Launch Vehicles, adding the benefit of investigating differences intrinsic to model-based FM architectures and insight into complexities of FM within an Agile software development environment, in order to improve awareness of how nontraditional processes affect FM architectural design and system health management. The identification of particular FM architectures, visibility, and associated IV&V techniques provides a TR suite that enables greater assurance that critical software systems will adequately protect against faults and respond to adverse conditions. Additionally, the role FM has with regard to strengthened security requirements, with potential to advance overall asset protection of flight software systems, is being addressed with the development of an adverse conditions database encompassing flight software vulnerabilities. Capitalizing on the established framework, this TR suite provides assurance capability for a variety of FM architectures and varied development approaches. Research results are being disseminated across NASA, other agencies, and the

  15. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  16. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  17. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  18. New initiatives in materials security

    SciTech Connect

    Cynthia, G.; Jones, Ph.D.

    2008-07-01

    NRC Mission: To license and regulate the Nation's civilian use of byproduct, source, and special nuclear materials to ensure adequate protection of public health and safety, promote the common defense and security, and protect the environment. Scope of Responsibility: NRC's regulatory mission covers three main areas: - Reactors: commercial reactors for generating electric power and non-power reactors used for research, testing, and training; - Materials: uses of nuclear materials in medical, industrial, and academic settings and facilities that produce nuclear fuel; - Waste: transportation, storage, and disposal of nuclear materials and waste, and decommissioning of nuclear facilities from service. A Changing Environment: - National security is dominant concern; - Obtain appropriate balance between safety and Security initiatives and Operational activities; - Multiple layers of systems, infrastructures for various licensees. Effective Communication: Not easy; Sound bites galore; Nuclear 'phobia'; Acceptability of risk; Balance of cost and benefits; Responsibility of the regulator, licensees and radiation protection professionals. Prioritized Licensee Groups: - High priority: Panoramic irradiators; manufacturers/distributors; - Medium priority: medical and research facilities, radiography, well-logging, broad-scope licenses, self-shielded irradiators, open-field irradiators, and other licensees; - Low priority: Portable gauges. Increased Security Measures: Security Zone; Control Access; Monitor, Detect, Assess, and Respond; Transportation Security; Additional control to secure portable and mobile devices; Liaison with Local Law Enforcement Agencies; Background Investigations and Fingerprinting; License Verification; Document Retention; Information Protection; Orders/Legally binding requirements to more than 3000 licensees. Orders Issued: Large Panoramic Irradiators Security Measures (60 Orders issued 6/03, Inspections done); Manufacturing and Distribution Licensees

  19. Earth Observations for Global Water Security

    NASA Technical Reports Server (NTRS)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  20. A Unified Approach to Intra-Domain Security

    SciTech Connect

    Shue, Craig A; Kalafut, Andrew J.; Gupta, Prof. Minaxi

    2009-01-01

    While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a secure version of the DHCP protocol, which has the additional feature of providing each host with a certificate. We then leverage these certificates to secure ARP, prevent spoofing within the domain, and secure SSH and VPN connections between the domain and hosts which have previously interacted with it locally. In doing so, we also develop an incrementally deployable public key infrastructure which can later be leveraged to support inter-domain authentication.

  1. Utilize common criteria methodology for secure ubiquitous healthcare environment.

    PubMed

    Yu, Yao-Chang; Hou, Ting-Wei

    2012-06-01

    RFID technology is widely used in healthcare environments to ensure patient safety. Therefore, the testing of RFID tags, such as performance tests and security evaluations, is necessary to ensure inter-operational functional compatibility with standards. A survey of the literature shows that while standards that are around RFID performance tests have been addressed, but the same is not true for security evaluations. Therefore, in this paper, we introduce the Common Criteria security evaluation methodology, also known as ISO/IEC 15408, for the security evaluation of RFID tags and propose a framework as a minimal requirement for RFID tags to improve security assurance. PMID:21086153

  2. Security-Enhanced Fast Mobile IPv6 Handover

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop

    Motivated by the fact that the existing FMIPv6 security scheme has several weaknesses in terms of security and efficiency, we propose a security-enhanced fast mobile IPv6 in this letter. Based on the concept of a secret key-based CGA (Cryptographically Generated Address), we show how to establish a new security association between the MN and AR (Access Router) whenever a handover occurs. We also show that the proposed scheme is robust against several types of security attacks feasible with the existing scheme. Our scheme is more efficient in that it requires fewer public key operations.

  3. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  4. SAVAH: Source Address Validation with Host Identity Protocol

    NASA Astrophysics Data System (ADS)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  5. Content-addressable memory based enforcement of configurable policies

    DOEpatents

    Berg, Michael J

    2014-05-06

    A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.

  6. Addressing Society's Preparedness for the Approaching Solar Maximum

    NASA Astrophysics Data System (ADS)

    Tretkoff, Ernie

    2010-07-01

    As the next solar maximum approaches, increased solar activity could damage technology on which society relies, with potentially serious consequences for national security, aviation, emergency response, communications, navigation, spacecraft, and electric power grids. To discuss the state of preparedness, describe recent progress, and address future needs, approximately 200 researchers and stakeholders from government agencies, academia, and industry, including international participants, met in June at the 2010 Space Weather Enterprise Forum in Washington, D. C. The conference's theme was "Building an informed and resilient society—The decade ahead."

  7. Future prospects for prophylactic immune stimulation in crustacean aquaculture - the need for improved metadata to address immune system complexity.

    PubMed

    Hauton, Chris; Hudspith, Meggie; Gunton, Laetitia

    2015-02-01

    Future expansion of the crustacean aquaculture industry will be required to ensure global food security. However, this expansion must ensure: (a) that natural resources (including habitat use and fish meal) are sustainably exploited, (b) that the socio-economic development of producing nations is safeguarded, and (c) that the challenge presented by crustacean diseases is adequately met. Conventionally, the problem of disease in crustacean aquaculture has been addressed through prophylactic administration of stimulants, additives or probiotics. However, these approaches have been questioned both experimentally and philosophically. In this review, we argue that real progress in the field of crustacean immune stimulants has now slowed, with only incremental advances now being made. We further contend that an overt focus on the immune effector response has been misguided. In light of the wealth of new data reporting immune system complexity, a more refined approach is necessary - one that must consider the important role played by pattern recognition proteins. In support of this more refined approach, there is now a much greater requirement for the reporting of essential metadata. We propose a broad series of recommendations regarding the 'Minimum Information required to support a Stimulant Assessment experiment' (MISA guidelines) to foster new progression within the field. PMID:24796867

  8. Beyond a series of security nets: Applying STAMP & STPA to port security

    SciTech Connect

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.

  9. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGESBeta

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  10. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  11. Adequate Iodine Status in New Zealand School Children Post-Fortification of Bread with Iodised Salt

    PubMed Central

    Jones, Emma; McLean, Rachael; Davies, Briar; Hawkins, Rochelle; Meiklejohn, Eva; Ma, Zheng Feei; Skeaff, Sheila

    2016-01-01

    Iodine deficiency re-emerged in New Zealand in the 1990s, prompting the mandatory fortification of bread with iodised salt from 2009. This study aimed to determine the iodine status of New Zealand children when the fortification of bread was well established. A cross-sectional survey of children aged 8–10 years was conducted in the cities of Auckland and Christchurch, New Zealand, from March to May 2015. Children provided a spot urine sample for the determination of urinary iodine concentration (UIC), a fingerpick blood sample for Thyroglobulin (Tg) concentration, and completed a questionnaire ascertaining socio-demographic information that also included an iodine-specific food frequency questionnaire (FFQ). The FFQ was used to estimate iodine intake from all main food sources including bread and iodised salt. The median UIC for all children (n = 415) was 116 μg/L (females 106 μg/L, males 131 μg/L) indicative of adequate iodine status according to the World Health Organisation (WHO, i.e., median UIC of 100–199 μg/L). The median Tg concentration was 8.7 μg/L, which was <10 μg/L confirming adequate iodine status. There was a significant difference in UIC by sex (p = 0.001) and ethnicity (p = 0.006). The mean iodine intake from the food-only model was 65 μg/day. Bread contributed 51% of total iodine intake in the food-only model, providing a mean iodine intake of 35 μg/day. The mean iodine intake from the food-plus-iodised salt model was 101 μg/day. In conclusion, the results of this study confirm that the iodine status in New Zealand school children is now adequate. PMID:27196925

  12. Adequate Iodine Status in New Zealand School Children Post-Fortification of Bread with Iodised Salt.

    PubMed

    Jones, Emma; McLean, Rachael; Davies, Briar; Hawkins, Rochelle; Meiklejohn, Eva; Ma, Zheng Feei; Skeaff, Sheila

    2016-01-01

    Iodine deficiency re-emerged in New Zealand in the 1990s, prompting the mandatory fortification of bread with iodised salt from 2009. This study aimed to determine the iodine status of New Zealand children when the fortification of bread was well established. A cross-sectional survey of children aged 8-10 years was conducted in the cities of Auckland and Christchurch, New Zealand, from March to May 2015. Children provided a spot urine sample for the determination of urinary iodine concentration (UIC), a fingerpick blood sample for Thyroglobulin (Tg) concentration, and completed a questionnaire ascertaining socio-demographic information that also included an iodine-specific food frequency questionnaire (FFQ). The FFQ was used to estimate iodine intake from all main food sources including bread and iodised salt. The median UIC for all children (n = 415) was 116 μg/L (females 106 μg/L, males 131 μg/L) indicative of adequate iodine status according to the World Health Organisation (WHO, i.e., median UIC of 100-199 μg/L). The median Tg concentration was 8.7 μg/L, which was <10 μg/L confirming adequate iodine status. There was a significant difference in UIC by sex (p = 0.001) and ethnicity (p = 0.006). The mean iodine intake from the food-only model was 65 μg/day. Bread contributed 51% of total iodine intake in the food-only model, providing a mean iodine intake of 35 μg/day. The mean iodine intake from the food-plus-iodised salt model was 101 μg/day. In conclusion, the results of this study confirm that the iodine status in New Zealand school children is now adequate. PMID:27196925

  13. Chronic leg ulcer: does a patient always get a correct diagnosis and adequate treatment?

    PubMed

    Mooij, Michael C; Huisman, Laurens C

    2016-03-01

    Patients with chronic leg ulcers have severely impaired quality of life and account for a high percentage of annual healthcare costs. To establish the cause of a chronic leg ulcer, referral to a center with a multidisciplinary team of professionals is often necessary. Treating the underlying cause diminishes healing time and reduces costs. In venous leg ulcers adequate compression therapy is still a problem. It can be improved by training the professionals with pressure measuring devices. A perfect fitting of elastic stockings is important to prevent venous leg ulcer recurrence. In most cases, custom-made stockings are the best choice for this purpose. PMID:26916772

  14. Determining Adequate Margins in Head and Neck Cancers: Practice and Continued Challenges.

    PubMed

    Williams, Michelle D

    2016-09-01

    Margin assessment remains a critical component of oncologic care for head and neck cancer patients. As an integrated team, both surgeons and pathologists work together to assess margins in these complex patients. Differences in method of margin sampling can impact obtainable information and effect outcomes. Additionally, what distance is an "adequate or clear" margin for patient care continues to be debated. Ultimately, future studies and potentially secondary modalities to augment pathologic assessment of margin assessment (i.e., in situ imaging or molecular assessment) may enhance local control in head and neck cancer patients. PMID:27469263

  15. Family Structure Types and Adequate Utilization of Antenatal Care in Kenya.

    PubMed

    Owili, Patrick Opiyo; Muga, Miriam Adoyo; Chou, Yiing-Jenq; Hsu, Yi-Hsin Elsa; Huang, Nicole; Chien, Li-Yin

    2016-01-01

    Features of the health care delivery system may not be the only expounding factors of adequate utilization of antenatal care among women. Other social factors such as the family structure and its environment contribute toward pregnant women's utilization of antenatal care. An understanding of how women in different family structure types and social groups use basic maternal health services is important toward developing and implementing maternal health care policy in the post-Millennium Development Goal era, especially in the sub-Saharan Africa where maternal mortality still remains high. PMID:27214674

  16. Working group on the “adequate minimum” V=volcanic observatory

    USGS Publications Warehouse

    Tilling, R.I.

    1982-01-01

    A working group consisting of R. I. Tilling (United States, Chairman), M. Espendola (Mexico), E. Malavassi (Costa Rica), L. Villari (Italy), and J.P Viode (France) met on the island of Guadeloupe on February 20, 1981, to discuss informally the requirements for a "Minimum" volcano observatory, one which would have the essential monitoring equipment and staff to provide reliable information on the state of an active volcno. Given the premise that any monitoring of a volcano is better than none at all, the owrking group then proceeded to consider the concept of an "adequate minimum" observatory. 

  17. SAS: A Secure Aglet Server

    SciTech Connect

    Jean, Evens; Jiao, Yu; Hurson, Ali R.; Potok, Thomas E

    2007-01-01

    Despite the fact that mobile agents have received increasing attention in various research efforts, the use of the paradigm in practical applications has yet to fully emerge. With the presence of infrastructure to support the development of mobile agent applications, security concerns act as the primary deterrent against such trends. Numerous studies have been conducted to address the security issues of mobile agents with a strong focus on the theoretical aspect of the problem. This work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We herein propose several mechanisms, stemming from theoretical advancements, intended to protect both agents and hosts in order to foster the development of business applications that fully exploit the benefits of agent technology. The proposed mechanisms lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. We demonstrate our contribution through application scenarios of a prototyped Information Retrieval system.

  18. A comprehensive Network Security Risk Model for process control networks.

    PubMed

    Henry, Matthew H; Haimes, Yacov Y

    2009-02-01

    The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example. PMID:19000078

  19. Security improvements for rail movements of SNM

    SciTech Connect

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-07-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars.

  20. Maintaining Adequate CO2 Washout for an Advanced EMU via a New Rapid Cycle Amine Technology

    NASA Technical Reports Server (NTRS)

    Chullen, Cinda; Conger, Bruce

    2012-01-01

    Over the past several years, NASA has realized tremendous progress in Extravehicular Activity (EVA) technology development. This has been evidenced by the progressive development of a new Rapid Cycle Amine (RCA) system for the Advanced Extravehicular Mobility Unit (AEMU) Portable Life Support Subsystem (PLSS). The PLSS is responsible for the life support of the crew member in the spacesuit. The RCA technology is responsible for carbon dioxide (CO2) and humidity control. Another aspect of the RCA is that it is on-back vacuum-regenerable, efficient, and reliable. The RCA also simplifies the PLSS schematic by eliminating the need for a condensing heat exchanger for humidity control in the current EMU. As development progresses on the RCA, it is important that the sizing be optimized so that the demand on the PLSS battery is minimized. As well, maintaining the CO2 washout at adequate levels during an EVA is an absolute requirement of the RCA and associated ventilation system. Testing has been underway in-house at NASA Johnson Space Center and analysis has been initiated to evaluate whether the technology provides exemplary performance in ensuring that the CO2 is removed sufficiently and the ventilation flow is adequate for maintaining CO2 washout in the AEMU spacesuit helmet of the crew member during an EVA. This paper will review the recent developments of the RCA unit, testing planned in-house with a spacesuit simulator, and the associated analytical work along with insights from the medical aspect on the testing. 1

  1. Adequately-Sized Nanocarriers Allow Sustained Targeted Drug Delivery to Neointimal Lesions in Rat Arteries.

    PubMed

    Taniguchi, Ryosuke; Miura, Yutaka; Koyama, Hiroyuki; Chida, Tsukasa; Anraku, Yasutaka; Kishimura, Akihiro; Shigematsu, Kunihiro; Kataoka, Kazunori; Watanabe, Toshiaki

    2016-06-01

    In atherosclerotic lesions, the endothelial barrier against the bloodstream can become compromised, resulting in the exposure of the extracellular matrix (ECM) and intimal cells beneath. In theory, this allows adequately sized nanocarriers in circulation to infiltrate into the intimal lesion intravascularly. We sought to evaluate this possibility using rat carotid arteries with induced neointima. Cy5-labeled polyethylene glycol-conjugated polyion complex (PIC) micelles and vesicles, with diameters of 40, 100, or 200 nm (PICs-40, PICs-100, and PICs-200, respectively) were intravenously administered to rats after injury to the carotid artery using a balloon catheter. High accumulation and long retention of PICs-40 in the induced neointima was confirmed by in vivo imaging, while the accumulation of PICs-100 and PICs-200 was limited, indicating that the size of nanocarriers is a crucial factor for efficient delivery. Furthermore, epirubicin-incorporated polymeric micelles with a diameter similar to that of PICs-40 showed significant curative effects in rats with induced neointima, in terms of lesion size and cell number. Specific and effective drug delivery to pre-existing neointimal lesions was demonstrated with adequate size control of the nanocarriers. We consider that this nanocarrier-based drug delivery system could be utilized for the treatment of atherosclerosis. PMID:27183493

  2. Adequate Systemic Perfusion Maintained by a CentriMag during Acute Heart Failure

    PubMed Central

    Favaloro, Roberto R.; Bertolotti, Alejandro; Diez, Mirta; Favaloro, Liliana; Gomez, Carmen; Peradejordi, Margarita; Trentadue, Julio; Hellman, Lorena; Arzani, Yanina; Otero, Pilar Varela

    2008-01-01

    Mechanical circulatory support during severe acute heart failure presents options for myocardial recovery or cardiac replacement. Short-term circulatory support with the newest generation of magnetically levitated centrifugal-flow pumps affords several potential advantages. Herein, we present our experience with such a pump—the CentriMag® (Levitronix LLC; Waltham, Mass) centrifugal-flow ventricular assist device—in 4 critically ill patients who were in cardiogenic shock. From November 2007 through March 2008, 3 patients were supported after cardiac surgery, and 1 after chronic heart failure worsened. Two patients were bridged to heart transplantation, and 2 died during support. Perfusion during support was evaluated in terms of serum lactic acid levels and oxygenation values. In all of the patients, the CentriMag's pump flow was adequate, and continuous mechanical ventilation support was provided. Lactic acid levels substantially improved with CentriMag support and were maintained at near-normal levels throughout. At the same time, arterial pH, PO2, and carbon dioxide levels remained within acceptable ranges. No thromboembolic events or mechanical failures occurred. Our experience indicates that short-term use of the CentriMag ventricular assist device during acute heart failure can restore and adequately support circulation until recovery or until the application of definitive therapy. PMID:18941648

  3. Ideas towards sustainable water security

    NASA Astrophysics Data System (ADS)

    Dalin, Carole

    2016-04-01

    With growing global demands and a changing climate, ensuring water security - the access to sufficient, quality water resources for health and livelihoods and an acceptable level of water related risk - is increasingly challenging. While a billion people still lack access to water, over-exploitation of this resource increases in many developed and developing parts of the world. While some solutions to water stress have been known for a long time, financial, cultural and political barriers often prevent their implementations. This talk will highlight three crucial areas that need to be addressed to progress towards sustainable water security. The first point is on scale, the second on the agricultural sector and irrigation, and the third on food trade and policy.

  4. 48 CFR 832.202-4 - Security for Government financing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... exposure to financial crisis, and credit arrangements. (d) A statement of the status of all State, local... for Government financing. An offeror's financial condition may be considered adequate security to... offeror's financial condition, the contracting officer may obtain, to the extent required, the...

  5. Food production & availability - Essential prerequisites for sustainable food security

    PubMed Central

    Swaminathan, M.S.; Bhavani, R.V.

    2013-01-01

    Food and nutrition security are intimately interconnected, since only a food based approach can help in overcoming malnutrition in an economically and socially sustainable manner. Food production provides the base for food security as it is a key determinant of food availability. This paper deals with different aspects of ensuring high productivity and production without associated ecological harm for ensuring adequate food availability. By mainstreaming ecological considerations in technology development and dissemination, we can enter an era of evergreen revolution and sustainable food and nutrition security. Public policy support is crucial for enabling this. PMID:24135188

  6. 76 FR 78085 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ...The FDIC is seeking public comment to amend the FDIC's regulations in accordance with the requirements of Federal Deposit Insurance Act (FDI Act). Specifically, to prohibit any insured savings association from acquiring and retaining a corporate debt security unless it determines, prior to acquiring such security and periodically thereafter, that the issuer has adequate capacity to meet all......

  7. 31 CFR 226.4 - Adequacy of security-how computed.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Adequacy of security-how computed... TREASURY TAX AND LOAN DEPOSITARIES § 226.4 Adequacy of security—how computed. (a) In qualifying Insurance... insured accounts or deposits) to determine if the security is adequate. The ratio will be computed...

  8. 31 CFR 226.4 - Adequacy of security-how computed.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Adequacy of security-how computed. 226... TREASURY TAX AND LOAN DEPOSITARIES § 226.4 Adequacy of security—how computed. (a) In qualifying Insurance... insured accounts or deposits) to determine if the security is adequate. The ratio will be computed...

  9. 31 CFR 226.4 - Adequacy of security-how computed.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Adequacy of security-how computed. 226... TREASURY TAX AND LOAN DEPOSITARIES § 226.4 Adequacy of security—how computed. (a) In qualifying Insurance... insured accounts or deposits) to determine if the security is adequate. The ratio will be computed...

  10. 31 CFR 226.4 - Adequacy of security-how computed.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Adequacy of security-how computed... TREASURY TAX AND LOAN DEPOSITARIES § 226.4 Adequacy of security—how computed. (a) In qualifying Insurance... insured accounts or deposits) to determine if the security is adequate. The ratio will be computed...

  11. 31 CFR 226.4 - Adequacy of security-how computed.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Adequacy of security-how computed. 226... TREASURY TAX AND LOAN DEPOSITARIES § 226.4 Adequacy of security—how computed. (a) In qualifying Insurance... insured accounts or deposits) to determine if the security is adequate. The ratio will be computed...

  12. 32 CFR 516.7 - Mailing addresses.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Mailing addresses. 516.7 Section 516.7 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION General § 516.7 Mailing addresses. Mailing addresses for organizations referenced...

  13. 47 CFR 97.23 - Mailing address.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Mailing address. 97.23 Section 97.23 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO... name and mailing address. The mailing address must be in an area where the amateur service is...

  14. 47 CFR 97.23 - Mailing address.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Mailing address. 97.23 Section 97.23 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO... name and mailing address. The mailing address must be in an area where the amateur service is...

  15. 47 CFR 97.23 - Mailing address.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Mailing address. 97.23 Section 97.23 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO... name and mailing address. The mailing address must be in an area where the amateur service is...

  16. 47 CFR 97.23 - Mailing address.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Mailing address. 97.23 Section 97.23 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO... name and mailing address. The mailing address must be in an area where the amateur service is...

  17. 47 CFR 97.23 - Mailing address.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Mailing address. 97.23 Section 97.23 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES AMATEUR RADIO... name and mailing address. The mailing address must be in an area where the amateur service is...

  18. 47 CFR 13.10 - Licensee address.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Licensee address. 13.10 Section 13.10 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL RADIO OPERATORS General § 13.10 Licensee address. In accordance with § 1.923 of this chapter all applications must specify an address where...

  19. CCCC Chair's Address: Representing Ourselves, 2008

    ERIC Educational Resources Information Center

    Glenn, Cheryl

    2008-01-01

    This article presents the text of the author's address at the fifty-ninth annual convention of the Conference on College Composition and Communication (CCCC) in March 2008. In her address, the author picks up strands of previous Chairs' addresses and weaves them through the fabric of her remarks. What she hopes will give sheen to the fabric is her…

  20. 75 FR 49813 - Change of Address

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... COMMISSION 11 CFR Parts 9405, 9407, 9409, 9410, 9420, and 9428 Change of Address AGENCY: United States... Assistance Commission (EAC) is amending its regulations to reflect a change of address for its headquarters. This technical amendment is a nomenclature change that updates and corrects the address for...