Interacting with a security system: The Argus user interface
DOE Office of Scientific and Technical Information (OSTI.GOV)
Behrin, E.; Davis, G.E.
1993-12-31
In the mid-1980s the Lawrence Livermore National Laboratory (LLNL) developed the Argus Security System. Key requirements were to eliminate the telephone as a verification device for opening and closing alarm stations and to allow need-to-know access through local enrollment at alarm stations. Resulting from these requirements was an LLNL-designed user interface called the Remote Access Panel (RAP). The Argus RAP interacts with Argus field processors to allow secure station mode changes and local station enrollment, provides user direction and response, and assists station maintenance personnel. It consists of a tamper-detecting housing containing a badge reader, a keypad with sight screen,more » special-purpose push buttons and a liquid-crystal display. This paper discusses Argus system concepts, RAP design, functional characteristics and its physical configurations. The paper also describes the RAP`s use in access-control booths, it`s integration with biometrics and its operation for multi-person-rule stations and compartmented facilities.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferrell, Paul; Hanson, Paige; Ardi, Calvin
2016-11-04
A system for processing network packet capture streams, extracting metadata and generating flow records (via Argus). The system can be used by network security operators and analysts to enable forensic investigations for network security events.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Willoner, T.; Turlington, R.; Koenig, R.
The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, inmore » 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault. Deploying the ARG-US RFID system lends to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including radiation and environmental monitoring. The successful completion of the testing program will provide field data to support future development and testing.« less
1982-04-30
Nuclear Test Operations South Atlantic ARGUS Christofilos Theory FLORAL ARGUS Effect JASON Van Allen Belts Nuclear Test Personnel Review (MTPR) MIDAS ...precluded radiological exposure. Project 7.3 -- Surface Measurements (Project MIDAS ) Agencies: This project, code-named MIDAS for security reasons, was...weapon casings, but these personnel were badged and equipped with ten self-reading pocket dosimeters as well as alpha-detection equipment provided by the
An overview of the DII-HEP OpenStack based CMS data analysis
NASA Astrophysics Data System (ADS)
Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.
2015-05-01
An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, J.; Lee, H.; De Lurgio, P.
Automated monitoring and tracking of materials with radio frequency identification (RFID) technology can significantly improve both the operating efficiency of radiological facilities and the application of the ALARA (as low as reasonably achievable) principle in them. One such system, called ARG-US, has been developed by Argonne National Laboratory for the U.S. Department of Energy (DOE) Packaging and Certification Program to use in managing sensitive nuclear and radioactive materials. Several ARG-US systems are in various stages of deployment and advanced testing across DOE sites. ARG-US utilizes sensors in the tags to continuously monitor the state of health of the packaging andmore » promptly disseminates alarms to authorized users. In conjunction with global positioning system (GPS) tracking provided by TRANSCOM, the system can also monitor and track packages during transport. A compact dosimeter has been incorporated in the ARG-US tags via an onboard universal asynchronous receiver/transmitter interface. The detector has a wide measurement range for gamma radiation - from 0.1 mSv/h to 8 Sv/h. The detector is able to generate alarms for both high and low radiation and for a high cumulative dose. In a large installation, strategically located dosimeter-enabled tags can yield an accurate, real-time, 2D or 3D dose field map that can be used to enhance facility safety, security, and safeguards. This implementation can also lead to a reduced need for manned surveillance and reduced exposure of personnel to radiation, consistent with the ALARA principle at workplaces. (authors)« less
Triage Visualization for Digital Media Exploitation
2013-09-01
and responding to threats. Previous work includes NVisionIP [17], a network visualization 8 tool that processes Argus NetFlow [18] data. NVisionIP...2012.02.021 [17] K. Lakkaraju et al., “Nvisionip: netflow visualizations of system state for security situational awareness,” in Proceedings of the 2004 ACM
Retinal Prosthesis System for Advanced Retinitis Pigmentosa: A Health Technology Assessment Update
Lee, Christine; Tu, Hong Anh; Wells, David; Holubowich, Corinne
2017-01-01
Background Retinitis pigmentosa is a group of inherited disorders characterized by the degeneration of the photoreceptors in the retina, resulting in progressive vision loss. The Argus II system is designed to restore partial functional vision in patients with profound vision loss from advanced retinitis pigmentosa. At present, it is the only treatment option approved by Health Canada for this patient population. In June 2016, Health Quality Ontario published a health technology assessment of the Argus II retinal prosthesis system for patients with advanced retinitis pigmentosa. Based on that assessment, the Ontario Health Technology Advisory Committee recommended against publicly funding the Argus II system for this population. It also recommended that Health Quality Ontario re-evaluate the evidence in 1 year. The objective of this report was to examine new evidence published since the 2016 health technology assessment. Methods We completed a health technology assessment, which included an evaluation of clinical benefits and harms, value for money, and patient preferences related to the Argus II system. We performed a systematic literature search for studies published since the 2016 Argus II health technology assessment. We developed a Markov decision-analytic model to assess the cost-effectiveness of the Argus II system compared with standard care, and we calculated incremental cost-effectiveness ratios over a 20-year time horizon. We also conducted a five-year budget impact analysis. Finally, we interviewed people with retinitis pigmentosa about their lived experience with vision loss, and with the Argus II system. Results Four publications from one multicentre international study were included in the clinical review. Patients showed significant improvements in visual function and functional outcomes with the Argus II system, and these outcomes were sustained up to a 5-year follow-up (moderate quality of evidence). The safety profile was generally acceptable. In the base case economic analysis, the Argus II system was cost-effective compared with standard care if the willingness to pay was more than $97,429 per quality-adjusted life-year. We estimated that funding the Argus II system would cost the province $0.71 to $0.78 million per year over 5 years, assuming 4 implants per year. People with lived experience spoke about the challenges of retinitis pigmentosa, including the gradual but persistent progression of the disease; its impact on their quality of life and their families; and the accessibility challenges they faced. Those who used the Argus II system spoke about its positive impact on their quality of life. Conclusions Based on evidence of moderate quality, the Argus II retinal prosthesis system improved visual function, real-life functional outcomes, and quality of life in patients with advanced retinitis pigmentosa. The Argus II system is expensive, but the cost to publicly fund it would be low, because of the small number of eligible patients. The Argus II system can only enable perception of light/dark and shapes/objects, but these advancements represent important gains for people with retinitis pigmentosa in terms of mobility and quality of life. PMID:29201260
Tanker Argus: Re-supply for a LEO Cryogenic Propellant Depot
NASA Astrophysics Data System (ADS)
St. Germain, B.; Olds, J.; Kokan, T.; Marcus, L.; Miller, J.
The Argus reusable launch vehicle (RLV) concept is a single-stage-to-orbit conical, winged bodied vehicle powered by two liquid hydrogen/liquid oxygen supercharged ejector ramjets. The 3rd generation Argus launch vehicle utilizes advanced vehicle technologies along with a Maglev launch assist track. A tanker version of the Argus RLV is envisioned to provide an economical means of providing liquid fuel and oxidizer to an orbiting low-Earth orbit (LEO) propellant depot. This depot could then provide propellant to various spacecraft, including reusable orbital transfer vehicles used to ferry space solar power satellites to geo-stationary orbit. Two different tanker Argus configurations were analyzed. The first simply places additional propellant tanks inside the payload bay of an existing Argus reusable launch vehicle. The second concept is a modified Argus RLV in which the payload bay is removed and the vehicle propellant tanks are stretched to hold extra propellant. An iterative conceptual design process was used to design both Argus vehicles. This process involves various disciplines including aerodynamics, trajectory analysis, weights &structures, propulsion, operations, safety, and cost/economics. The payload bay version of tanker Argus, which has a gross mass of 256.3MT, is designed to deliver a 9.07MT payload to LEO. This payload includes propellant and the tank structure required to secure this propellant in the payload bay. The modified, pure tanker version of Argus has a gross mass of 218.6MT and is sized to deliver a full 9.07MT of propellant to LEO. The economic analysis performed for this study involved the calculation of many factors including the design/development and recurring costs of each vehicle. These results were used along with other economic assumptions to determine the "per kilogram" cost of delivering propellant to orbit. The results show that for a given flight rate the "per kilogram" cost is cheaper for the pure tanker version of Argus. However, the main goal of this study was to determine at which flight rate would it be financially beneficial to spend more development money to modify an existing, sunk cost, payload bay version of Argus in order to create a more efficient pure tanker version. For flight rates greater than approximately 320 flights/year, there is only a small financial motivation to develop a pure tanker version. At this flight rate both versions of Argus are able to deliver propellant to LEO at an approximate cost of 375/kg.
Five-Year Safety and Performance Results from the Argus II Retinal Prosthesis System Clinical Trial.
da Cruz, Lyndon; Dorn, Jessy D; Humayun, Mark S; Dagnelie, Gislin; Handa, James; Barale, Pierre-Olivier; Sahel, José-Alain; Stanga, Paulo E; Hafezi, Farhad; Safran, Avinoam B; Salzmann, Joel; Santos, Arturo; Birch, David; Spencer, Rand; Cideciyan, Artur V; de Juan, Eugene; Duncan, Jacque L; Eliott, Dean; Fawzi, Amani; Olmos de Koo, Lisa C; Ho, Allen C; Brown, Gary; Haller, Julia; Regillo, Carl; Del Priore, Lucian V; Arditi, Aries; Greenberg, Robert J
2016-10-01
The Argus II Retinal Prosthesis System (Second Sight Medical Products, Inc, Sylmar, CA) was developed to restore some vision to patients blind as a result of retinitis pigmentosa (RP) or outer retinal degeneration. A clinical trial was initiated in 2006 to study the long-term safety and efficacy of the Argus II System in patients with bare or no light perception resulting from end-stage RP. Prospective, multicenter, single-arm clinical trial. Within-patient controls included the nonimplanted fellow eye and patients' native residual vision compared with their vision with the Argus II. Thirty participants in 10 centers in the United States and Europe. The worse-seeing eye of blind patients was implanted with the Argus II. Patients wore glasses mounted with a small camera and a video processor that converted images into stimulation patterns sent to the electrode array on the retina. The primary outcome measures were safety (the number, seriousness, and relatedness of adverse events) and visual function, as measured by 3 computer-based, objective tests. Secondary measures included functional vision performance on objectively scored real-world tasks. Twenty-four of 30 patients remained implanted with functioning Argus II Systems at 5 years after implantation. Only 1 additional serious adverse event was experienced after the 3-year time point. Patients performed significantly better with the Argus II on than off on all visual function tests and functional vision tasks. The 5-year results of the Argus II trial support the long-term safety profile and benefit of the Argus II System for patients blind as a result of RP. The Argus II is the first and only retinal implant to have market approval in the European Economic Area, the United States, and Canada. Copyright © 2016 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.
Argus: a new instrument for the measurement of the stratospheric dynamical tracers, N2O and CH4
NASA Technical Reports Server (NTRS)
Loewenstein, Max; Jost, H.; Grose, J.; Eilers, J.; Lynch, D.; Jensen, S.; Marmie, J.
2002-01-01
We describe here a new instrument for the simultaneous, in situ measurement of the stratospheric tracer molecules, nitrous oxide (N2O) and methane (CH4). Argus is unique in its small size making it well suited for limited payload atmospheric research platforms. Argus employs second harmonic spectroscopy using tunable lead-salt diode lasers emitting in the mid-infrared. We first explain the Argus design philosophy followed by detailed descriptions of the instrument's optical, mechanical, and thermal sub-systems. Argus employs an in-flight calibration system providing real time calibrations and tightly constrained uncertainty estimates of the returned data. Data analysis is carried out using non-linear least-squares model fits to the acquired second harmonic spectra. A sampling of Argus data acquired on a recent stratospheric research campaign in the Arctic winter is presented.
Five-year safety and performance results from the Argus II Retinal Prosthesis System clinical trial
da Cruz, Lyndon; Dorn, Jessy D.; Humayun, Mark S.; Dagnelie, Gislin; Handa, James; Barale, Pierre-Olivier; Sahel, José-Alain; Stanga, Paulo E.; Hafezi, Farhad; Safran, Avinoam B.; Salzmann, Joel; Santos, Arturo; Birch, David; Spencer, Rand; Cideciyan, Artur V.; de Juan, Eugene; Duncan, Jacque L.; Eliott, Dean; Fawzi, Amani; Olmos de Koo, Lisa C.; Ho, Allen C.; Brown, Gary; Haller, Julia; Regillo, Carl; Del Priore, Lucian V.; Arditi, Aries; Greenberg, Robert J.
2016-01-01
Purpose The Argus® II Retinal Prosthesis System (Second Sight Medical Products, Inc., Sylmar, CA) was developed to restore some vision to patients blind from retinitis pigmentosa (RP) or outer retinal degeneration. A clinical trial was initiated in 2006 to study the long-term safety and efficacy of the Argus II System in patients with bare or no light perception due to end-stage RP. Design The study is a prospective, multicenter, single-arm, clinical trial. Within-patient controls included the non-implanted fellow eye and patients' native residual vision compared to their vision when using the System. Subjects There were 30 subjects in 10 centers in the U.S. and Europe. Methods The worse-seeing eye of blind patients was implanted with the Argus II System. Patients wore glasses mounted with a small camera and a video processor that converted images into stimulation patterns sent to the electrode array on the retina. Main Outcome Measures The primary outcome measures were safety (the number, seriousness, and relatedness of adverse events) and visual function, as measured by three computer-based, objective tests. Secondary measures included functional vision performance on objectively-scored real-world tasks. Results Twenty-four out of 30 patients remained implanted with functioning Argus II Systems at 5 years post-implant. Only one additional serious adverse event was experienced since the 3-year time point. Patients performed significantly better with the System ON than OFF on all visual function tests and functional vision tasks. Conclusions The five-year results of the Argus II trial support the long-term safety profile and benefit of the Argus II System for patients blind from RP. The Argus II is the first and only retinal implant to have market approval in the European Economic Area, the United States, and Canada. PMID:27453256
Voss, Clifford I.; Boldt, David; Shapiro, Allen M.
1997-01-01
This report describes a Graphical-User Interface (GUI) for SUTRA, the U.S. Geological Survey (USGS) model for saturated-unsaturated variable-fluid-density ground-water flow with solute or energy transport,which combines a USGS-developed code that interfaces SUTRA with Argus ONE, a commercial software product developed by Argus Interware. This product, known as Argus Open Numerical Environments (Argus ONETM), is a programmable system with geographic-information-system-like (GIS-like) functionality that includes automated gridding and meshing capabilities for linking geospatial information with finite-difference and finite-element numerical model discretizations. The GUI for SUTRA is based on a public-domain Plug-In Extension (PIE) to Argus ONE that automates the use of ArgusONE to: automatically create the appropriate geospatial information coverages (information layers) for SUTRA, provide menus and dialogs for inputting geospatial information and simulation control parameters for SUTRA, and allow visualization of SUTRA simulation results. Following simulation control data and geospatial data input bythe user through the GUI, ArgusONE creates text files in a format required for normal input to SUTRA,and SUTRA can be executed within the Argus ONE environment. Then, hydraulic head, pressure, solute concentration, temperature, saturation and velocity results from the SUTRA simulation may be visualized. Although the GUI for SUTRA discussed in this report provides all of the graphical pre- and post-processor functions required for running SUTRA, it is also possible for advanced users to apply programmable features within Argus ONE to modify the GUI to meet the unique demands of particular ground-water modeling projects.
Argus: A W-band 16-pixel focal plane array for the Green Bank Telescope
NASA Astrophysics Data System (ADS)
Devaraj, Kiruthika; Church, Sarah; Cleary, Kieran; Frayer, David; Gawande, Rohit; Goldsmith, Paul; Gundersen, Joshua; Harris, Andrew; Kangaslahti, Pekka; Readhead, Tony; Reeves, Rodrigo; Samoska, Lorene; Sieth, Matt; Voll, Patricia
2015-05-01
We are building Argus, a 16-pixel square-packed focal plane array that will cover the 75-115.3 GHz frequency range on the Robert C. Byrd Green Bank Telescope (GBT). The primary research area for Argus is the study of star formation within our Galaxy and nearby galaxies. Argus will map key molecules that trace star formation, including carbon monoxide (CO) and hydrogen cyanide (HCN). An additional key science area is astrochemistry, which will be addressed by observing complex molecules in the interstellar medium, and the study of formation of solar systems, which will be addressed by identifying dense pre-stellar cores and by observing comets in our solar system. Argus has a highly scalable architecture and will be a technology path finder for larger arrays. The array is modular in construction, which will allow easy replacement of malfunctioning and poorly performing components.
Retinal Prosthesis System for Advanced Retinitis Pigmentosa: A Health Technology Assessment
Lee, Christine; Tu, Hong Anh; Weir, Mark; Holubowich, Corinne
2016-01-01
Background Retinitis pigmentosa is a group of genetic disorders that involves the breakdown and loss of photoreceptors in the retina, resulting in progressive retinal degeneration and eventual blindness. The Argus II Retinal Prosthesis System is the only currently available surgical implantable device approved by Health Canada. It has been shown to improve visual function in patients with severe visual loss from advanced retinitis pigmentosa. The objective of this analysis was to examine the clinical effectiveness, cost-effectiveness, budget impact, and safety of the Argus II system in improving visual function, as well as exploring patient experiences with the system. Methods We performed a systematic search of the literature for studies examining the effects of the Argus II retinal prosthesis system in patients with advanced retinitis pigmentosa, and appraised the evidence according to the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) Working Group criteria, focusing on visual function, functional outcomes, quality of life, and adverse events. We developed a Markov decision-analytic model to assess the cost-effectiveness of the Argus II system compared with standard care over a 10-year time horizon. We also conducted a 5-year budget impact analysis. We used a qualitative design and an interview methodology to examine patients’ lived experience, and we used a modified grounded theory methodology to analyze information from interviews. Transcripts were coded, and themes were compared against one another. Results One multicentre international study and one single-centre study were included in the clinical review. In both studies, patients showed improved visual function with the Argus II system. However, the sight-threatening surgical complication rate was substantial. In the base-case analysis, the Argus II system was cost-effective compared with standard care only if willingness-to-pay was more than $207,616 per quality-adjusted life-year. The 5-year budget impact of funding the Argus II system ranged from $800,404 to $837,596. Retinitis pigmentosa significantly affects people's ability to navigate physical and virtual environments. Argus II was described as enabling the fundamental elements of sight. As such, it had a positive impact on quality of life for people with retinitis pigmentosa. Conclusions Based on evidence of moderate quality, patients with advanced retinitis pigmentosa who were implanted with the Argus II retinal prosthesis system showed significant improvement in visual function, real-life functional outcomes, and quality of life, but there were complications associated with the surgery that could be managed through standard ophthalmologic treatments. The costs for the technology are high. PMID:27468325
Retinal Prosthesis System for Advanced Retinitis Pigmentosa: A Health Technology Assessment.
2016-01-01
Retinitis pigmentosa is a group of genetic disorders that involves the breakdown and loss of photoreceptors in the retina, resulting in progressive retinal degeneration and eventual blindness. The Argus II Retinal Prosthesis System is the only currently available surgical implantable device approved by Health Canada. It has been shown to improve visual function in patients with severe visual loss from advanced retinitis pigmentosa. The objective of this analysis was to examine the clinical effectiveness, cost-effectiveness, budget impact, and safety of the Argus II system in improving visual function, as well as exploring patient experiences with the system. We performed a systematic search of the literature for studies examining the effects of the Argus II retinal prosthesis system in patients with advanced retinitis pigmentosa, and appraised the evidence according to the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) Working Group criteria, focusing on visual function, functional outcomes, quality of life, and adverse events. We developed a Markov decision-analytic model to assess the cost-effectiveness of the Argus II system compared with standard care over a 10-year time horizon. We also conducted a 5-year budget impact analysis. We used a qualitative design and an interview methodology to examine patients' lived experience, and we used a modified grounded theory methodology to analyze information from interviews. Transcripts were coded, and themes were compared against one another. One multicentre international study and one single-centre study were included in the clinical review. In both studies, patients showed improved visual function with the Argus II system. However, the sight-threatening surgical complication rate was substantial. In the base-case analysis, the Argus II system was cost-effective compared with standard care only if willingness-to-pay was more than $207,616 per quality-adjusted life-year. The 5-year budget impact of funding the Argus II system ranged from $800,404 to $837,596. Retinitis pigmentosa significantly affects people's ability to navigate physical and virtual environments. Argus II was described as enabling the fundamental elements of sight. As such, it had a positive impact on quality of life for people with retinitis pigmentosa. Based on evidence of moderate quality, patients with advanced retinitis pigmentosa who were implanted with the Argus II retinal prosthesis system showed significant improvement in visual function, real-life functional outcomes, and quality of life, but there were complications associated with the surgery that could be managed through standard ophthalmologic treatments. The costs for the technology are high.
Argus+: The Future of Wide-Field, Spectral-Line Imaging at 3-mm with the Green Bank Telescope
NASA Astrophysics Data System (ADS)
Maddalena, Ronald; Frayer, David; Lockman, Felix; O'Neil, Karen; White, Steven; Argus+ Collaboration
2018-01-01
The Robert C Byrd Green Bank Telescope has met its design goal of providing high-quality observations at 115 GHz. Observers also have access to the new, 16-pixel, 3-mm Argus receiver, which is providing high-dynamic range images over wide fields for the multitude of spectral lines between 85 and 115 GHz, including CO, 13CO, C18O, SiO, HCN, HCO+, HNC, N2H+, and CS. The small number of pixels in Argus limits its ability to map many of the most interesting objects whose extent exceeds many arc-minutes. The successful performance of Argus, and its modular design, demonstrates that receivers with many more pixels could be built for the GBT. A 12 x 12 array of the Argus design would have mapping speeds about nine times faster than Argus without suffering any degradation in performance for the outer pixels in the array. We present our plans to build the next-generation Argus instrument (Argus+) with 144-pixels, a footprint 5’x5’, and 7" resolution at 110 GHz. The project will be a collaboration between the Green Bank Observatory and university groups, who will supply key components. The key science drivers for Argus+ are studies of molecular filaments in the Milky Way, studies of molecular clouds in nearby galaxies, and the observations of rapidly evolving solar system objects.
Long-term results from an epiretinal prosthesis to restore sight to the blind
Ho, Allen C.; Humayun, Mark S.; Dorn, Jessy D.; da Cruz, Lyndon; Dagnelie, Gislin; Handa, James; Barale, Pierre-Olivier; Sahel, José-Alain; Stanga, Paulo E.; Hafezi, Farhad; Safran, Avinoam B.; Salzmann, Joel; Santos, Arturo; Birch, David; Spencer, Rand; Cideciyan, Artur V.; de Juan, Eugene; Duncan, Jacque L.; Eliott, Dean; Fawzi, Amani; Olmos de Koo, Lisa C.; Brown, Gary C.; Haller, Julia A.; Regillo, Carl D.; Del Priore, Lucian V.; Arditi, Aries; Geruschat, Duane R.; Greenberg, Robert J.
2015-01-01
Purpose Retinitis Pigmentosa (RP) is a group of inherited retinal degenerations leading to blindness due to photoreceptor loss. A rare disease, it affects about 100,000 people in the United States. There is no cure and no approved medical therapy to slow or reverse RP. The purpose of this clinical trial was to evaluate the safety, reliability, and benefit of the Argus® II Retinal Prosthesis System (Second Sight Medical Products, Inc., Sylmar, CA) in restoring some visual function to subjects completely blind from RP. Herein, we report clinical trial results at 1 and 3 years post-implant. Design The study is a multicenter, single-arm, prospective clinical trial. Subjects There were 30 subjects in 10 centers in the U.S. and Europe. Subjects served as their own controls – i.e., implanted eye vs. fellow eye, and System ON vs. System OFF (native residual vision). Methods The Argus II System was implanted on and in a single eye (typically the worse-seeing eye) of blind subjects. Subjects wore glasses mounted with a small camera and a video processor that converted images into stimulation patterns sent to the electrode array on the retina. Main Outcome Measures The primary outcome measures were safety (the number, seriousness, and relatedness of adverse events) and visual function, as measured by three computer-based, objective tests. Results Twenty-nine out of 30 subjects remained implanted with functioning Argus II Systems at 3 years post-implant. Eleven subjects experienced a total of 23 serious device- or surgery-related adverse events. All were treated with standard ophthalmic care. As a group, subjects performed significantly better with the System ON than OFF on all visual function tests and functional vision assessments. Conclusions The three-year results of the Argus II trial support the long-term safety profile and benefit of the Argus II System for patients blind from RP. Earlier results from this trial were used to gain approval of the Argus II by the FDA and a CE Mark in Europe. The Argus II System is the first and only retinal implant to have both approvals. PMID:26162233
The Argus+ Project: Wide-field, high-resolution 3mm molecular imaging with the Green Bank Telescope
NASA Astrophysics Data System (ADS)
Lockman, Felix J.
2018-06-01
Argus+ is a large format radio camera system for the Green Bank Telescope (GBT) that will carry out high-fidelity spectroscopic mapping in the molecule-rich 3mm band. The project builds on the success of the prototype 16-pixel Argus 3mm receiver. Argus+ will be nine copies of Argus in a single dewer, with lower noise amplifiers, for an increase of a factor of ten in mapping speed. The Argus+ project includes a dedicated spectrometer and improvements to the GBT metrology that will more than double the amount of useful observing time at 3mm. With a footprint of 6'x6’, 144 pixels, an angular resolution of 6″ to 8″, and the sensitivity of a filled aperture, Argus+ will map fundamental transitions of important species over hundreds of square arc-min with a spatial dynamic range of 104 to 105. The Argus+ project includes two legacy surveys: a survey of molecules in the Gould Belt molecular clouds, and a survey of dense gas in nearby galaxies. These will be carried out by the scientific community and will be defined through a series of workshops. The Project has a strong educational component and will involve undergraduates at every stage. It will be incorporated into new and existing outreach programs, and will produce materials for the Green Bank Science Center. Argus+ will be operated as an open skies facility of the Green Bank Observatory, with the majority of its use being allocated through the normal proposal review process.
Dissemination and support of ARGUS for accelerator applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The ARGUS code is a three-dimensional code system for simulating for interactions between charged particles, electric and magnetic fields, and complex structure. It is a system of modules that share common utilities for grid and structure input, data handling, memory management, diagnostics, and other specialized functions. The code includes the fields due to the space charge and current density of the particles to achieve a self-consistent treatment of the particle dynamics. The physic modules in ARGUS include three-dimensional field solvers for electrostatics and electromagnetics, a three-dimensional electromagnetic frequency-domain module, a full particle-in-cell (PIC) simulation module, and a steady-state PIC model.more » These are described in the Appendix to this report. This project has a primary mission of developing the capabilities of ARGUS in accelerator modeling of release to the accelerator design community. Five major activities are being pursued in parallel during the first year of the project. To improve the code and/or add new modules that provide capabilities needed for accelerator design. To produce a User's Guide that documents the use of the code for all users. To release the code and the User's Guide to accelerator laboratories for their own use, and to obtain feed-back from the. To build an interactive user interface for setting up ARGUS calculations. To explore the use of ARGUS on high-power workstation platforms.« less
Huchin-Mian, Juan Pablo; Briones-Fourzán, Patricia; Simá-Alvarez, Raúl; Cruz-Quintana, Yanis; Pérez-Vega, Juan Antonio; Lozano-Alvarez, Enrique; Pascual-Jiménez, Cristina; Rodríguez-Canul, Rossanna
2009-09-23
The Caribbean spiny lobster Panulirus argus is a valuable fishing resource and the trade in frozen lobster tails is an important industry. However, the presence of the pathogenic virus Panulirus argus Virus 1 (PaV1), which causes systemic infection in P. argus and is particularly lethal to juvenile individuals, has not been previously examined in imported/exported lobster products. We used PCR assays to determine the presence of PaV1 in abdominal muscle tissue of 22 frozen P. argus tails exported from Belize to Mexico. Based on their size, the tails belonged to subadult-adult lobsters. Using specific primers targeted for PaV1 resulted in 11 tails showing a specific 499 bp band. The sequence of positive amplified fragments showed a high similarity to PaV1 (95% identity with GenBank accession no. EF206313.1). Although the pathogenicity of PaV1 was not evaluated in the present study, our results provide the first evidence of PaV1 in frozen lobster tails exported in the seafood industry as well as the first molecular evidence of PaV1 in adult lobsters.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The ARGUS code is a three-dimensional code system for simulating for interactions between charged particles, electric and magnetic fields, and complex structure. It is a system of modules that share common utilities for grid and structure input, data handling, memory management, diagnostics, and other specialized functions. The code includes the fields due to the space charge and current density of the particles to achieve a self-consistent treatment of the particle dynamics. The physic modules in ARGUS include three-dimensional field solvers for electrostatics and electromagnetics, a three-dimensional electromagnetic frequency-domain module, a full particle-in-cell (PIC) simulation module, and a steady-state PIC model.more » These are described in the Appendix to this report. This project has a primary mission of developing the capabilities of ARGUS in accelerator modeling of release to the accelerator design community. Five major activities are being pursued in parallel during the first year of the project. To improve the code and/or add new modules that provide capabilities needed for accelerator design. To produce a User`s Guide that documents the use of the code for all users. To release the code and the User`s Guide to accelerator laboratories for their own use, and to obtain feed-back from the. To build an interactive user interface for setting up ARGUS calculations. To explore the use of ARGUS on high-power workstation platforms.« less
Finn, Avni P; Grewal, Dilraj S; Vajzovic, Lejla
2018-01-01
Retinitis pigmentosa (RP) is a group of heterogeneous inherited retinal degenerative disorders characterized by progressive rod and cone dysfunction and ensuing photoreceptor loss. Many patients suffer from legal blindness by their 40s or 50s. Artificial vision is considered once patients have lost all vision to the point of bare light perception or no light perception. The Argus II retinal prosthesis system is one such artificial vision device approved for patients with RP. This review focuses on the factors important for patient selection. Careful pre-operative screening, counseling, and management of patient expectations are critical for the successful implantation and visual rehabilitation of patients with the Argus II device.
Highly Reusable Space Transportation System Concept Evaluation (The Argus Launch Vehicle)
NASA Technical Reports Server (NTRS)
Olds, John R.; Bellini, Peter X.
1998-01-01
This paper summarizes the results of a conceptual design study that was performed in support of NASA's recent Highly Reusable Space Transportation study. The Argus concept uses a Maglifter magnetic-levitation sled launch assist system to accelerate it to a takeoff ground speed of 800 fps on its way to delivering a payload of 20,000 lb. to low earth orbit. Main propulsion is provided by two supercharged ejector rocket engines. The vehicle is autonomous and is fully reusable. A conceptual design exercise determined the vehicle gross weight to be approximately 597,250 lb. and the dry weight to be 75,500 lb. Aggressive weight and operations cost assumptions were used throughout the design process consistent with a second-generation reusable system that might be deployed in 10-15 years. Drawings, geometry, and weight of the concept are included. Preliminary development, production, and operations costs along with a business scenario assuming a price-elastic payload market are also included. A fleet of three Argus launch vehicles flying a total of 149 flights per year is shown to have a financial internal rate of return of 28%. At $169/lb., the recurring cost of Argus is shown to meet the study goal of $100/lb.-$200/lb., but optimum market price results in only a factor of two to five reduction compared to today's launch systems.
Huchin-Mian, Juan Pablo; Rodríguez-Canul, Rossanna; Arias-Bañuelos, Efrain; Simá-Alvarez, Raúl; Pérez-Vega, Juan A; Briones-Fourzán, Patricia; Lozano-Alvarez, Enrique
2008-04-01
Macroscopic evidence, histological sections, transmission electron microscopy (TEM) evaluation, and PCR analyses of 25 apparently diseased juvenile spiny lobsters Panulirus argus from the reef lagoon of Puerto Morelos, Mexico, showed the presence of Panulirus argus Virus 1 (PaV1). Cowdry Type A intranuclear viral inclusions were observed in histological analyses, icosahedral viral particles were observed by TEM, and PCR using specific primers for PaV1 amplified a fragment of 499 bp. This is the first report of PaV1 infecting P. argus outside the Florida Keys, USA.
Pascual Jiménez, Cristina; Huchin-Mian, Juan Pablo; Simões, Nuno; Briones-Fourzán, Patricia; Lozano-Álvarez, Enrique; Sánchez Arteaga, Ariadna; Pérez-Vega, Juan Antonio; Simá-Álvarez, Raúl; Rosas Vazquez, Carlos; Rodríguez-Canul, Rossanna
2012-08-27
The present study compares 13 physiological and immunological variables between a group of healthy Panulirus argus lobsters and a group of lobsters naturally infected with Panulirus argus Virus 1 (PaV1). Viral infection was determined through histopathology and PCR. Ten of the 13 variables differed significantly between the 2 groups. Using these variables, a principal component analysis yielded 2 separate clusters: one corresponding to the healthy group and the other corresponding to the infected group. In particular, infected lobsters exhibited significantly lower levels of osmotic pressure, total hemocyte counts, plasmatic proteins, and total phenoloxidase (PO) activity in plasma, as well as significantly higher levels of cholesterol and acylglycerides. These features are consistent with metabolic wasting, hyperlipidemia, and presumed immune suppression. Infection with PaV1 appears to increase the susceptibility of lobsters to some other opportunistic pathogens, as 61.1% of infected lobsters presented infestations of ciliate epibionts (Epystilis and Zoothamniun) in the gill chamber compared with 11.5% lobsters in the healthy group. Infected lobsters also showed significantly higher levels of total PO activity in degranulated hemocytes and trypsin inhibitor activity, potentially indicating activation of immune response by the PO system during the systemic infection with PaV1.
Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Ronald; Liu, Yung; Shuler, J.M.
Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institutemore » (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.« less
Visual BOLD Response in Late Blind Subjects with Argus II Retinal Prosthesis
Castaldi, E.; Cicchini, G. M.; Cinelli, L.; Rizzo, S.; Morrone, M. C.
2016-01-01
Retinal prosthesis technologies require that the visual system downstream of the retinal circuitry be capable of transmitting and elaborating visual signals. We studied the capability of plastic remodeling in late blind subjects implanted with the Argus II Retinal Prosthesis with psychophysics and functional MRI (fMRI). After surgery, six out of seven retinitis pigmentosa (RP) blind subjects were able to detect high-contrast stimuli using the prosthetic implant. However, direction discrimination to contrast modulated stimuli remained at chance level in all of them. No subject showed any improvement of contrast sensitivity in either eye when not using the Argus II. Before the implant, the Blood Oxygenation Level Dependent (BOLD) activity in V1 and the lateral geniculate nucleus (LGN) was very weak or absent. Surprisingly, after prolonged use of Argus II, BOLD responses to visual input were enhanced. This is, to our knowledge, the first study tracking the neural changes of visual areas in patients after retinal implant, revealing a capacity to respond to restored visual input even after years of deprivation. PMID:27780207
Geruschat, Duane R; Richards, Thomas P; Arditi, Aries; da Cruz, Lyndon; Dagnelie, Gislin; Dorn, Jessy D; Duncan, Jacque L; Ho, Allen C; Olmos de Koo, Lisa C; Sahel, José-Alain; Stanga, Paulo E; Thumann, Gabriele; Wang, Vizhong; Greenberg, Robert J
2016-05-01
The purpose of this analysis was to compare observer-rated tasks in patients implanted with the Argus II Retinal Prosthesis System, when the device is ON versus OFF. The Functional Low-Vision Observer Rated Assessment (FLORA) instrument was administered to 26 blind patients implanted with the Argus II Retinal Prosthesis System at a mean follow-up of 36 months. FLORA is a multi-component instrument that consists in part of observer-rated assessment of 35 tasks completed with the device ON versus OFF. The ease with which a patient completes a task is scored using a four-point scale, ranging from easy (score of 1) to impossible (score of 4). The tasks are evaluated individually and organised into four discrete domains, including 'Visual orientation', 'Visual mobility', 'Daily life and 'Interaction with others'. Twenty-six patients completed each of the 35 tasks. Overall, 24 out of 35 tasks (69 per cent) were statistically significantly easier to achieve with the device ON versus OFF. In each of the four domains, patients' performances were significantly better (p < 0.05) with the device ON versus OFF, ranging from 19 to 38 per cent improvement. Patients with an Argus II Retinal Prosthesis implanted for 18 to 44 months (mean 36 months), demonstrated significantly improved completion of vision-related tasks with the device ON versus OFF. © 2016 The Authors Clinical and Experimental Optometry published by John Wiley & Sons Australia, Ltd on behalf of Optometry Australia.
Richards, Thomas P; Arditi, Aries; da Cruz, Lyndon; Dagnelie, Gislin; Dorn, Jessy D; Duncan, Jacque L; Ho, Allen C; Olmos de Koo, Lisa C; Sahel, José‐Alain; Stanga, Paulo E; Thumann, Gabriele; Wang, Vizhong; Greenberg, Robert J
2016-01-01
Abstract Objective The purpose of this analysis was to compare observer‐rated tasks in patients implanted with the Argus II Retinal Prosthesis System, when the device is ON versus OFF. Methods The Functional Low‐Vision Observer Rated Assessment (FLORA) instrument was administered to 26 blind patients implanted with the Argus II Retinal Prosthesis System at a mean follow‐up of 36 months. FLORA is a multi‐component instrument that consists in part of observer‐rated assessment of 35 tasks completed with the device ON versus OFF. The ease with which a patient completes a task is scored using a four‐point scale, ranging from easy (score of 1) to impossible (score of 4). The tasks are evaluated individually and organised into four discrete domains, including ‘Visual orientation’, ‘Visual mobility’, ‘Daily life and ‘Interaction with others’. Results Twenty‐six patients completed each of the 35 tasks. Overall, 24 out of 35 tasks (69 per cent) were statistically significantly easier to achieve with the device ON versus OFF. In each of the four domains, patients’ performances were significantly better (p < 0.05) with the device ON versus OFF, ranging from 19 to 38 per cent improvement. Conclusion Patients with an Argus II Retinal Prosthesis implanted for 18 to 44 months (mean 36 months), demonstrated significantly improved completion of vision‐related tasks with the device ON versus OFF. PMID:26804484
Xie, Dizhi; Chen, Fang; Lin, Siyuan; You, Cuihong; Wang, Shuqi; Zhang, Qinghao; Monroig, Óscar; Tocher, Douglas R; Li, Yuanyou
2016-08-01
Both the spotted scat Scatophagus argus and rabbitfish Siganus canaliculatus belong to the few cultured herbivorous marine teleost, however, their fatty acyl desaturase (Fad) system involved in long-chain polyunsaturated fatty acid (LC-PUFA) biosynthesis is different. The S. argus has a △6 Fad, while the rabbitfish has △4 and △6/△5 Fads, which were the first report in vertebrate and marine teleost, respectively. In order to compare the characteristics of elongases of very long-chain fatty acids (Elovl) between them, two Elovl cDNAs were cloned from S. argus in the present study. One has 885bp of open read fragment (ORF) encoding a protein with 294 amino acid (aa) showing Elovl5 activity functionally characterized by heterologous expression in yeast, which was primarily active for the elongation of C18 and C20 PUFAs. The other has 915bp of ORF coding for a 305 aa protein showing Elovl4 activity, which was more efficient in the elongation of C20 and C22 PUFAs. Tissue distribution analyses by RT-PCR showed that elovl5 was highly expressed in the liver compared to other tissues determined, whereas elovl4 transcripts were only detected in the eye. The expression of elovl5 and elovl4 were significantly affected by dietary fatty acid composition, with highest expression of mRNA in the liver and eye of fish fed a diet with an 18:3n-3/18:2n-6 ratio of 1.7:1. These results indicated that the S. argus has a similar Elovl system in the LC-PUFA biosynthetic pathway to that of rabbitfish although their Fad system was different, suggesting that the diversification of fish LC-PUFA biosynthesis specificities is more associated with its Fad system. These new insights expand our knowledge and understanding of the molecular basis and regulation of LC-PUFA biosynthesis in fish. Copyright © 2016 Elsevier Inc. All rights reserved.
The functional performance of the Argus II retinal prosthesis
Stronks, H Christiaan; Dagnelie, Gislin
2014-01-01
Summary Visual prostheses are devices to treat profound vision loss by stimulating secondary nerve cells anywhere along the visual pathway, typically with electrical pulses. The Argus® II implant, developed by Second Sight Medical Products (SSMP, Sylmar, CA, USA), targets the retina and features 60 electrodes that electrically stimulate the surviving retinal neurons. Of the approximately 20 research groups that are actively developing visual prostheses, SSMP has the longest track record. The Argus II was the first visual prosthesis to become commercially available: It received the CE mark in Europe in 2011 and FDA approval was granted in early 2013 for humanitarian use in the USA. Meanwhile, the Argus II safety/benefit study has been extended for research purposes, and is ongoing. In this review we will discuss the performance of the Argus II in restoring sight to the blind, and we will shed light on its expected developments in the coming years. PMID:24308734
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, K.; Tsai, H.; Decision and Information Sciences
The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it canmore » be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The Documentation Package for the RFID Temperature Monitoring System; Software Test Plan and Results for ARG-US OnSite; Configuration Management Plan (CMP) for the ARG-US System; Requirements Management Plan for the ARG-US System; and Design Management Plan for ARG-US.« less
Event-based internet biosurveillance: relation to epidemiological observation
2012-01-01
Background The World Health Organization (WHO) collects and publishes surveillance data and statistics for select diseases, but traditional methods of gathering such data are time and labor intensive. Event-based biosurveillance, which utilizes a variety of Internet sources, complements traditional surveillance. In this study we assess the reliability of Internet biosurveillance and evaluate disease-specific alert criteria against epidemiological data. Methods We reviewed and compared WHO epidemiological data and Argus biosurveillance system data for pandemic (H1N1) 2009 (April 2009 – January 2010) from 8 regions and 122 countries to: identify reliable alert criteria among 15 Argus-defined categories; determine the degree of data correlation for disease progression; and assess timeliness of Internet information. Results Argus generated a total of 1,580 unique alerts; 5 alert categories generated statistically significant (p < 0.05) correlations with WHO case count data; the sum of these 5 categories was highly correlated with WHO case data (r = 0.81, p < 0.0001), with expected differences observed among the 8 regions. Argus reported first confirmed cases on the same day as WHO for 21 of the first 64 countries reporting cases, and 1 to 16 days (average 1.5 days) ahead of WHO for 42 of those countries. Conclusion Confirmed pandemic (H1N1) 2009 cases collected by Argus and WHO methods returned consistent results and confirmed the reliability and timeliness of Internet information. Disease-specific alert criteria provide situational awareness and may serve as proxy indicators to event progression and escalation in lieu of traditional surveillance data; alerts may identify early-warning indicators to another pandemic, preparing the public health community for disease events. PMID:22709988
Diniz, Fabio M; Maclean, Norman; Ogawa, Masayoshi; Cintra, Israel H A; Bentzen, Paul
2005-01-01
Atlantic spiny lobsters support major fisheries in northeastern Brazilian waters and in the Caribbean Sea. To avoid reduction in diversity and elimination of distinct stocks, understanding their population dynamics, including structuring of populations and genetic diversity, is critical. We here explore the potential of using the hypervariable domain in the control region of the mitochondrial DNA as a genetic marker to characterize population subdivision in spiny lobsters, using Panulirus argus as the species model. The primers designed on the neighboring conserved genes have amplified the entire control region (approx. 780 bases) of P. argus and other closely related species. Average nucleotide and haplotype diversity within P. argus were found to be high, and population structuring was hypothesized. The data suggest a division of P. argus into genetically different phylogeographic groups. The hypervariable domain seems to be useful for determining genetic differentiation of geographically distinct stocks of P. argus and other Atlantic spiny lobsters.
The Green Bank Telescope: Transformational Science for the Next Decade.
NASA Astrophysics Data System (ADS)
Wootten, Al; GBO Staff
2018-01-01
The Robert C Byrd Green Bank Telescope has met its design goal of providing high-quality observations at 115 GHz. The accurate small beam of the telescope at high frequencies is leveraged by deployment of multi beam receivers. An overview is presented. Observers now have access to the new, 16-pixel, 3-mm Argus receiver, which is providing high-dynamic range images over wide fields for the multitude of spectral lines between 85 and 115 GHz. The successful performance of Argus, and its modular design, demonstrates that receivers with many more pixels could be built for the GBT. A 12 x 12 array of the Argus design would have mapping speeds about nine times faster than Argus without suffering any degradation in performance for the outer pixels in the array. The Observatory plans to build the next-generation Argus instrument (Argus+) with 144-pixels, a footprint 5'x5', and 7" resolution at 110 GHz. The project will be a collaboration between the Green Bank Observatory and university groups, who will supply key components. The key science drivers for Argus+ are studies of molecular filaments in the Milky Way, studies of molecular clouds in nearby galaxies, and the observations of rapidly evolving solar system objects. Observers also have access to MUSTANG-2, a 223-feedhorn bolometer camera which was commissioned on the GBT in spring 2016, and was offered for observations on a shared risk basis, in collaboration with the instrument team, in the 2018A GBO proposal call. Several features distinguish it from its predecessor, MUSTANG: A new, microstrip-coupled detector design yields higher sensitivity and less susceptibility to environmental microphonics. Detectors are feedhorn coupled, with the sum of two linear polarizations measured by a single TES per feed. The instantaneous field of view is 4 arcminutes (vs 42 arcseconds for MUSTANG) The receiver design incorporates a tilted refrigerator and receiver rotator, resulting in much lower dependence of cooling performance on telescope elevation. The detector readout is the first astronomical use of microwave resonators to multiplex TES bolometers. MUSTANG-2 has been developed by a collaboration including the University of Pennsylvania, NIST, NRAO, the University of Michigan, and Cardiff University. A 7-pixel K-band Feed Array covering 18-28 GHz with Dual polarization feeds and a noise temperature < 40-50 K has been available for several years. The array offers an instantaneous bandwidth/beam of 1.8 GHz. Future upgrade concepts under study envision increasing the number of beams by an order of magnitude.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Darden, C.
1987-01-01
Progress is reported on the AMY and ARGUS detectors, as well as plans for the next funding period. The AMY detector is reported as well on the way to completion, but not yet ready to take data. The ARGUS detector is reported to have completed its fourth year of operation. Some upsilon 1S decay data are discussed. 37 refs. (LEW)
NASA Astrophysics Data System (ADS)
Dixon, Robert
This chapter introduces the Argus radio telescope concept, a radically new approach to radio telescope design (not to be confused with The SETI League's Project Argus, a linked global array of fairly conventional radio telescopes). It represents a complete departure from designs that have been used ever since the invention of the first telescope by Galileo in 1609. It starts over from the beginning, and in doing so overcomes the legacy of Galileo. Argus can do things that are amazing and even hard to believe, when viewed in the context of previous telescopes. Here are some examples.
Argus: a 16-pixel millimeter-wave spectrometer for the Green Bank Telescope
NASA Astrophysics Data System (ADS)
Sieth, Matthew; Devaraj, Kiruthika; Voll, Patricia; Church, Sarah; Gawande, Rohit; Cleary, Kieran; Readhead, Anthony C. S.; Kangaslahti, Pekka; Samoska, Lorene; Gaier, Todd; Goldsmith, Paul F.; Harris, Andrew I.; Gundersen, Joshua O.; Frayer, David; White, Steve; Egan, Dennis; Reeves, Rodrigo
2014-07-01
We report on the development of Argus, a 16-pixel spectrometer, which will enable fast astronomical imaging over the 85-116 GHz band. Each pixel includes a compact heterodyne receiver module, which integrates two InP MMIC low-noise amplifiers, a coupled-line bandpass filter and a sub-harmonic Schottky diode mixer. The receiver signals are routed to and from the multi-chip MMIC modules with multilayer high frequency printed circuit boards, which includes LO splitters and IF amplifiers. Microstrip lines on flexible circuitry are used to transport signals between temperature stages. The spectrometer frontend is designed to be scalable, so that the array design can be reconfigured for future instruments with hundreds of pixels. Argus is scheduled to be commissioned at the Robert C. Byrd Green Bank Telescope in late 2014. Preliminary data for the first Argus pixels are presented.
Xincheng, Zhang; Kunci, Chen; Xinping, Zhu; Jian, Zhao; Qing, Luo; Xiaoyou, Hong; Wei, Li; Fengfang, Xiao
2015-08-01
The northern snakehead (Channa argus) and blotched snakehead (Channa maculata) and their reciprocal hybrids have played important roles in the Chinese freshwater aquaculture industry, with an annual production in China exceeding 400 thousand tons. While these are popular aquaculture breeds in China, it is not easy to identify northern snakehead, blotched snakehead, and their hybrids. Thus, a method should be developed to identify these varieties. To distinguish between the reciprocal hybrids (C. argus ♀ × C. maculata ♂ and C. maculata ♀ × C. argus ♂), the mitochondrial genome sequences of northern snakehead and blotched snakehead and their reciprocal hybrids were compared. Following the alignment and analysis of mtDNA sequences of northern snakehead, blotched snakehead and their hybrids, two pairs of specific primers were designed based on identified differences ranging from 12S rRNA to 16S rRNA gene. The BY1 primers amplified the same bands in the blotched snakehead and the hybrid (C. maculata ♀ × C. argus ♂), while producing no products in northern snakehead and the hybrid (C. argus ♀ × C. maculata ♂). Amplification with WY1 yielded the opposite results. Then, 30 individuals per fish were randomized to verify the primers, and the results showed that the primers were specific for breeds, as intended. The specific primers can not only simply distinguish between two kinds of hybrids, but also rapidly identify the two parents. This study provides a method of molecular marker identification to identify reciprocal hybrids.
Zhu, S-R; Li, J-L; Xie, N; Zhu, L-M; Wang, Q; Yue, G-H
2014-02-13
The snakehead fish Channa argus is an important food fish in China. We identified six microsatellite loci for C. argus. These six microsatellite loci and four other microsatellite markers were used to analyze genetic diversity in four cultured populations of C. argus (SD, JX, HN, and ZJ) and determine their relationships. A total of 154 alleles were detected at the 10 microsatellite loci. The average expected and observed heterozygosities varied from 0.70-0.84 and 0.69-0.83, respectively, and polymorphism information content ranged between 0.66 and 0.82 in the four populations, indicating high genetic diversity. Population JX deviated from mutation-drift equilibrium and may have experienced a recent bottleneck. Analysis of pairwise genetic differentiation revealed FST values that ranged from 0.028 to 0.100, which indicates a moderate level of genetic differentiation. The largest distances were observed between populations HN and SD, whereas the smallest distances were obtained between populations HN and JX. Genetic clustering analysis demonstrated that the ZJ and HN populations probably share the same origin. This information about the genetic diversity within each of the four populations, and their genetic relationships will be useful for future genetic improvement of C. argus through selective breeding.
Savage, J.M.; McDiarmid, R.W.
1992-01-01
Sibon argus Cope, 1875, long known only from the holotype, is redescribed based on material from Costa Rica and Panama. It differs from the only other member of the genus having an ocellate dorsal pattern (S. longifrenis) in its attenuate habitus, enlarged blunt head, protuberant eyes, and high segmental counts (ventrals 181-201, subcaudals 112-121, total segmental counts 294-312). Sibon longifrenis of Atlantic slope Costa Rica and western Panama (ventrals 151-173, subcaudals 82-103, total segmental counts 231-275) is also redescribed. These species differ from all other Sibon in having an ocellate pattern and an enlarged penultimate supralabial bordering the orbit. The allied species, S. annulatus (Costa Rica and Panama) and S. dimidiatus (Mexico to southwestern Costa Rica), are shown to be distinct from S. argus and S. longifenis in scalation and coloration. Although allopatric, S. annulatus and S. dimidiatus differ from one another most strikingly in adult coloration, postmental character states, and ventral counts (x = 175.8 in annulatus and 193.6 in dimidiatus), and are regarded as valid species. Sibon annulatus occurs sympatrically with S. argus in Panama and with S. longifrenis in Costa Rica. Although S. argus and S. longifrenis occur in the same general area on the Atlantic slope of Costa Rica, they have not yet been taken at the same locality.
Draft genome of the Northern snakehead, Channa argus.
Xu, Jian; Bian, Chao; Chen, Kunci; Liu, Guiming; Jiang, Yanliang; Luo, Qing; You, Xinxin; Peng, Wenzhu; Li, Jia; Huang, Yu; Yi, Yunhai; Dong, Chuanju; Deng, Hua; Zhang, Songhao; Zhang, Hanyuan; Shi, Qiong; Xu, Peng
2017-04-01
The Northern snakehead (Channa argus), a member of the Channidae family of the Perciformes, is an economically important freshwater fish native to East Asia. In North America, it has become notorious as an intentionally released invasive species. Its ability to breathe air with gills and migrate short distances over land makes it a good model for bimodal breath research. Therefore, recent research has focused on the identification of relevant candidate genes. Here, we performed whole genome sequencing of C. argus to construct its draft genome, aiming to offer useful information for further functional studies and identification of target genes related to its unusual facultative air breathing. Findings: We assembled the C. argus genome with a total of 140.3 Gb of raw reads, which were sequenced using the Illumina HiSeq2000 platform. The final draft genome assembly was approximately 615.3 Mb, with a contig N50 of 81.4 kb and scaffold N50 of 4.5 Mb. The identified repeat sequences account for 18.9% of the whole genome. The 19 877 protein-coding genes were predicted from the genome assembly, with an average of 10.5 exons per gene. Conclusion: We generated a high-quality draft genome of C. argus, which will provide a valuable genetic resource for further biomedical investigations of this economically important teleost fish. © The Author 2017. Published by Oxford University Press.
Laser program annual report, 1977. Volume 1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bender, C.F.; Jarman, B.D.
1978-07-01
An overview is given of the laser fusion program. The solid-state program covers the Shiva and Nova projects. Laser components, control systems, alignment systems, laser beam diagnostics, power conditioning, and optical components are described. The fusion experimental program concerns the diagnostics and data acquisition associated with Argus and Shiva. (MOW)
The Argus(®) II Retinal Prosthesis System.
Luo, Yvonne Hsu-Lin; da Cruz, Lyndon
2016-01-01
The Argus(®) II Retinal Prosthesis System (Second Sight Medical Products) is the first prosthetic vision device to obtain regulatory approval in both Europe and the USA. As such it has entered the commercial market as a treatment for patients with profound vision loss from end-stage outer retinal disease, predominantly retinitis pigmentosa. To date, over 100 devices have been implanted worldwide, representing the largest group of patients currently treated with visual prostheses. The system works by direct stimulation of the relatively preserved inner retina via epiretinal microelectrodes, thereby replacing the function of the degenerated photoreceptors. Visual information from a glasses-mounted video camera is converted to a pixelated image by an external processor, before being transmitted to the microelectrode array at the macula. Elicited retinal responses are then relayed via the normal optic nerve to the cortex for interpretation. We reviewed the animal and human studies that led to the development of the Argus(®) II device. A sufficiently robust safety profile was demonstrated in the phase I/II clinical trial of 30 patients. Improvement of function in terms of orientation and mobility, target localisation, shape and object recognition, and reading of letters and short unrehearsed words have also been shown. There remains a wide variability in the functional outcomes amongst the patients and the factors contributing to these performance differences are still unclear. Future developments in terms of both software and hardware aimed at improving visual function have been proposed. Further experience in clinical outcomes is being acquired due to increasing implantation. Copyright © 2015. Published by Elsevier Ltd.
SIMP J2154–1055: A NEW LOW-GRAVITY L4β BROWN DWARF CANDIDATE MEMBER OF THE ARGUS ASSOCIATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gagné, Jonathan; Lafrenière, David; Doyon, René
We present SIMP J21543454–1055308, a new L4β brown dwarf identified in the SIMP survey that displays signs of low gravity in its near-infrared spectrum. Using BANYAN II, we show that it is a candidate member of the Argus association, albeit with a 21% probability that it is a contaminant from the field. Measurements of radial velocity and parallax will be needed to verify its membership. If it is a member of Argus (age 30-50 Myr), then this object would have a planetary mass of 10 ± 0.5 M {sub Jup}.
ERIC Educational Resources Information Center
Journal of Optometric Education, 1995
1995-01-01
The Argus Commission, asked to examine the interface between academic pharmacy and education programs in dentistry, optometry, and podiatry, envisioned a primary health care team and considered mechanisms for encouraging development of such teams and reducing competition. Its conclusions and recommendations are summarized here. (MSE)
Dugarov, Zh N; Baldanova, D R; Khamnueva, T R
2012-01-01
Morphological characteristics of the tapeworm Oochoristica tuberculata from the lizard Eremias argus is given from the northern border of the host areal. The complexes of most stable and most variable characters of this tapeworm are determined. The list of hosts is given for Oochoristica tuberculata.
Park, Han-Chan; Suk, Ho Young; Jeong, Eu-Jin; Park, Dae-Sik; Lee, Hang; Min, Mi-Sook
2014-11-01
The Mongolian racerunner (Eremias argus) is a small lacertid lizard species, and its distribution range encompasses the Korean Peninsula, Mongolia, China and Russia. Eremias argus is widespread, but populations on the Korean Peninsula are small and declining, provoking concerns that genetic diversity is being lost. This species is currently listed under the Protection of Wild Fauna and Flora Act in South Korea. In this study, nine novel microsatellites for E. argus were developed with a biotin-enrichment method and used to understand its population genetic structure and delineate conservation units on the Korean Peninsula. Overall, low intrapopulation genetic diversity was observed (mean number of alleles per locus = 2.463; mean H E = 0.398) from 10 populations investigated (n = 110). Two populations (among five with n≥ 10) showed an excess of heterozygosity expected under HWE relative to that expected at mutation-drift equilibrium, indicating severe reduction in population sizes. With only a few exceptions, the overall genetic differentiation among populations was substantial with the high levels of pairwise-F ST (0.006-0.746) and -R ST (0.034-0.940) values. The results of Bayesian STRUCTURE analysis showed that E. argus populations on the Korean Peninsula were most likely partitioned into three genetic clusters. Taken all together, such low levels of gene flow and strong genetic structuring have critical implications for the conservation of this endangered species and its management.
Genomic analyses of Northern snakehead (Channa argus) populations in North America
Resh, Carlee A.; Galaska, Matthew P.
2018-01-01
Background The introduction of northern snakehead (Channa argus; Anabantiformes: Channidae) and their subsequent expansion is one of many problematic biological invasions in the United States. This harmful aquatic invasive species has become established in various parts of the eastern United States, including the Potomac River basin, and has recently become established in the Mississippi River basin in Arkansas. Effective management of C. argus and prevention of its further spread depends upon knowledge of current population structure in the United States. Methods Novel methods for invasive species using whole genomic scans provide unprecedented levels of data, which are able to investigate fine scale differences between and within populations of organisms. In this study, we utilize 2b-RAD genomic sequencing to recover 1,007 single-nucleotide polymorphism (SNP) loci from genomic DNA extracted from 165 C. argus individuals: 147 individuals sampled along the East Coast of the United States and 18 individuals sampled throughout Arkansas. Results Analysis of those SNP loci help to resolve existing population structure and recover five genetically distinct populations of C. argus in the United States. Additionally, information from the SNP loci enable us to begin to calculate the long-term effective population size ranges of this harmful aquatic invasive species. We estimate long-term Ne to be 1,840,000–18,400,000 for the Upper Hudson River basin, 4,537,500–45,375,000 for the Lower Hudson River basin, 3,422,500–34,225,000 for the Potomac River basin, 2,715,000–7,150,000 for Philadelphia, and 2,580,000–25,800,000 for Arkansas populations. Discussion and Conclusions This work provides evidence for the presence of more genetic populations than previously estimated and estimates population size, showing the invasive potential of C. argus in the United States. The valuable information gained from this study will allow effective management of the existing populations to avoid expansion and possibly enable future eradication efforts. PMID:29637024
Genomic analyses of Northern snakehead (Channa argus) populations in North America.
Resh, Carlee A; Galaska, Matthew P; Mahon, Andrew R
2018-01-01
The introduction of northern snakehead ( Channa argus ; Anabantiformes: Channidae) and their subsequent expansion is one of many problematic biological invasions in the United States. This harmful aquatic invasive species has become established in various parts of the eastern United States, including the Potomac River basin, and has recently become established in the Mississippi River basin in Arkansas. Effective management of C. argus and prevention of its further spread depends upon knowledge of current population structure in the United States. Novel methods for invasive species using whole genomic scans provide unprecedented levels of data, which are able to investigate fine scale differences between and within populations of organisms. In this study, we utilize 2b-RAD genomic sequencing to recover 1,007 single-nucleotide polymorphism (SNP) loci from genomic DNA extracted from 165 C. argus individuals: 147 individuals sampled along the East Coast of the United States and 18 individuals sampled throughout Arkansas. Analysis of those SNP loci help to resolve existing population structure and recover five genetically distinct populations of C. argus in the United States. Additionally, information from the SNP loci enable us to begin to calculate the long-term effective population size ranges of this harmful aquatic invasive species. We estimate long-term N e to be 1,840,000-18,400,000 for the Upper Hudson River basin, 4,537,500-45,375,000 for the Lower Hudson River basin, 3,422,500-34,225,000 for the Potomac River basin, 2,715,000-7,150,000 for Philadelphia, and 2,580,000-25,800,000 for Arkansas populations. This work provides evidence for the presence of more genetic populations than previously estimated and estimates population size, showing the invasive potential of C. argus in the United States. The valuable information gained from this study will allow effective management of the existing populations to avoid expansion and possibly enable future eradication efforts.
Reading Visual Braille with a Retinal Prosthesis
Lauritzen, Thomas Z.; Harris, Jordan; Mohand-Said, Saddek; Sahel, Jose A.; Dorn, Jessy D.; McClure, Kelly; Greenberg, Robert J.
2012-01-01
Retinal prostheses, which restore partial vision to patients blinded by outer retinal degeneration, are currently in clinical trial. The Argus II retinal prosthesis system was recently awarded CE approval for commercial use in Europe. While retinal prosthesis users have achieved remarkable visual improvement to the point of reading letters and short sentences, the reading process is still fairly cumbersome. This study investigates the possibility of using an epiretinal prosthesis to stimulate visual braille as a sensory substitution for reading written letters and words. The Argus II retinal prosthesis system, used in this study, includes a 10 × 6 electrode array implanted epiretinally, a tiny video camera mounted on a pair of glasses, and a wearable computer that processes the video and determines the stimulation current of each electrode in real time. In the braille reading system, individual letters are created by a subset of dots from a 3 by 2 array of six dots. For the visual braille experiment, a grid of six electrodes was chosen out of the 10 × 6 Argus II array. Groups of these electrodes were then directly stimulated (bypassing the camera) to create visual percepts of individual braille letters. Experiments were performed in a single subject. Single letters were stimulated in an alternative forced choice (AFC) paradigm, and short 2–4-letter words were stimulated (one letter at a time) in an open-choice reading paradigm. The subject correctly identified 89% of single letters, 80% of 2-letter, 60% of 3-letter, and 70% of 4-letter words. This work suggests that text can successfully be stimulated and read as visual braille in retinal prosthesis patients. PMID:23189036
Reading visual braille with a retinal prosthesis.
Lauritzen, Thomas Z; Harris, Jordan; Mohand-Said, Saddek; Sahel, Jose A; Dorn, Jessy D; McClure, Kelly; Greenberg, Robert J
2012-01-01
Retinal prostheses, which restore partial vision to patients blinded by outer retinal degeneration, are currently in clinical trial. The Argus II retinal prosthesis system was recently awarded CE approval for commercial use in Europe. While retinal prosthesis users have achieved remarkable visual improvement to the point of reading letters and short sentences, the reading process is still fairly cumbersome. This study investigates the possibility of using an epiretinal prosthesis to stimulate visual braille as a sensory substitution for reading written letters and words. The Argus II retinal prosthesis system, used in this study, includes a 10 × 6 electrode array implanted epiretinally, a tiny video camera mounted on a pair of glasses, and a wearable computer that processes the video and determines the stimulation current of each electrode in real time. In the braille reading system, individual letters are created by a subset of dots from a 3 by 2 array of six dots. For the visual braille experiment, a grid of six electrodes was chosen out of the 10 × 6 Argus II array. Groups of these electrodes were then directly stimulated (bypassing the camera) to create visual percepts of individual braille letters. Experiments were performed in a single subject. Single letters were stimulated in an alternative forced choice (AFC) paradigm, and short 2-4-letter words were stimulated (one letter at a time) in an open-choice reading paradigm. The subject correctly identified 89% of single letters, 80% of 2-letter, 60% of 3-letter, and 70% of 4-letter words. This work suggests that text can successfully be stimulated and read as visual braille in retinal prosthesis patients.
Briones-Fourzán, Patricia; Muñoz de Cote-Hernández, Rubén; Lozano-Álvarez, Enrique
2016-06-01
Cymatocarpus solearis, a brachycoeliid trematode that parasitizes sea turtles, uses spiny lobsters Panulirus argus as second intermediate hosts. We examined variability in infection by C. solearis in Bahía de la Ascensión, Mexico, a tropical bay with a highly productive fishery for P. argus that is based on the extensive use of casitas (large artificial shelters), which can harbor multiple juveniles and adults of this gregarious lobster species. We sampled 3956 lobsters from 466 casitas distributed over three bay zones within two closed seasons and one fishing season. In these lobsters (9.5-115.2mm carapace length, CL), the average infection prevalence was 11.7% but the probability of infection increased significantly with size. Prevalence varied with season but was consistently higher in one zone than in the other two zones. Infection with C. solearis was negatively related with clinical infection with Panulirus argus Virus 1 (PaV1). We also sampled 405 lobsters from the commercial catch obtained throughout the bay at the onset of the fishing season. In these relatively larger lobsters (70.3-168.0mm CL), average prevalence of C. solearis was higher (23.5%) but was not affected by lobster size or sex. Encysted metacercariae occurred in both abdominal and cephalothoracic muscles. The effects of C. solearis on phenotypic traits of P. argus that may potentially impact the host population dynamics and fisheries remain to be investigated. Copyright © 2016 Elsevier Inc. All rights reserved.
Progressivism Manifested in the Press: H. A. Chadwick and the "Seattle Argus."
ERIC Educational Resources Information Center
Lawson, Linda
H. A. Chadwick bought one-half interest in the Seattle "Argus" in 1894 and through this newspaper expressed the sentiments of the progressive movement of his time, a combination of reform-oriented and conservative forces. The newspaper was only six weeks old and deep in debt when Chadwick took over the editorial duties and he quickly…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-08
..., LLC Including On-Site Leased Workers From Adecco, Argus Technical, Inc., Fox Valley Metrology URS Corp... the certification for workers of the subject firm. New information shows that workers leased from Fox... from Fox Valley Metrology, URS Corp. and CompuCom working on-site at the Oshkosh, Wisconsin location of...
Cortés-Trujillo, I; Ramos-González, B; Salas-Salas, O; Zuñiga-Chiquette, F; Zetina Hernández, A; Martínez-Cortés, G; Ruiz-Hernández, M; González-Martín, A; Ferragut, J F; Rangel-Villalobos, H
2017-05-01
Allele frequency distribution and statistical parameters of forensic efficiency concerning the Investigator Argus X-12 kit (Qiagen, Hilden, Germany) were determined in a total sample of 641 unrelated Mexican females, including two Mestizo-admixed- populations (n=309) and seven Amerindian groups (n=332) from the main regions of the country. Most of the 12 X-STRs were in agreement with Hardy-Weinberg expectations in all nine Mexican populations. The power of discrimination in females (PD) and Median exclusion chance for trios (MEC T ) and duos (MEC D ) of this genetic system based on X-STRs were >99.99%. Although Mexican populations showed significant pairwise differentiation, a closer relationship was evident between Amerindian groups and nearby Mestizos, in agreement with historical records, previous genetic studies, and X-linked inheritance pattern expectations. Copyright © 2017 Elsevier B.V. All rights reserved.
Briones-Fourzán, Patricia; Ramírez-Zaldívar, Eunice; Lozano-Alvarez, Enrique
2008-10-01
In spiny lobsters, conspecific scents ("aggregation cues") may mediate gregarious diurnal sheltering, but scents from injured conspecifics ("alarm odors") may elicit avoidance behavior. In laboratory experiments, individuals of two coexisting species, Panulirus guttatus (a reef-obligate) and P. argus (a temporary reef-dweller), significantly chose shelters emanating conspecific aggregation cues and responded randomly to shelters emanating heterospecific aggregation cues. However, despite evidence that the two species perceived each other's alarm odors to a similar extent, P. guttatus responded randomly to shelters emanating either conspecific or heterospecific alarm odors, whereas P. argus significantly avoided both. This differential influence of alarm odors likely reflects interspecific differences in life history, sociality, and behavior. The less social, reef-obligate P. guttatus lobsters forage close to their reef dens, into which they retract deeply upon perception of risk. This cryptic behavior may offset the need to avoid conspecific (and heterospecific) alarm odors. In contrast, avoidance of conspecific alarm odors by P. argus is consistent with its ontogenetic habitat shifts and greater sociality. Furthermore, because reef-dwelling P. argus lobsters forage across open areas away from the reef, an ability to avoid alarm odors from P. guttatus upon returning to their reef dens may increase their fitness.
Gaither, Michelle R.; Toonen, Robert J.; Bowen, Brian W.
2012-01-01
Biological invasions with known histories are rare, especially in the sea, and empirical studies of the genetic consequences are even rarer. Fifty-five years ago, the state of Hawai‘i began a remarkable, if unintentional, ‘experiment’ with the introduction of three reef fishes, Lutjanus fulvus, Cephalopholis argus and Lutjanus kasmira. All have since expanded from the initial introduction of 2204 to 3163 individuals; however, historical records show that initially L. fulvus remained scarce, C. argus had modest population expansion and L. kasmira experienced rapid population growth. The consequences of differential population growth rates are apparent in F-statistics: Hawaiian L. fulvus demonstrate strong and significant haplotype frequency shifts from the founder location (FST = 0.449), C. argus shows low but significant differentiation (FST = 0.066) and L. kasmira is nearly identical to the founder location (FST = 0.008). All three species had higher mtDNA diversity in the introduced range, which can be explained by multiple sources for L. fulvus and L. kasmira, but not for C. argus. We conclude that lag time before population expansion, in conjunction with genetic drift, has defined the genetic architecture of these three species in the introduced range. PMID:22874747
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsai, H.; Chen, K.; Jusko, M.
The Packaging Certification Program (PCP) of the U.S. Department of Energy (DOE) Environmental Management (EM), Office of Packaging and Transportation (EM-14), has developed a radio frequency identification (RFID) tracking and monitoring system for the management of nuclear materials during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, consists of hardware (Mk-series sensor tags, fixed and handheld readers, form factor for multiple drum types, seal integrity sensors, and enhanced battery management), software (application programming interface, ARG-US software for local and remote/web applications, secure server and database management), and cellular/satellite communication interfaces for vehicle tracking andmore » item monitoring during transport. The ability of the above system to provide accurate, real-time tracking and monitoring of the status of multiple, certified containers of nuclear materials has been successfully demonstrated in a week-long, 1,700-mile DEMO performed in April 2008. While the feedback from the approximately fifty (50) stakeholders who participated in and/or observed the DEMO progression were very positive and encouraging, two major areas of further improvements - system integration and web application enhancement - were identified in the post-DEMO evaluation. The principal purpose of the MiniDemo described in this report was to verify these two specific improvements. The MiniDemo was conducted on August 28, 2009. In terms of system integration, a hybrid communication interface - combining the RFID item-monitoring features and a commercial vehicle tracking system by Qualcomm - was developed and implemented. In the MiniDemo, the new integrated system worked well in reporting tag status and vehicle location accurately and promptly. There was no incompatibility of components. The robust commercial communication gear, as expected, helped improve system reliability. The MiniDemo confirmed that system integration is technically feasible and reliable with the existing RFID and Qualcomm satellite equipment. In terms of web application, improvements in mapping, tracking, data presentation, and post-incident spatial query reporting were implemented in ARG-US, the application software that manages the dataflow among the RFID tags, readers, and servers. These features were tested in the MiniDemo and found to be satisfactory. The resulting web application is both informative and user-friendly. A joint developmental project is being planned between the PCP and the DOE TRANSCOM that uses the Qualcomm gear in vehicles for tracking and communication of radioactive material shipments across the country. Adding an RFID interface to TRANSCOM is a significant enhancement to the DOE infrastructure for tracking and monitoring shipments of radioactive materials.« less
Replication and Reconfiguration in a Distributed Mail Repository.
1987-04-01
a single machine and sees no improvement in availability over the old repository. Further, the static allocation of users to particular machines means...Reconfiguration Good old Wateon! You are the one fixed point in a changing universel -Sir Arthur Conan Doyle How can I be sure In a world that’s constantly...automatic storage allocation , and the Argus debugger. Then I discuss the drawbacks involved in using Argus: deadlocks, the awkwardness of retrying actions
Winston, R.B.
1999-01-01
This report describes enhancements to a Graphical-User Interface (GUI) for MODFLOW-96, the U.S. Geological Survey (USGS) modular, three-dimensional, finitedifference ground-water flow model, and MOC3D, the USGS three-dimensional, method-ofcharacteristics solute-transport model. The GUI is a plug-in extension (PIE) for the commercial program Argus ONEe. The GUI has been modified to support MODPATH (a particle tracking post-processing package for MODFLOW), ZONEBDGT (a computer program for calculating subregional water budgets), and the Stream, Horizontal-Flow Barrier, and Flow and Head Boundary packages in MODFLOW. Context-sensitive help has been added to make the GUI easier to use and to understand. In large part, the help consists of quotations from the relevant sections of this report and its predecessors. The revised interface includes automatic creation of geospatial information layers required for the added programs and packages, and menus and dialog boxes for input of parameters for simulation control. The GUI creates formatted ASCII files that can be read by MODFLOW-96, MOC3D, MODPATH, and ZONEBDGT. All four programs can be executed within the Argus ONEe application (Argus Interware, Inc., 1997). Spatial results of MODFLOW-96, MOC3D, and MODPATH can be visualized within Argus ONEe. Results from ZONEBDGT can be visualized in an independent program that can also be used to view budget data from MODFLOW, MOC3D, and SUTRA. Another independent program extracts hydrographs of head or drawdown at individual cells from formatted MODFLOW head and drawdown files. A web-based tutorial on the use of MODFLOW with Argus ONE has also been updated. The internal structure of the GUI has been modified to make it possible for advanced users to easily customize the GUI. Two additional, independent PIE?s were developed to allow users to edit the positions of nodes and to facilitate exporting the grid geometry to external programs.
Detection of Panulirus argus Virus 1 in Caribbean spiny lobsters.
Montgomery-Fullerton, Megan M; Cooper, Roland A; Kauffman, Kathryn M; Shields, Jeffrey D; Ratzlaff, Robert E
2007-06-07
Panulirus argus Virus 1 (PaV1) is a pathogenic virus that infects Caribbean spiny lobsters P. argus in the Florida Keys. We have developed a PCR detection assay for PaV1 for the purpose of studying the natural history of the virus and for monitoring the prevalence of infection. The detection of the virus in hemolymph and other tissues is based on the PCR amplification of a 499 bp product using specific primers designed from a cloned fragment of the PaV1 genome. The sensitivity limit for the assay was 1.2 fg of purified viral DNA. The PaV1 primers did not react with lobster DNA, oyster DNA, Ostreid Herpesvirus 1, or murine cytomegalovirus. Using this assay, we successfully followed the course of infection in lobsters inoculated with PaV1 and we detected infections in wild-caught lobsters from the Florida Keys. We have also established guidelines for interpreting infection results from the PCR assay for PaV1.
King, Timothy L.; Johnson, Robin L.
2011-01-01
We document the isolation and characterization of 19 tetra-nucleotide microsatellite DNA markers in northern snakehead (Channa argus) fish that recently colonized Meadow Lake, New York City, New York. These markers displayed moderate levels of allelic diversity (averaging 6.8 alleles/locus) and heterozygosity (averaging 74.2%). Demographic analyses suggested that the Meadow Lake collection has not achieved mutation-drift equilibrium. These results were consistent with instances of deviations from Hardy–Weinberg equilibrium and the presence of some linkage disequilibrium. A comparison of individual pair-wise distances suggested the presence of multiple differentiated groups of related individuals. Results of all analyses are consistent with a pattern of multiple, recent introductions. The microsatellite markers developed for C. argus yielded sufficient genetic diversity to potentially: (1) delineate kinship; (2) elucidate fine-scale population structure; (3) define management (eradication) units; (4) estimate dispersal rates; (5) estimate population sizes; and (6) provide unique demographic perspectives of control or eradication effectiveness.
Spiny lobsters detect conspecific blood-borne alarm cues exclusively through olfactory sensilla.
Shabani, Shkelzen; Kamio, Michiya; Derby, Charles D
2008-08-01
When attacked by predators, diverse animals actively or passively release molecules that evoke alarm and related anti-predatory behavior by nearby conspecifics. The actively released molecules are alarm pheromones, whereas the passively released molecules are alarm cues. For example, many insects have alarm-signaling systems that involve active release of alarm pheromones from specialized glands and detection of these signals using specific sensors. Many crustaceans passively release alarm cues, but the nature of the cues, sensors and responses is poorly characterized. Here we show in laboratory and field experiments that injured Caribbean spiny lobsters, Panulirus argus, passively release alarm cues via blood (hemolymph) that induce alarm responses in the form of avoidance and suppression of feeding. These cues are detected exclusively through specific olfactory chemosensors, the aesthetasc sensilla. The alarm cues for Caribbean spiny lobsters are not unique to the species but do show some phylogenetic specificity: P. argus responds primarily with alarm behavior to conspecific blood, but with mixed alarm and appetitive behaviors to blood from the congener Panulirus interruptus, or with appetitive behaviors to blood from the blue crab Callinectes sapidus. This study lays the foundation for future neuroethological studies of alarm cue systems in this and other decapod crustaceans.
Ahuja, A K; Dorn, J D; Caspi, A; McMahon, M J; Dagnelie, G; daCruz, L; Stanga, P; Humayun, M S; Greenberg, R J
2012-01-01
Background/aims To determine to what extent subjects implanted with the Argus II retinal prosthesis can improve performance compared with residual native vision in a spatial-motor task. Methods High-contrast square stimuli (5.85 cm sides) were displayed in random locations on a 19″ (48.3 cm) touch screen monitor located 12″ (30.5 cm) in front of the subject. Subjects were instructed to locate and touch the square centre with the system on and then off (40 trials each). The coordinates of the square centre and location touched were recorded. Results Ninety-six percent (26/27) of subjects showed a significant improvement in accuracy and 93% (25/27) show a significant improvement in repeatability with the system on compared with off (p<0.05, Student t test). A group of five subjects that had both accuracy and repeatability values <250 pixels (7.4 cm) with the system off (ie, using only their residual vision) was significantly more accurate and repeatable than the remainder of the cohort (p<0.01). Of this group, four subjects showed a significant improvement in both accuracy and repeatability with the system on. Conclusion In a study on the largest cohort of visual prosthesis recipients to date, we found that artificial vision augments information from existing vision in a spatial-motor task. Clinical trials registry no NCT00407602. PMID:20881025
GBT Observations of the Star-Forming Regions DR21 and MonR2 with the new Argus Instrument
NASA Astrophysics Data System (ADS)
Linville, Dylan; Frayer, David; Cunningham, Nichol; Maddalena, Ronald
2018-01-01
We present GBT molecular line observations of DR21 and MonR2 with the new 16 element 75--115 GHz Argus instrument. Both molecular cloud complexes are associated with regions of high-mass star formation. We present the results of our 13CO, C18O, and HCO+ observations. Both MonR2 and DR21 show multiple velocity components, and the data suggest that the core of MonR2 is collapsing, while DR21 contains a region with a strong outflow traced by HCO+.
Lozano-Alvarez, Enrique; Briones-Fourzán, Patricia; Ramírez-Estévez, Aurora; Placencia-Sánchez, David; Huchin-Mian, Juan Pablo; Rodríguez-Canul, Rossana
2008-07-07
Caribbean spiny lobsters Panulirus argus are socially gregarious, preferring shelters harboring conspecifics over empty shelters. In laboratory trials, however, healthy lobsters strongly avoided shelters harboring lobsters infected with the highly pathogenic Panulirus argus Virus 1 (PaV1). Because PaV1 is transmitted by contact, this behavior may thwart its spread in wild lobsters. In a field experiment conducted from 1998 to 2002 in a shelter-poor reef lagoon (Puerto Morelos, Mexico), densities of juvenile P. argus increased significantly on sites enhanced with artificial shelters (casitas) but not on control sites. Because PaV1 emerged in this location during 2000, we reexamined these data to assess whether casitas could potentially increase transmission of PaV1. In 2001, PaV1 prevalence was 2.5% and the cohabitation level (percentage of healthy lobsters cohabiting with diseased lobsters) was similar between natural shelters (3.5%) and casitas (2.4 %). The relative lobster densities in casita sites and control sites did not change significantly before (1998-1999) or after (2001-2002) the disease emergence. In late 2006, data from casita sites showed a significant increase in prevalence (10.9%) and cohabitation level (29.4%), but no significant changes in lobster density. In May 2006, casitas were deployed on shelter-poor sites within Chinchorro Bank, 260 km south of Puerto Morelos. In late 2006, prevalence and cohabitation level were 7.4 and 21.7%, respectively. Our results are inconclusive as to whether or not casitas increase PaV1 transmission, but suggest that across shelter-poor habitats, lobsters make a trade-off between avoiding diseased conspecifics and avoiding predation risk.
Briones-Fourzán, Patricia
2014-01-01
Abstract Coexistence of closely related species may be promoted by niche differentiation or result from interspecific trade-offs in life history and ecological traits that influence relative fitness differences and contribute to competitive inequalities. Although insufficient to prove coexistence, trait comparisons provide a first step to identify functional differences between co-occurring congeneric species in relation to mechanisms of coexistence. Here, a comparative review on life history and ecological traits is presented for two pairs of co-occurring species of spiny lobsters in the genus Panulirus: Panulirus gracilis and Panulirus inflatus from the Eastern Central Pacific region, and Panulirus argus and Panulirus guttatus from the Caribbean region. Panulirus gracilis and Panulirus inflatus have similar larval, postlarval, and adult sizes and a similar diet, but differ in degree of habitat specialization, fecundity, and growth rate. However, little is known on behavioral traits of these two species that may influence their competitive abilities and susceptibility to predators. The more abundant information on Panulirus argus and Panulirus guttatus shows that these two species differ more broadly in degree of habitat specialization, larval, postlarval and adult sizes, diet, fecundity, growth rate, degree of sociality, defense mechanisms, susceptibility to predators, and chemical ecology, suggesting a greater degree of niche differentiation between Panulirus argus and Panulirus guttatus than between Panulirus gracilis and Panulirus inflatus. Whether the substantial niche differentiation and apparent interspecific trade-offs between Panulirus argus and Panulirus guttatus relative to Panulirus gracilis and Panulirus inflatus reflect an earlier divergence of the former pair of species in the evolution of the genus constitutes an intriguing hypothesis. However, whether or not post-divergence evolution of each species pair occurred in sympatry remains uncertain. PMID:25561843
Molecular docking analysis of known flavonoids as duel COX-2 inhibitors in the context of cancer
Dash, Raju; Uddin, Mir Muhammad Nasir; Hosen, S.M. Zahid; Rahim, Zahed Bin; Dinar, Abu Mansur; Kabir, Mohammad Shah Hafez; Sultan, Ramiz Ahmed; Islam, Ashekul; Hossain, Md Kamrul
2015-01-01
Cyclooxygenase-2 (COX-2) catalyzed synthesis of prostaglandin E2 and it associates with tumor growth, infiltration, and metastasis in preclinical experiments. Known inhibitors against COX-2 exhibit toxicity. Therefore, it is of interest to screen natural compounds like flavanoids against COX-2. Molecular docking using 12 known flavanoids against COX-2 by FlexX and of ArgusLab were performed. All compounds showed a favourable binding energy of >-10 KJ/mol in FlexX and > -8 kcal/mol in ArgusLab. However, this data requires in vitro and in vivo verification for further consideration. PMID:26770028
Chen, Li; Wang, Dezhen; Tian, Zhongnan; Di, Shanshan; Zhang, Wenjun; Wang, Fang; Zhou, Zhiqiang; Diao, Jinling
2017-08-01
Soil contamination caused by the widespread use of pesticides is one of the main environmental problems facing conservation organizations. (S)-metolachlor (SM) is a selective pre-emergent herbicide that poses potential risks to soil-related organisms such as reptiles. The present study elucidated the toxic effects of SM (3 and 30 mg/kg soil weight) in Eremias argus. The results showed that growth pattern was similar between the sexes in breeding season. For males, both kidney coefficient (KC) and testis coefficient in the exposure group were significantly different from those in the control group, while only KC in the high-dose group was significantly higher for females. Based on histopathological analysis, the livers of female lizards were more vulnerable than those of males in the exposure group. A reduction in total egg output was observed in SM exposed lizards. Accumulation studies indicated that skin exposure may be an important route for SM uptake in E. argus, and that the liver and lung have strong detoxification abilities. In addition, the body burdens of the lizards increased with increasing SM concentration in the soil. Copyright © 2017 Elsevier Ltd. All rights reserved.
Polymorphism and partial characterization of digestive enzymes in the spiny lobster Panulirus argus.
Perera, Erick; Moyano, F J; Díaz, M; Perdomo-Morales, R; Montero-Alejo, V; Alonso, E; Carrillo, O; Galich, G S
2008-07-01
We characterized major digestive enzymes in Panulirus argus using a combination of biochemical assays and substrate-(SDS or native)-PAGE. Protease and amylase activities were found in the gastric juice while esterase and lipase activities were higher in the digestive gland. Trypsin-like activity was higher than chymotrypsin-like activity in the gastric juice and digestive gland. Stability and optimal conditions for digestive enzyme activities were examined under different pHs, temperature and ionic strength. The use of protease inhibitors showed the prevalence of serine proteases and metalloproteases. Results for serine proteases were corroborated by zymograms where several isotrypsins-like (17-21 kDa) and isochymotrypsin-like enzymes (23-38 kDa) were identified. Amylases (38-47 kDa) were detected in zymograms and a complex array of non-specific esterases isoenzymes was found in the digestive gland. Isoenzyme polymorphism was found for trypsin, amylase, and esterase. This study is the first to evidence the biochemical bases of the plasticity in feeding habits of P. argus. Distribution and properties of enzymes provided some indication on how the digestion takes place and constitute baseline data for further studies on the digestion physiology of spiny lobsters.
Subminiaturization for ERAST instrumentation (Environmental Research Aircraft and Sensor Technology)
NASA Technical Reports Server (NTRS)
Madou, Marc; Lowenstein, Max; Wegener, Steven
1995-01-01
We are focusing on the Argus as an example to demonstrate our philosophy on miniaturization of airborne analytical instruments for the study of atmospheric chemistry. Argus is a two channel, tunable-diode laser absorption spectrometer developed at NASA for the measurement of nitrogen dioxide (N2O) (4.5 micrometers) and ammonia (CH3) (3.3 micrometers) at the 0.1 parts per billion (ppb) level from the Perseus aircraft platform at altitudes up to 30 km. Although Argus' mass is down to 23 kg from the 197 kg Atlas, its predecessor, our goal is to design a next-generation subminiaturized instrument weighing less than 1 kg, measuring a few cm(exp 3) and able to eliminate dewars for cooling. Current designs enable use to make a small,inexpensive, monolithic spectrometer without the required sensitivity range. Further work is on its way to increase sensitivity. We are continuing to zero-base the technical approach in terms of the specifications for the given instrument. We are establishing a check list of questions to hone into the best micromachining approach and to superpose on the answers insights in scaling laws and flexible engineering designs to enable more relaxed tolerances for the smallest of the components.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsai, Hanchung; Liu, Yung Y.; Shuler, James
The ability to monitor critical environment parameters of nuclear plants at all times, particularly during and after a disruptive accident, is vital for the safety of plant personnel, rescue and recovery crews, and the surrounding communities. Conventional hard-wired assets that depend on supplied power may be decimated as a result of such events, as witnessed in the Japanese Fukushima nuclear power plant in March 2011. Self-powered monitoring devices operating on a wireless platform, on the other hand, may survive such calamity and remain functional. The devices would be pre-positioned at strategic locations, particularly where the dangerous build-up of contamination andmore » radiation may preclude subsequent manned entrance and surveillance. Equipped with sensors for β-γ radiation, neutrons, hydrogen gas, temperature, humidity, pressure, and water level, as well as with criticality alarms and imaging equipment for heat, video, and other capabilities, these devices can provide vital surveillance information for assessing the extent of plant damage, mandating responses (e.g., evacuation before impending hydrogen explosion), and enabling overall safe and efficient recovery in a disaster. A radio frequency identification (RFID)-based system - called ARG-US - may be modified and adapted for this task. Developed by Argonne for DOE, ARG-US (meaning 'watchful guardian') has been used successfully to monitor and track sensitive nuclear materials packages at DOE sites. It utilizes sensors in the tags to continuously monitor the state of health of the packaging and promptly disseminates alarms to authorized users when any of the preset sensor thresholds is violated. By adding plant-specific monitoring sensors to the already strong sensor suite and adopting modular hardware, firmware, and software subsystems that are tailored for specific subsystems of a plant, a Remote Area Modular Monitoring (RAMM) system, built on a wireless sensor network (WSN) platform, is being developed by Argonne National Laboratory. ARG-US RAMM, powered by on-board battery, can sustain extended autonomous surveillance operation during and following an incident. The benefits could be invaluable to such critical facilities as nuclear power plants, research and test reactors, fuel cycle manufacturing centers, spent-fuel dry-cask storage facilities, and other nuclear installations. (authors)« less
Khodakova, V I; Zholdasova, I M; Allaniiazova, T; Frolova, A A; Artamoshin, A S; Guseva, L N; Arystanov, E; Gitsu, G A
1998-01-01
Experiments were made to infect young Ophiocephalus argus, the fish of prey delivered from eastern Asia in the Amu-Dar'ya River basin, outside the area of the broad tapeworm Diphyllobothrium latum. The dalags were infected mainly by ingesting the local copepods Arctodiaptomus salinus, the experimentally invaded larvae of the broad tapeworm. The latter larvae were obtained from the development of eggs of the helminth isolated from strobilae from the patients treated in Perm Province. D. latum plerocercoids lived in the dalags nearly 3 weeks, then they died and lysed. Thus, the dalag cannot be a supplementary host of D. latum.
Lapointe, N.W.R.; Thorson, J.T.; Angermeier, P.L.
2010-01-01
The northern snakehead (Channa argus) is a large piscivorous fish that is invasive in eastern Europe and has recently been introduced in North America. We examined the seasonal habitat selection at meso- and microhabitat scales using radio-telemetry to increase understanding of the ecology of this species, which will help to inform management decisions. After the spawning season (postspawn season, September–November), northern snakeheads preferred offshore Eurasian water-milfoil (Myriophyllum spicatum) beds with shallow water (∼115 cm) and soft substrate. In the winter (November–April), these fish moved to deeper water (∼135 cm) with warmer temperatures, but habitat selection was weak at both scales. Northern snakeheads returned to shallower water (∼95 cm) in the prespawn season (April–June) and used milfoil and other cover. Habitat selection was the strongest at both meso- and microhabitat scales during the spawning season (June–September), when fish preferred macrophytes and cover in shallow water (∼88 cm). Our results help to identify habitats at the risk of invasion by northern snakeheads. We suggest that control efforts and future research focus on shallow waters, and take into consideration the seasonal habitat preferences.
Lapointe, N.W.R.; Thorson, J.T.; Angermeier, P.L.
2010-01-01
The northern snakehead (Channa argus) is a large piscivorous fish that is invasive in eastern Europe and has recently been introduced in North America. We examined the seasonal habitat selection at meso- and microhabitat scales using radio-telemetry to increase understanding of the ecology of this species, which will help to inform management decisions. After the spawning season (postspawn season, September-November), northern snakeheads preferred offshore Eurasian water-milfoil (Myriophyllum spicatum) beds with shallow water (115 cm) and soft substrate. In the winter (November-April), these fish moved to deeper water (135 cm) with warmer temperatures, but habitat selection was weak at both scales. Northern snakeheads returned to shallower water (95 cm) in the prespawn season (April-June) and used milfoil and other cover. Habitat selection was the strongest at both meso- and microhabitat scales during the spawning season (June-September), when fish preferred macrophytes and cover in shallow water (88 cm). Our results help to identify habitats at the risk of invasion by northern snakeheads. We suggest that control efforts and future research focus on shallow waters, and take into consideration the seasonal habitat preferences. ?? 2010 John Wiley & Sons A/S.
Demographic patterns in the peacock grouper (Cephalopholis argus), an introduced Hawaiian reef fish
Donovan, Mary K.; Friedlander, Alan M.; DeMartini, Edward E.; Donahue, Megan J.; Williams, Ivor D.
2013-01-01
This study took advantage of a unique opportunity to collect large sample sizes of a coral reef fish species across a range of physical and biological features of the Hawaiian Archipelago to investigate variability in the demography of an invasive predatory coral reef fish, Cephalopholis argus (Family: Epinephelidae). Age-based demographic analyses were conducted at 10 locations in the main Hawaiian Islands and estimates of weight-at-length, size-at-age, and longevity were compared among locations. Each metric differed among locations, although patterns were not consistent across metrics. Length-weight relationships for C. argus differed among locations and individuals weighed less at a given length at Hilo, the southernmost location studied. Longevity differed among and within islands and was greater at locations on Maui and Hawaii compared to the more northern locations on Oahu and Kauai. Within-island growth patterns differed at Kauai, Oahu, and Hawaii. This work provides a case study of fundamental life history information from distant and/or spatially limited locations that are critical for developing robust fishery models. The differences observed both among and within islands indicate that variability may be driven by cross-scale mechanisms that need to be considered in fisheries stock assessments and ecosystem-based management.
HIV classification using the coalescent theory
Bulla, Ingo; Schultz, Anne-Kathrin; Schreiber, Fabian; Zhang, Ming; Leitner, Thomas; Korber, Bette; Morgenstern, Burkhard; Stanke, Mario
2010-01-01
Motivation: Existing coalescent models and phylogenetic tools based on them are not designed for studying the genealogy of sequences like those of HIV, since in HIV recombinants with multiple cross-over points between the parental strains frequently arise. Hence, ambiguous cases in the classification of HIV sequences into subtypes and circulating recombinant forms (CRFs) have been treated with ad hoc methods in lack of tools based on a comprehensive coalescent model accounting for complex recombination patterns. Results: We developed the program ARGUS that scores classifications of sequences into subtypes and recombinant forms. It reconstructs ancestral recombination graphs (ARGs) that reflect the genealogy of the input sequences given a classification hypothesis. An ARG with maximal probability is approximated using a Markov chain Monte Carlo approach. ARGUS was able to distinguish the correct classification with a low error rate from plausible alternative classifications in simulation studies with realistic parameters. We applied our algorithm to decide between two recently debated alternatives in the classification of CRF02 of HIV-1 and find that CRF02 is indeed a recombinant of Subtypes A and G. Availability: ARGUS is implemented in C++ and the source code is available at http://gobics.de/software Contact: ibulla@uni-goettingen.de Supplementary Information: Supplementary data are available at Bioinformatics online. PMID:20400454
NASA Astrophysics Data System (ADS)
Muka, Edward; Mertelmeier, Thomas; Slone, Richard M.; Senol, Evren
1997-05-01
We studied the impact of CRT spot size, phosphor luminance noise and image noise on the specification of high- resolution CRT displays that address the critical needs of general chest radiography. Using Argus CRT simulation software, the design of high-resolution CRTs for the display of adult chest radiographs was studied. The simulated images were printed on a laser printer and evaluated by a board- certified radiologist, RMS. The validity of the Argus simulation was assessed by modeling a 1k X 1k pixels CRT, whose technical parameters were sufficiently well known. Comments from the observer are presented comparing the simulated 2k display and a size-matched replicate of the original screen/film image. Critical parameters like phosphor luminance efficiency and its impact on electron beam size and phosphor luminance noise and its impact on radiographic image noise are discussed. We conclude that Argus CRT simulation software can successfully model the performance of CRTs intended to display medical images permitting consideration of critical parameters without costly manufacturing trials. Based on the 2k CRT simulation results, we suggest that a low luminance noise phosphor such as type p45 be used to ensure that specifying a small spot size would yield the anticipated sharpness improvements.
Assessment of predation risk through conspecific alarm odors by spiny lobsters
2009-01-01
Strong “alarm odors” emanating from lethally injured conspecifics may indicate an imminent risk of predation to spiny lobsters. In laboratory trials,1 strong conspecific alarm odors elicited avoidance in Panulirus argus, a highly gregarious species that displays collective defense behavior, but not in Panulirus guttatus, a species that tends to aggregate when reproductive activity is high (spring) but not when it is low (late summer) and does not display collective defensive behavior. To reduce predation risk, however, lobsters may autotomize limbs, thus sustaining nonlethal injuries. I tested the response of these lobsters to scents emanating from intact, lethally-injured and non-lethally injured conspecifics. In P. argus, these scents elicited, respectively, attraction, avoidance and a random response, suggesting that, in P. argus, avoidance of conspecific alarm odors depends on their strength. In contrast, P. guttatus lobsters responded at random to scents of lethally injured conspecifics and showed a similar response to scents of intact and non-lethally injured conspecifics in the spring (attraction) and in the summer (random), reflecting the more cryptic defensive behavior of this species. Therefore, both species use conspecific alarm odors for risk-assessment, but each responds to these cues in the most effective way to reduce its risk of predation. PMID:19721871
Briones-Fourzán, Patricia
2009-07-01
Strong "alarm odors" emanating from lethally injured conspecifics may indicate an imminent risk of predation to spiny lobsters. In laboratory trials,1 strong conspecific alarm odors elicited avoidance in Panulirus argus, a highly gregarious species that displays collective defense behavior, but not in Panulirus guttatus, a species that tends to aggregate when reproductive activity is high (spring) but not when it is low (late summer) and does not display collective defensive behavior. To reduce predation risk, however, lobsters may autotomize limbs, thus sustaining nonlethal injuries. I tested the response of these lobsters to scents emanating from intact, lethally-injured and non-lethally injured conspecifics. In P. argus, these scents elicited, respectively, attraction, avoidance and a random response, suggesting that, in P. argus, avoidance of conspecific alarm odors depends on their strength. In contrast, P. guttatus lobsters responded at random to scents of lethally injured conspecifics and showed a similar response to scents of intact and non-lethally injured conspecifics in the spring (attraction) and in the summer (random), reflecting the more cryptic defensive behavior of this species. Therefore, both species use conspecific alarm odors for risk-assessment, but each responds to these cues in the most effective way to reduce its risk of predation.
Reproductive life history of the introduced peacock grouper Cephalopholis argus in Hawaii.
Schemmel, E M; Donovan, M K; Wiggins, C; Anzivino, M; Friedlander, A M
2016-08-01
This research investigated the reproductive biology (sex ratio, hermaphroditic pattern, size and age at maturity) of Cephalopholis argus, known locally in Hawaii by its Tahitian name roi. The results suggest that C. argus exhibits monandric protogyny (female gonad differentiation with female to male sex change) with females reaching sexual maturity at 1.2 years (95% c.i.: 0.6, 1.6) and 20.0 cm total length (LT ; 95% c.i.: 19.6, 21.2). The female to male sex ratio was 3.9:1. The average age and LT at sex change was 11.5 years (95% c.i.: 11.1, 12.9) and 39.9 cm (95% c.i.: 39.5, 41.2), respectively. Current information on spawning seasonality of this species is incomplete, but based on the occurrence of spawning capable and actively spawning females, spawning probably takes place from May to October. Evidence of lunar spawning periodicity was found, with an increased proportion of spawning capable and actively spawning females, and an increased female gonado-somatic index during first quarter and full-moon phases. This information fills a valuable information gap in Hawaii and across the species' native range. © 2016 The Fisheries Society of the British Isles.
Briones-Fourzán, Patricia; Lozano-Alvarez, Enrique; Negrete-Soto, Fernando; Barradas-Ortiz, Cecilia
2007-03-01
Shortage of natural crevice shelters may produce population bottlenecks in juvenile Caribbean spiny lobsters (Panulirus argus), a socially gregarious species. We conducted a field experiment to test enhancement of a local population of juvenile P. argus with the addition of artificial shelters ("casitas") that mimic large crevices (1.1 m(2) in surface area and 3.8 cm in height). Changes in density and biomass of juvenile lobsters 15-50 mm carapace length (CL) were assessed with a multiple before-after control-impact (MBACI) analysis. Separate analyses were also conducted on small (15-35 mm CL) and large (35.1-50 mm CL) juveniles to assess size-related effects. First, we carried out 13 lobster surveys on nine fixed 1-ha sites over a shallow reef lagoon ("before" period). Then, we deployed ten casitas in each of five sites and left four sites as controls, and conducted 22 further surveys ("after" period). Deployment of casitas resulted in a sixfold increase in juvenile density (76% contributed by small and 24% by large juveniles) and a sevenfold increase in biomass (40 and 60%, respectively). Capture-recapture results revealed that enhancement was achieved not by promoting individual growth but by increasing survival, persistence, and foraging ranges of small and large juveniles. Casitas both mitigated shortage of natural shelter and increased sociality, allowing for cohabitation of smaller, more vulnerable juveniles with larger conspecifics that have greater defensive abilities. Casitas may help enhance local populations of juvenile P. argus in Caribbean seagrass habitats, typically poor in natural crevice shelters. The use of MBACI and the simultaneous assessment of multiple interrelated response variables may be a powerful analytical approach to test shelter limitation in other species and to examine the function of structural habitat in other systems.
NASA Astrophysics Data System (ADS)
Miao, Shuyan; Zhao, Chenze; Zhu, Jinyu; Pan, Mingzhu
2018-03-01
Microbial communities in different gastrointestinal regions (stomach, foregut, midgut, and hindgut) of the northern snakehead Channa argus (Cantor, 1842) were compared by polymerase chain reaction and partial 16S rDNA sequencing. A total of 194, 140, 212, and 122 OTUs were detected in the stomach, foregut, midgut, and hindgut, respectively. Significant differences were found in the Sobs, ACE, Shannon, and Simpson indices among samples ( P<0.05). The gastrointestinal microbial community of C. argus consisted predominantly of Proteobacteria with either Halomonas, Shewanella, Plesiomonas, or Sphingomonas. Fusobacteria, Firmicutes, and Bacteroidetes also existed in the gastrointestinal tracts. However, significant differences were found in the compositions of microbial community among the four regions ( P<0.05). Cyanobacteria and Spirochetes were significantly higher in the midgut and hindgut ( P<0.05). Fusobacteria and Firmicutes were dominant in the hindgut and foregut, respectively ( P<0.05). Proteobacteria was the lowest in the hindgut ( P<0.05). At genus level, Cetobacterium and Plesiomonas were significantly higher in the hindgut than in the other three samples ( P<0.05). Clostridium and Prevotella were the highest in the midgut ( P<0.05). Halomonas, Shewanella, and Sphingomonas were the highest in the foregut ( P<0.05). Paracoccus and Vibrio were the highest in the stomach. Several genera were only detected in certain regions, as follows: stomach, Paracoccus and Vibrio; foregut, Halomonas, Shewanella, and Sphingomonas; midgut, Clostridium and Prevotella; and hindgut, Cetobacterium and Plesiomonas ( P<0.05). At the species level, Acinetobacter rhizosphaerae was only detected in the stomach. Prevotella copri and Clostridium perfring were not detected in the foregut and midgut, respectively, whereas Prevotella copri and Faecalibacterium pra were not detected in the hindgut. These findings provide valuable information on the microbial community in each gastrointestinal region of C. argus. Moreover, this study indicated that microbial community was not only related to rearing environment but also to the physico-chemical characteristics of each gastrointestinal region.
Code of Federal Regulations, 2010 CFR
2010-10-01
... board. Lobster means one or both of the following: (1) Smoothtail lobster, Panulirus laevicauda. (2) Spiny lobster, Panulirus argus. Regional Administrator means the Director, Southeast Region, or a...
Code of Federal Regulations, 2011 CFR
2011-10-01
... board. Lobster means one or both of the following: (1) Smoothtail lobster, Panulirus laevicauda. (2) Caribbean spiny lobster or spiny lobster, Panulirus argus. Regional Administrator means the Administrator of...
Montero-Alejo, Vivian; Perdomo-Morales, Rolando; García-Galano, Tsai; Martínez-Rodríguez, Gonzalo; Mancera, Juan M.
2017-01-01
As other spiny lobsters, Panulirus argus is supposed to use preferentially proteins and lipids in energy metabolism, while carbohydrates are well digested but poorly utilized. The aim of this study was to evaluate the effect of dietary carbohydrate level on digestion and metabolism in the spiny lobster P. argus. We used complementary methodologies such as post-feeding flux of nutrients and metabolites, as well as measurements of α-amylase expression and activity in the digestive tract. Lobsters readily digested and absorbed carbohydrates with a time-course that is dependent on their content in diet. Lobster showed higher levels of free glucose and stored glycogen in different tissues as the inclusion of wheat flour increased. Modifications in intermediary metabolism revealed a decrease in amino acids catabolism coupled with a higher use of free glucose as carbohydrates rise up to 20%. However, this effect seems to be limited by the metabolic capacity of lobsters to use more than 20% of carbohydrates in diets. Lobsters were not able to tightly regulate α-amylase expression according to dietary carbohydrate level but exhibited a marked difference in secretion of this enzyme into the gut. Results are discussed to highlight the limitations to increasing carbohydrate utilization by lobsters. Further growout trials are needed to link the presented metabolic profiles with phenotypic outcomes. PMID:29114440
Rodríguez-Viera, Leandro; Perera, Erick; Montero-Alejo, Vivian; Perdomo-Morales, Rolando; García-Galano, Tsai; Martínez-Rodríguez, Gonzalo; Mancera, Juan M
2017-01-01
As other spiny lobsters, Panulirus argus is supposed to use preferentially proteins and lipids in energy metabolism, while carbohydrates are well digested but poorly utilized. The aim of this study was to evaluate the effect of dietary carbohydrate level on digestion and metabolism in the spiny lobster P. argus . We used complementary methodologies such as post-feeding flux of nutrients and metabolites, as well as measurements of α-amylase expression and activity in the digestive tract. Lobsters readily digested and absorbed carbohydrates with a time-course that is dependent on their content in diet. Lobster showed higher levels of free glucose and stored glycogen in different tissues as the inclusion of wheat flour increased. Modifications in intermediary metabolism revealed a decrease in amino acids catabolism coupled with a higher use of free glucose as carbohydrates rise up to 20%. However, this effect seems to be limited by the metabolic capacity of lobsters to use more than 20% of carbohydrates in diets. Lobsters were not able to tightly regulate α-amylase expression according to dietary carbohydrate level but exhibited a marked difference in secretion of this enzyme into the gut. Results are discussed to highlight the limitations to increasing carbohydrate utilization by lobsters. Further growout trials are needed to link the presented metabolic profiles with phenotypic outcomes.
NASA Astrophysics Data System (ADS)
Kepley, Amanda; Bigiel, Frank; Bolatto, Alberto; Church, Sarah; Cleary, Kieran; Frayer, David; Gallagher, Molly; Gundersen, Joshua; Harris, Andrew; Hughes, Annie; Jimenez-Donaire, Maria Jesus; Kessler, Sarah; Lee, Cheoljong; Leroy, Adam; Li, Jialu; Donovan Meyer, Jennifer; Rosolowsky, Erik; Sandstrom, Karin; Schinnener, Eva; Schruba, Andreas; Sieth, Matt; Usero, Antonio
2018-01-01
Gas density plays a central role in all modern theories of star formation. A key test of these theories involves quantifying the resolved gas density distribution and its relationship to star formation within a wide range of galactic environments. Until recently, this experiment has been difficult to perform owing to the faint nature of key molecular gas tracers like HCN and HCO+, but the superior sensitivity of modern millimeter instruments like ALMA and the IRAM 30m make these types of experiments feasible. In particular, the sensitivity and resolution provided by large aperture of the GBT combined with fast mapping speeds made possible by its new 16-pixel, 3mm focal plane array (Argus) make the GBT an almost-ideal instrument for this type of study. The Dense Extragalactic GBT+Argus Survey (DEGAS) will leverage these capabilities to perform the largest, resolved survey of molecular gas tracers in nearby galaxies, ultimately mapping a suite of four molecular gas tracers in the inner 2’ by 2’ of 36 nearby galaxies. When complete in 2020, DEGAS will be the largest resolved survey of dense molecular gas tracers in nearby galaxies. This talk will present early results from the first observations for this Green Bank Telescope large survey and highlight some exciting future possibilities for this survey.
Horner, Amy J; Weissburg, Marc J; Derby, Charles D
2008-03-01
The "noses" of diverse taxa are organized into different subsystems whose functions are often not well understood. The "nose" of decapod crustaceans is organized into two parallel pathways that originate in different populations of antennular sensilla and project to specific neuropils in the brain-the aesthetasc/olfactory lobe pathway and the non-aesthetasc/lateral antennular neuropil pathway. In this study, we investigated the role of these pathways in mediating shelter selection of Caribbean spiny lobsters, Panulirus argus, in response to conspecific urine signals. We compared the behavior of ablated animals and intact controls. Our results show that control and non-aesthetasc ablated lobsters have a significant overall preference for shelters emanating urine over control shelters. Thus the non-aesthetasc pathway does not play a critical role in shelter selection. In contrast, spiny lobsters with aesthetascs ablated did not show a preference for either shelter, suggesting that the aesthetasc/olfactory pathway is important for processing social odors. Our results show a difference in the function of these dual chemosensory pathways in responding to social cues, with the aesthetasc/olfactory lobe pathway playing a major role. We discuss our results in the context of why the noses of many animals contain multiple parallel chemosensory systems.
THE SOLAR NEIGHBORHOOD. XXVI. AP Col: THE CLOSEST (8.4 pc) PRE-MAIN-SEQUENCE STAR
DOE Office of Scientific and Technical Information (OSTI.GOV)
Riedel, Adric R.; Henry, Todd J.; Jao, Wei-Chun
2011-10-15
We present the results of a multi-technique investigation of the M4.5Ve flare star AP Col, which we discover to be the nearest pre-main-sequence star. These include astrometric data from the CTIO 0.9 m, from which we derive a proper motion of 342.0 {+-} 0.5 mas yr{sup -1}, a trigonometric parallax of 119.21 {+-} 0.98 mas (8.39 {+-} 0.07 pc), and photometry and photometric variability at optical wavelengths. We also provide spectroscopic data, including radial velocity (22.4 {+-} 0.3 km s{sup -1}), lithium equivalent width (EW) (0.28 {+-} 0.02 A), H{alpha} EW (-6.0 to -35 A), vsin i (11 {+-} 1more » km s{sup -1}), and gravity indicators from the Siding Spring 2.3 m WiFeS, Lick 3 m Hamilton echelle, and Keck-I HIRES echelle spectrographs. The combined observations demonstrate that AP Col is the closer of only two known systems within 10 pc of the Sun younger than 100 Myr. Given its space motion and apparent age of 12-50 Myr, AP Col is likely a member of the recently proposed {approx}40 Myr old Argus/IC 2391 Association.« less
Winston, Richard B.; Voss, Clifford I.
2004-01-01
This report describes SutraGUI, a flexible graphical user-interface (GUI) that supports two-dimensional (2D) and three-dimensional (3D) simulation with the U.S. Geological Survey (USGS) SUTRA ground-water-flow and transport model (Voss and Provost, 2002). SutraGUI allows the user to create SUTRA ground-water models graphically. SutraGUI provides all of the graphical functionality required for setting up and running SUTRA simulations that range from basic to sophisticated, but it is also possible for advanced users to apply programmable features within Argus ONE to meet the unique demands of particular ground-water modeling projects. SutraGUI is a public-domain computer program designed to run with the proprietary Argus ONE? package, which provides 2D Geographic Information System (GIS) and meshing support. For 3D simulation, GIS and meshing support is provided by programming contained within SutraGUI. When preparing a 3D SUTRA model, the model and all of its features are viewed within Argus 1 in 2D projection. For 2D models, SutraGUI is only slightly changed in functionality from the previous 2D-only version (Voss and others, 1997) and it provides visualization of simulation results. In 3D, only model preparation is supported by SutraGUI, and 3D simulation results may be viewed in SutraPlot (Souza, 1999) or Model Viewer (Hsieh and Winston, 2002). A comprehensive online Help system is included in SutraGUI. For 3D SUTRA models, the 3D model domain is conceptualized as bounded on the top and bottom by 2D surfaces. The 3D domain may also contain internal surfaces extending across the model that divide the domain into tabular units, which can represent hydrogeologic strata or other features intended by the user. These surfaces can be non-planar and non-horizontal. The 3D mesh is defined by one or more 2D meshes at different elevations that coincide with these surfaces. If the nodes in the 3D mesh are vertically aligned, only a single 2D mesh is needed. For nonaligned meshes, two or more 2D meshes of similar connectivity are used. Between each set of 2D meshes (and model surfaces), the vertical space in the 3D mesh is evenly divided into a user-specified number of layers of finite elements. Boundary conditions may be specified for 3D models in SutraGUI using a variety of geometric shapes that may be located freely within the 3D model domain. These shapes include points, lines, sheets, and solids. These are represented by 2D contours (within the vertically-projected Argus ONE view) with user-defined elevations. In addition, boundary conditions may be specified for 3D models as points, lines, and areas that are located exactly within the surfaces that define the model top and the bottoms of the tabular units. Aquifer properties may be specified separately for each tabular unit. If the aquifer properties vary vertically within a unit, SutraGUI provides the Sutra_Z function that can be used to specify such variation.
NASA Technical Reports Server (NTRS)
Lopez, Jinena P.; Luo, Ming; Christensen, Lance E.; Loewenstein, Max; Jost, Hansjurg; Webster, Christopher R.; Osterman, Greg
2008-01-01
The Aura Validation Experiment (AVE) focuses on validating Aura satellite measurements of important atmospheric trace gases using ground-based, aircraft, and balloon-borne instruments. Global satellite observations of CO from the Tropospheric Emission Spectrometer (TES) on the EOS Aura satellite have been ongoing since September 2004. This paper discusses CO validation experiments during the Oct-AVE (2004 Houston, Texas) and CR-AVE (2006 San Jose, Costa Rica) campaigns. The coincidences in location and time between the satellite observations and the available in situ profiles for some cases are not ideal. However, the CO distribution patterns in the two validation flight areas are shown to have very little variability in the aircraft and satellite . observations, thereby making them suitable for validation comparisons. TES CO profiles, which typically have a retrieval uncertainty of 10-20%, are compared with in situ CO measurements from NASA Ames Research Center's Argus instrument taken on board the WB-57F aircraft during Oct-AVE. TES CO retrievals during CR-AVE are compared with in situ measurements from Jet Propulsion Laboratory's Aircraft Laser Infrared Absorption Spectrometer (ALIAS) instrument as well as with the Argus instrument, both taken on board the WB-57F aircraft. During CR-AVE, the average overall difference between ALIAS and Argus CO was 4%, with the ALIAS measurement higher. During individual flights, 2-min time-averaged differences between the two in situ instruments had standard deviation of 14%. The TES averaging kernels and a priori constraint profiles for CO are applied to the in situ data for proper comparisons to account for the reduced vertical resolution and the influence of the a priori in the satellite-derived profile. In the TES sensitive pressure range, approx.700-200 hPa, the in situ profiles and TES profiles agree within 5-10%, less than the variability in CO distributions obtained by both TES and the aircraft instruments in the two regions. TES CO is slightly lower than in situ measurements in the Houston area (midlatitudes) and slightly higher than in situ CO measurements in the Costa Rica region (tropical).
Duncan, Jacque L; Arditi, Aries; da Cruz, Lyndon; Dagnelie, Gislin; Dorn, Jessy D; Ho, Allen C; Olmos de Koo, Lisa C; Barale, Pierre‐Olivier; Stanga, Paulo E; Thumann, Gabriele; Wang, Yizhong; Greenberg, Robert J
2016-01-01
Background The purpose of this analysis is to report the change in quality of life (QoL) after treatment with the Argus II Epiretinal Prosthesis in patients with end‐stage retinitis pigmentosa. Methods The Vision and Quality of Life Index (VisQoL) was used to assess changes in QoL dimensions and overall utility score in a prospective 30‐patient single‐arm clinical study. VisQoL is a multi‐attribute instrument consisting of six dimensions (injury, life, roles, assistance, activity and friendship) that may be affected by visual impairment. Within each dimension, patients were divided into two groups based on how much their QoL was affected by their blindness at baseline (moderate/severe or minimal). Outcomes were compared within each dimension sub‐group between baseline and the combined follow‐up periods using the Friedman test. In addition, data from the six dimensions were combined into a single utility score, with baseline data compared to the combined follow‐up periods. Results Overall, 80 per cent of the patients reported difficulty in one or more dimensions pre‐implant. Composite VisQoL utility scores at follow‐up showed no statistically significant change from baseline; however, in three of the six VisQoL dimensions (injury, life and roles), patients with baseline deficits showed significant and lasting improvement after implantation with Argus II. In two of the three remaining dimensions (assistance and activity), data trended toward an improvement. In the final VisQoL dimension (friendship), none of the patients reported baseline deficits, suggesting that patients had largely adjusted to this attribute. Conclusion Patients whose vision negatively affected them with respect to three VisQoL dimensions (that is, getting injured, coping with the demands of their life and fulfilling their life roles) reported significant improvement in QoL after implantation of the Argus II retinal prosthesis. Furthermore, the benefit did not deteriorate at any point during the 36‐month follow‐up, suggesting a long‐term, durable improvement. PMID:27558213
Chemical composition and nutritional quality of sea cucumbers.
Wen, Jing; Hu, Chaoqun; Fan, Sigang
2010-11-01
The dried form of sea cucumbers has been a seafood and medicinal cure for Asians over many centuries. In this study the chemical composition and nutritional quality of eight common sea cucumbers (Stichopus herrmanni, Thelenota ananas, Thelenota anax, Holothuria fuscogilva, Holothuria fuscopunctata, Actinopyga mauritiana, Actinopyga caerulea and Bohadschia argus) were determined. All species except T. anax and A. caerulea had higher protein and lower fat levels. A. mauritiana and B. argus had less ash content. Glycine was the dominant amino acid found in all species, and content ranged from 126 to 216 mg g(-1) of crude protein. All species exhibited low lysine:arginine ratio and higher essential amino acid scores were obtained by threonine and phenylalanine + tyrosine. A. mauritiana had proportionally less saturated fatty acids (31.23%), and more monounsaturated fatty acids (45.64%) and polyunsaturated fatty acids (PUFA, 23.13%) than other species. Arachidonic acid (C20:4n-6) was the major PUFA in all species. T. ananas, A. mauritiana and A. caerulea contained more n-3 PUFA. The n-3/n-6 ratios of eight sea cucumbers species ranged from 0.25 to 0.61. Sea cucumbers are a seafood with high protein and low fat levels. The amino acid contents were similar but fatty acid profiles were different among species. The comparison showed that T. ananas, A. mauritiana and B. argus possessed higher nutritional values than other sea cucumber species. 2010 Society of Chemical Industry
Chang, Jing; Hao, Weiyu; Xu, Yuanyuan; Xu, Peng; Li, Wei; Li, Jianzhong; Wang, Huili
2018-01-01
The disturbance of the thyroid system and elimination of chiral pyrethroid pesticides with respect to enantioselectivity in reptiles have so far received limited attention by research. In this study, bioaccumulation, thyroid gland lesions, thyroid hormone levels, and hypothalamus-pituitary-thyroid axis-related gene expression in male Eremias argus were investigated after three weeks oral administration of lambda-cyhalothrin (LCT) enantiomers. In the lizard liver, the concentration of LCT was negatively correlated with the metabolite-3-phenoxybenzoic acid (PBA) level during 21 days of exposure. (+)-LCT exposure induced a higher thyroid follicular epithelium height than (-)-LCT exposure. The thyroxine levels were increased in both treated groups while only (+)-LCT exposure induced a significant change in the triiodothyronine (T3) level. In addition, the expressions of hypothalamus-pituitary-thyroid axis-related genes including thyroid hormone receptors (trs), deiodinases (dios), uridinediphosphate glucuronosyltransferase (udp), and sulfotransferase (sult) were up-regulated after exposure to the two enantiomers. (+)-LCT treatment resulted in higher expression of trs and (-)-LCT exposure led to greater stimulation of dios in the liver, which indicated PBA-induced antagonism on thyroid hormone receptors and LCT-induced disruption of thyroxine (T4) deiodination. The results suggest the (-)-LCT exposure causes higher residual level in lizard liver while induces less disruption on lizard thyroid activity than (+)-LCT. Copyright © 2017 Elsevier Ltd. All rights reserved.
Chen, H P; Deng, S P; Dai, M L; Zhu, C H; Li, G L
2016-04-07
Androgen plays critical roles in vertebrate reproductive systems via androgen receptors (ARs). In the present study, the full-length spotted scat (Scatophagus argus) androgen receptor (sAR) cDNA sequence was cloned from testis. The sAR cDNA measured 2448 bp in length with an open-reading frame of 2289 bp, encoding 763 amino acids. Amino acid alignment analyses showed that the sARs exhibited highly evolutionary conserved functional domains. Phylogenetically, the sARs clustered within the ARβ common vertebrate group. Real-time polymerase chain reaction (RT-PCR) revealed that sAR expression varied in level and distribution throughout the tissues of both females and males. sAR expression was detected during testicular development by quantitative RT-PCR. The results showed that the highest transcription of sARs was observed in the mid-testicular stage, and remained at a high expression level until the late-testicular stage. In addition, the effects of 17α-methyltestosterone (MT) and estrogen (E2) on the expression of sARs in ovaries were determined using quantitative RT-PCR. sAR expression increased at 12 and 24 h post-MT treatment and decreased with E2 treatment. The present study provides preliminary evidence indicating gonadal plasticity of spotted scat under exogenous steroidal hormone treatments. It also provides a theoretical basis for sex reversal and production of artificial pseudo-males for female monosex breeding.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schneider, Adam C.; Shkolnik, Evgenya L.; Windsor, James
Young brown dwarfs share many properties with directly imaged giant extrasolar planets. They therefore provide unique laboratories for investigating the full range of temperature and mass encompassed by the growing collection of planets discovered outside our Solar System. Furthermore, if they can be tied to a particular group of coeval stars, they also provide vital anchor points for low-mass empirical isochrones. We have developed a novel procedure for identifying such objects based on their unique 2MASS and AllWISE colors. Using our search criteria, we have identified 50 new, late-type L dwarf candidates, 47 of which are spectroscopically confirmed as Lmore » dwarfs with follow-up near-infrared spectroscopy. We evaluate the potential membership of these objects in nearby, young moving groups using their proper motions, photometric distance estimates, and spectroscopic indicators of youth, and find seven likely L-type members belonging to the β Pictoris moving group, the AB Doradus moving group, the Tucana-Horologium association, or the Argus association, in addition to several lower probability members. Also found are two late-type (L5 and L6) potential members of the nearby Hyades cluster (WISEA J043642.75+190134.8 and WISEA J044105.56+213001.5).« less
Jiang, Yanliang; Feng, Shuaisheng; Xu, Jian; Zhang, Songhao; Li, Shangqi; Sun, Xiaoqing; Xu, Peng
2016-10-01
Aerial breathing in fish was an important adaption for successful survival in hypoxic water. All aerial breathing fish are bimodal breathers. It is intriguing that they can obtain oxygen from both air and water. However, the genetic basis underlying bimodal breathing has not been extensively studied. In this study, we performed next-generation sequencing on a bimodal breathing fish, the Northern snakehead, Channa argus, and generated a transcriptome profiling of C. argus. A total of 53,591 microsatellites and 26,378 SNPs were identified and classified. A Ka/Ks analysis of the unigenes indicated that 63 genes were under strong positive selection. Furthermore, the transcriptomes from the aquatic breathing organ (gill) and the aerial breathing organ (suprabranchial chamber) were sequenced and compared, and the results showed 1,966 genes up-regulated in the gill and 2,727 genes up-regulated in the suprabranchial chamber. A gene pathway analysis concluded that four functional categories were significant, of which angiogenesis and elastic fibre formation were up-regulated in the suprabranchial chamber, indicating that the aerial breathing organ may be more efficient for gas exchange due to its highly vascularized and elastic structure. In contrast, ion uptake and transport and acid-base balance were up-regulated in the gill, indicating that the aquatic breathing organ functions in ion homeostasis and acid-base balance, in addition to breathing. Understanding the genetic mechanism underlying bimodal breathing will shed light on the initiation and importance of aerial breathing in the evolution of vertebrates. Copyright © 2016 Elsevier B.V. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bloom, E.D.
1985-01-01
This report contains a brief review of recent results from the ARGUS and Crystal Ball experiments at DORIS II, concentrating on UPSILON(1S) and UPSILON(2S) spectroscopy with a short foray into ..gamma gamma.. physics. 18 refs., 10 figs.
FLORA™: Phase I development of a functional vision assessment for prosthetic vision users.
Geruschat, Duane R; Flax, Marshall; Tanna, Nilima; Bianchi, Michelle; Fisher, Andy; Goldschmidt, Mira; Fisher, Lynne; Dagnelie, Gislin; Deremeik, Jim; Smith, Audrey; Anaflous, Fatima; Dorn, Jessy
2015-07-01
Research groups and funding agencies need a functional assessment suitable for an ultra-low vision population to evaluate the impact of new vision-restoration treatments. The purpose of this study was to develop a pilot assessment to capture the functional visual ability and well-being of subjects whose vision has been partially restored with the Argus II Retinal Prosthesis System. The Functional Low-Vision Observer Rated Assessment (FLORA) pilot assessment involved a self-report section, a list of functional visual tasks for observation of performance and a case narrative summary. Results were analysed to determine whether the interview questions and functional visual tasks were appropriate for this ultra-low vision population and whether the ratings suffered from floor or ceiling effects. Thirty subjects with severe to profound retinitis pigmentosa (bare light perception or worse in both eyes) were enrolled in a clinical trial and implanted with the Argus II System. From this population, 26 subjects were assessed with the FLORA. Seven different evaluators administered the assessment. All 14 interview questions were asked. All 35 tasks for functional vision were selected for evaluation at least once, with an average of 20 subjects being evaluated for each test item. All four rating options—impossible (33 per cent), difficult (23 per cent), moderate (24 per cent) and easy (19 per cent)—were used by the evaluators. Evaluators also judged the amount of vision they observed the subjects using to complete the various tasks, with 'vision only' occurring 75 per cent on average with the System ON, and 29 per cent with the System OFF. The first version of the FLORA was found to contain useful elements for evaluation and to avoid floor and ceiling effects. The next phase of development will be to refine the assessment and to establish reliability and validity to increase its value as an assessment tool for functional vision and well-being. © 2015 The Authors. Clinical and Experimental Optometry © 2015 Optometry Australia.
FLORA™: Phase I development of a functional vision assessment for prosthetic vision users
Geruschat, Duane R; Flax, Marshall; Tanna, Nilima; Bianchi, Michelle; Fisher, Andy; Goldschmidt, Mira; Fisher, Lynne; Dagnelie, Gislin; Deremeik, Jim; Smith, Audrey; Anaflous, Fatima; Dorn, Jessy
2014-01-01
Background Research groups and funding agencies need a functional assessment suitable for an ultra-low vision population in order to evaluate the impact of new vision restoration treatments. The purpose of this study was to develop a pilot assessment to capture the functional vision ability and well-being of subjects whose vision has been partially restored with the Argus II Retinal Prosthesis System. Methods The Functional Low-Vision Observer Rated Assessment (FLORA) pilot assessment involved a self-report section, a list of functional vision tasks for observation of performance, and a case narrative summary. Results were analyzed to determine whether the interview questions and functional vision tasks were appropriate for this ultra-low vision population and whether the ratings suffered from floor or ceiling effects. Thirty subjects with severe to profound retinitis pigmentosa (bare light perception or worse in both eyes) were enrolled in a clinical trial and implanted with the Argus II System. From this population, twenty-six subjects were assessed with the FLORA. Seven different evaluators administered the assessment. Results All 14 interview questions were asked. All 35 functional vision tasks were selected for evaluation at least once, with an average of 20 subjects being evaluated for each test item. All four rating options -- impossible (33%), difficult (23%), moderate (24%) and easy (19%) -- were used by the evaluators. Evaluators also judged the amount of vision they observed the subjects using to complete the various tasks, with vision only occurring 75% on average with the System ON, and 29% with the System OFF. Conclusion The first version of the FLORA was found to contain useful elements for evaluation and to avoid floor and ceiling effects. The next phase of development will be to refine the assessment and to establish reliability and validity to increase its value as a functional vision and well-being assessment tool. PMID:25675964
The Coral 66 Compiler for Ferranti ARGUS 500 Computer.
1978-06-01
feature increases and decreases. These groups commence with the identifiers: BLOCKCHAIN ,LABCHAIN,PROCCHAIN,IFCHAIN,EXPRCHAIN & FORCHAIN F The features...this value being held in LOCALLIMIT. OFFSTACK is then called to reset the values of BLOCKCHAIN , LEVEL ,TRACELOCALLIMIT,DATASTART,DATAPTRDATAMAX, and
Ryan K. Saylor,; Nicolas W.R. Laointe,; Angermeier, Paul
2012-01-01
Introductions of large, non-native, carnivorous fishes continue to occur worldwide and represent a substantial management concern to global biodiversity. One of the most recent non-native fishes to successfully establish in North America is the northern snakehead (Channa argus), found in the lower Potomac River catchment. Dispersal of the northern snakehead throughout this system has been well documented since its original discovery in May 2004; however, little is known about the foraging habits of this species and its interactions with co-occurring predators. Here, we quantify northern snakehead diet in comparison with the diets of naturalised largemouth bass (Micropterus salmoides), and native American eel (Anguilla rostrata) and yellow perch (Perca flavescens) collected from tidal freshwaters bordering Virginia and Maryland near Fort Belvoir, Virginia. Over 97% of northern snakehead gut contents were fishes, with fundulid and centrarchid species consumed most frequently. Dietary overlap was biologically significant only between northern snakehead and largemouth bass. Aquatic invertebrates were >10 times more common in native predator diets, reducing dietary overlap with northern snakehead. Ontogenic shifts in adult northern snakehead diet were also detected, which may be explained by optimal foraging rather than true prey specificity. Northern snakehead may be occupying a novel niche based on a piscivorous diet, therefore limiting competition with resident predators in the lower Potomac River. Further research into interactions between largemouth bass and northern snakehead is needed to inform management decisions and understand the ecological impacts of this non-native species.
Gregori, Ninel Z; Callaway, Natalia F; Hoeppner, Catherine; Yuan, Alex; Rachitskaya, Aleksandra; Feuer, William; Ameri, Hossein; Arevalo, J Fernando; Augustin, Albert J; Birch, David G; Dagnelie, Gislin; Grisanti, Salvatore; Davis, Janet L; Hahn, Paul; Handa, James T; Ho, Allen C; Huang, Suber S; Humayun, Mark S; Iezzi, Raymond; Jayasundera, K Thiran; Kokame, Gregg T; Lam, Byron L; Lim, Jennifer I; Mandava, Naresh; Montezuma, Sandra R; Olmos de Koo, Lisa; Szurman, Peter; Vajzovic, Lejla; Wiedemann, Peter; Weiland, James; Yan, Jiong; Zacks, David N
2018-06-22
To assess the retinal anatomy and array position in the Argus II Retinal Prosthesis recipients. Prospective, non-comparative cohort study METHODS: Setting: international multicenter study PATIENTS: Argus II recipients enrolled in the Post-Market Surveillance Studies. Spectral-domain Optical Coherence Tomography images collected for the Surveillance Studies (NCT01860092 and NCT01490827) were reviewed. Baseline and postoperative macular thickness, electrode-retina distance (gap), optic disc-array overlap, and preretinal membrane presence were recorded at 1, 3, 6, and 12 months. Axial retinal thickness and axial gap along the array's long axis (a line between the tack and handle), maximal retinal thickness and maximal gap along a B-scan near the tack, midline, and handle. Thirty-three patients from 16 surgical sites in the United States and Germany were included. Mean axial retinal thickness increased from month 1 through month 12 at each location, but reached statistical significance only at the array midline (p-value=0.007). The rate of maximal thickness increase was highest near the array midline (slope=6.02, p=0.004), compared to the tack (slope=3.60, p<0.001) or the handle (slope=1.93, p=0.368). The mean axial and maximal gaps decreased over the study period, and the mean maximal gap size decrease was significant at midline (p=0.032). Optic disc-array overlap was seen in the minority of patients. Preretinal membranes were common before and after implantation. Progressive macular thickening under the array was common and corresponded to decreased electrode-retina gap over time. By month 12, the array was completely apposed to the macula in approximately half of the eyes. Copyright © 2018. Published by Elsevier Inc.
Lopeztegui, Alexander; Baisre, Julio A; Capetillo, Norberto
2011-03-01
Many biological processes such as reproductive and migratory behaviours have been associated with moon cycles. In this study, the nocturnal light levels associated with lunar cycle (INT) were correlated with daily catch rate of lobster P. argus, during seven lunar months of 2002 fishing period, to determine a possible relationship between these variables. The lobster catches were obtained from three fishing companies that develop their activities in the Gulf of Batabanó: EPICOL that fishes in Coloma area; PESCAHABANA in Batabanó area and PESCAISLA in Isla area. Daily catch per boat (CDB) was used as a measurement of daily catch variations (catch rate). The correlation was analyzed showing it in chronological graphs based on average of CDB per lunar phases, comparing lobster catch rate per lunar phases -with the Kruskal-Wallis test-. Spearman rank correlation coefficient and cross correlation techniques were also applied. Similarities between lobster catch rate and the lunar cycle were not found. Spearman rank correlation coefficient was modularly smaller than 0.1 in all cases and demonstrated quantitatively that correlation between CDB and INT does not exist. Kruskal-Wallis test detected differences only in Batabanó area but not when making the analyses for the whole Gulf of Batabanó. Finally, the cross correlations do not detected significance in any zone, as well. It is concluded that, in opposition to what other authors have reported, the catch rates of P. argus and the lunar cycle did not show significant correlation in the Gulf of Batabanó. This trend was independent of the fishing art, which varied according to the time of the year that was analyzed.
Wang, Yinghuan; Zhang, Yang; Xu, Peng; Guo, Baoyuan; Li, Wei
2018-06-20
Systematically evaluation of the metabolism, distribution and effect of thiamethoxam in mongolian racerunner (Eremias argus) were carried out after oral exposure. The HPLC equipped with Q Exactive focus was used for identification and concentration analysis of thiamethoxam and its metabolites. Percutaneous and urine excretions were the primary ways for the elimination of thiamethoxam and its metabolites, and the limiting factor was urine output. Demethylation thiamethoxam and clothianidin were the main metabolites of thiamethoxam in lizard. The CYP3A4, CYP3A7 and CYP2C9 played a crucial role in the metabolism process. Aldehyde oxidase only dominated the nitro-reduction process of demethylation thiamethoxam and clothianidin. Glutathione S-transferase might be related to the clearance process of thiamethoxam and its metabolites. The findings indicated that thiamethoxam might pose potential carcinogenic and hepatic injury risk to lizards. The results enrich and supplement the knowledge of the environmental fate of thiamethoxam in reptiles.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Darden, C.; Rosenfeld, C.
1990-01-01
This paper discusses electron-positron annihilation at high energy. This work began in 1977 with the DASP II Collaboration at the DORIS storage ring of the DESY Laboratory in Hamburg. The collaboration's first publication reported the observation of the narrow {Upsilon} resonance at 9.46 GeV, confirming the original observation of this state in proton-nucleus collisions at Fermilab. To enable investigations of the {Upsilon} family of resonances the DORIS ring was rebuilt for reliable operation at the top of its energy range where the {Upsilon} states are accessible. In addition a new detector, ARGUS, was installed at one interaction region. This papermore » also discusses the AMY Collaboration which investigates electron-positron annihilation at energies from 50 to 65 GeV. The AMY detector is in the beam of the TRISTAN collider of the KEK Laboratory in Tsukuba, Japan.« less
Horner, Amy J; Nickles, Scott P; Weissburg, Marc J; Derby, Charles D
2006-10-01
Caribbean spiny lobsters display a diversity of social behaviors, one of the most prevalent of which is gregarious diurnal sheltering. Previous research has demonstrated that shelter selection is chemically mediated, but the source of release and the identity of the aggregation signal are unknown. In this study, we investigated the source and specificity of the aggregation signal in Caribbean spiny lobsters, Panulirus argus. We developed a relatively rapid test of shelter choice in a 5000-l laboratory flume that simulated flow conditions in the spiny lobster's natural environment, and used it to examine the shelter preference of the animals in response to a variety of odorants. We found that both males and females associated preferentially with shelters emanating conspecific urine of either sex, but not with shelters emanating seawater, food odors, or the scent of a predatory octopus. These results demonstrate specificity in the cues mediating sheltering behavior and show that urine is at least one source of the aggregation signal.
Rohela, M; Lim, Y A L; Jamaiah, I; Khadijah, P Y Y; Laang, S T; Nazri, M H Mohd; Nurulhuda, Z
2005-01-01
The occurrence of a coccidian parasite, Cryptosporidium, among birds in the Kuala Lumpur National Zoo was investigated in this study. A hundred bird fecal samples were taken from various locations of the zoo. Fecal smears prepared using direct smear and formalin ethyl acetate concentration technique were stained with modified Ziehl-Neelsen stain. Samples positive for Cryptosporidium with Ziehl-Neelsen stain were later confirmed using the immunofluorescence technique and viewed under the epifluorescence microscope. Six species of bird feces were confirmed positive with Cryptosporidium oocysts. They included Wrinkled Hornbill (Aceros corrugatus), Great Argus Pheasant (Argusianus argus), Black Swan (Cygnus atratus), Swan Goose (Anser cygnoides), Marabou Stork (Leptoptilos crumeniferus), and Moluccan Cockatoo (Cacatua moluccencis). These birds were located in the aviary and lake, with the Moluccan Cockatoo routinely used as a show bird. Results obtained in this study indicated that animal sanctuaries like zoos and bird parks are important sources of Cryptosporidium infection to humans, especially children and other animals.
7. Photocopy of photograph showing four Ajax missiles in launch ...
7. Photocopy of photograph showing four Ajax missiles in launch position from ARADCOM Argus pg. 14, from Institute for Military History, Carlisle Barracks, Carlisle, PA, October 1, 1963 - NIKE Missile Battery PR-79, East Windsor Road south of State Route 101, Foster, Providence County, RI
6. Photocopy of photograph showing an Ajax and Hercules Missile ...
6. Photocopy of photograph showing an Ajax and Hercules Missile from ARADCOM Argus pg. 3, from Institute for Military History, Carlisle Barracks, Carlisle, PA, October 1, 1958 - NIKE Missile Battery PR-79, East Windsor Road south of State Route 101, Foster, Providence County, RI
8. Photocopy of photograph showing model display NIKE Hercules firing ...
8. Photocopy of photograph showing model display NIKE Hercules firing battery, ARADCOM Argus pg. 11, from Institute for Military History, Carlisle Barracks, Carlisle, PA, March 1, 1961 - NIKE Missile Battery PR-79, East Windsor Road south of State Route 101, Foster, Providence County, RI
Cyber-Argus: Modeling C2 Impacts of Cyber Attacks
2014-06-01
19th ICCRTS - # 096 Page 10 of 24 ( BPMN ). However, any process modeling language with the ability to capture the information described above could...AND TECHNOLOGY ORGANIZATION. RTO-TR-MSG-048 - Coalition Battle Management Language (C-BML). February 2012. [41] ALLWEYER, T. BPMN 2.0: Introduction
36 CFR 7.74 - Virgin Islands National Park.
Code of Federal Regulations, 2011 CFR
2011-07-01
... of the park is prohibited. (3) The species of crustaceans known as Florida Spiny Lobster (Panulirus argus) may be taken by hand or hand-held hook. No person shall take female lobsters with eggs; or take more than two lobsters per person per day; or have in possession more than two days' limit: Provided...
36 CFR 7.74 - Virgin Islands National Park.
Code of Federal Regulations, 2010 CFR
2010-07-01
... of the park is prohibited. (3) The species of crustaceans known as Florida Spiny Lobster (Panulirus argus) may be taken by hand or hand-held hook. No person shall take female lobsters with eggs; or take more than two lobsters per person per day; or have in possession more than two days' limit: Provided...
Scintillating fiber array for tagging post-bremsstrahlung electrons
NASA Astrophysics Data System (ADS)
Cole, Philip; Alef, Stefan; Reitz, Björn-Eric; Schmieden, Hartmut; Hannappel, Jürgen; Jude, Thomas; Sandri, Paolo Levi; BGO-OD Collaboration
2016-03-01
We seek to extract the kinematic fingerprints of baryon resonances by making use of a high-quality beam of linearly polarized photons at the BGO-OD experiment at ELSA (Bonn, German). We constructed a unique device for precisely determining the degree of polarization in the coherent bremsstrahlung peak. Deflection of post-bremsstrahlung electrons in the magnetic field of the photon tagger provides precise information on the energy and polarization of the bremsstrahlung photons. And thereby will constrain the overall kinematics of the final-state particles in all decay channels of the photoproduced baryon resonances. We designed, prototyped, built, calibrated, and have been operating a three-layered, multi-stranded, scintillating-fiber detector for ensuring the quality of the linearly polarization of the photon beam. The overlapping 2.00-mm scintillating fibers form an array giving ARGUS over 500 channels. The very befitting name harkens to the mythological all-seeing creature Argus Panoptes, the multi-eyed giant. Our work was supported through a Fulbright Scholarship Award and by the Deutsche Forschungsgemeinschaft through the Collaborative Research Center (Sonderforschungsbereich SFB/TR-16) of the universities in Bonn, Giessen and Bochum, Germany. NSF-PHY-1307340.
Biophysical connectivity explains population genetic structure in a highly dispersive marine species
NASA Astrophysics Data System (ADS)
Truelove, Nathan K.; Kough, Andrew S.; Behringer, Donald C.; Paris, Claire B.; Box, Stephen J.; Preziosi, Richard F.; Butler, Mark J.
2017-03-01
Connectivity, the exchange of individuals among locations, is a fundamental ecological process that explains how otherwise disparate populations interact. For most marine organisms, dispersal occurs primarily during a pelagic larval phase that connects populations. We paired population structure from comprehensive genetic sampling and biophysical larval transport modeling to describe how spiny lobster ( Panulirus argus) population differentiation is related to biological oceanography. A total of 581 lobsters were genotyped with 11 microsatellites from ten locations around the greater Caribbean. The overall F ST of 0.0016 ( P = 0.005) suggested low yet significant levels of structuring among sites. An isolation by geographic distance model did not explain spatial patterns of genetic differentiation in P. argus ( P = 0.19; Mantel r = 0.18), whereas a biophysical connectivity model provided a significant explanation of population differentiation ( P = 0.04; Mantel r = 0.47). Thus, even for a widely dispersing species, dispersal occurs over a continuum where basin-wide larval retention creates genetic structure. Our study provides a framework for future explorations of wide-scale larval dispersal and marine connectivity by integrating empirical genetic research and probabilistic modeling.
Kritsky, Delane C; Nguyen, Ha Van; Ha, Ngo Duy; Heckmann, Richard A
2016-05-01
An emended diagnosis of Metahaliotrema Yamaguti, 1953 (Monogenoidea: Dactylogyridae) is provided based on specimens of six species collected from the spotted scat Scatophagus argus (Linnaeus) (Scatophagidae) in Vietnam: M. scatophagi Yamaguti, 1953 (type-species); M. cf. yamagutii Mizelle & Price, 1964; M. mizellei Venkatanarasaiah, 1981; M. kulkarnii Venkatanarasaiah, 1981; M. ypsilocleithrum n. sp.; and M. similis n. sp. Methaliotrema filamentosum Venkatanarasaiah, 1981 from the whipfin silver-biddy Gerres filamentosus Cuvier (Gerreidae) is included as the only other valid member of the genus. Metahaliotrema arii Yamaguti, 1953 from an ariid catfish is considered incertae sedis within the Dactylogyridae; and Metahaliotrema srivastavai Singh & Agarwal, 1994 from a bagrid catfish is transferred to Chauhanellus Bychowsky & Nagibina, 1969 as Chauhanellus srivastavai (Singh & Agarwal, 1994) n. comb. Metahaliotrema geminatohamula Pan, Ding & Zhang, 1995 from spotted scat in China is determined to be a junior subjective synonym of M. scatophagi. The two new species and M. scatophagi, M. mizellei, and M. kulkarnii are described or redescribed based on specimens from Vietnam.
Li, Jitong; Chang, Jing; Li, Wei; Guo, Baoyuan; Li, Jianzhong; Wang, Huili
2017-03-01
Triadimefon (TF) is a widely used chiral fungicide with one chiral centre and two enantiomers (TF 1 and TF 2 ). However, little is reported about the ecological toxicity of reptiles on an enantioselective level. TF is a potential endocrine disruptor that may interfere with sex steroid hormones, such as testosterone (T) and 17beta-estradiol (E 2 ). In our study, the lizards Mongolia Racerunner (Eremias argus) were orally exposed to TF and its enantiomers for 21 days. Plasma sex steroid hormones and steroidogenic-related genes, including 17-beta-hydroxysteroid (hsd17β), cytochrome P450 enzymes (cyp19 and cyp17), and steroid hormone receptors (erα and Ar) were evaluated. After exposure, the plasma testosterone level in the 100 mg/kg bw group was elevated, while the oestradiol level was reduced. This phenomenon may be caused by the transformation of cyp19, which may inhibit the conversion of testosterone to oestradiol and affect sexual behaviour. In addition, the two enantiomers have different effects on hormone levels, which testified to the previously reported biotoxic dissimilarity between TF 1 and TF 2 in organisms. Furthermore, the cyp19 mRNA level in liver and gonad of the TF 2 and TF group (100 mg/kg bw ) were significantly down-regulated, while the cyp17 and hsd17β mRNA levels were up-regulated. The expression of erα and Ar mRNA levels were up-regulated in males but not in females, which may indicate that TF has sex differences on these two genes. As seen from the above results, TF and its enantiomers may have endocrine-disrupting effects on lizards (E. argus) by acting sensitively on sex steroid hormones and steroidogenic-related genes. Copyright © 2016 Elsevier Ltd. All rights reserved.
Mosk, Virginia; Thomas, Nicole; Hart, Nathan S; Partridge, Julian C; Beazley, Lyn D; Shand, Julia
2007-01-01
The Syngnathidae are specialized diurnal feeders that are known to possess a retinal fovea and use independent eye movements to locate, track, and strike individual planktonic prey items. In this study, we have investigated the spectral sensitivities of three syngnathid species: a pipefish and two seahorses. We used spectrophotometry to measure the spectral transmission properties of ocular lenses and microspectrophotometry to measure the spectral absorption characteristics of visual pigments in the retinal photoreceptors. The pipefish, Stigmatopora argus, together with the seahorse Hippocampus subelongatus, is found in "green-water" temperate coastal seagrass habitats, whereas the second seahorse, H. barbouri, originates from a "blue-water" tropical coral reef habitat. All species were found to possess short wavelength absorbing pigment(s) in their lenses, with the 50% cut-off point of S. argus and H. subelongatus at 429 and 425 nm respectively, whereas that of H. barbouri was located at 409 nm. Microspectrophotometry of the photoreceptors revealed that the rods of all three species contained visual pigment with the wavelength of maximum absorption (lambda(max)) at approximately 500 nm. The visual pigment complement of the cones varied between the species: all possessed single cones with a lambda(max) close to 460 nm but H. barbouri also possessed an additional class of single cone with lambda(max) at 430 nm. Three classes of visual pigment were found in the double cones, the lambda(max) being approximately 520, 537, and 560 nm in the two seahorses and 520, 537, and 580 nm in the pipefish. The spectral sensitivities of the syngnathids investigated here do not appear to conform to generally accepted trends for fishes inhabiting different spectral environments. The influence of the specialized feeding regime of the syngnathids is discussed in relation to our findings that ultra-violet sensitivity is apparently not necessary for zooplanktivory in certain habitats.
ERIC Educational Resources Information Center
Cohen, Jordan L.; Kabat, Hugh F.; Knapp, David A.; Koda-Kimble, Mary Anne; Rutledge, Charles O.
2000-01-01
Because of the remarkable increase in demand for medications, this article urges the American Association of Colleges of Pharmacy (AACP) to provide its member schools with necessary information so that they may move rapidly to increase capacity to educate pharmacists. Offers six recommendations related to increasing educational capacity and…
The GBT 3mm Survey of Infall and Fragmentation of Dense Cores in Taurus
NASA Astrophysics Data System (ADS)
Seo, Youngmin; Goldsmith, Paul; Shirley, Yancy L.; Church, Sara; Frayer, David
2018-01-01
We present preliminary results of the infall and fragmentation survey toward a complete population of prestellar cores in Taurus that was carried out with the 16-element W-band focal plane array receiver (Argus) on the 100m Green Bank Telescope. The survey is designed take advantage of the 8.5” angular resolution and high sensitivity of Argus on the GBT to trace infall motions in HCN 1-0 & HCO+ 1-0 and find any evidence of fragmentation in N2H+ & NH2D within prestellar cores ranging in size from 0.05 pc to 0.0075 pc (1500 AU), which is a typical size scale of individual planetary systems. The scientific goal is to estimate the fraction of infall candidates from a complete population of prestellar cores and to understand internal velocity structure during the final gravitational collapse before forming stars. The survey started in the winter of 2016 and is to continue to the end of January 2018. So far, we observed 23 prestellar cores out of 65 targets in HCN 1-0 and HCO+ 1-0. We have so far found only two prestellar cores (L1495A-N, L1521D) out of 23 observed that show infall signatures, which is a fraction of infalling cores less than half of that reported by the previous surveys toward the bright, dense cores in various molecular clouds (Lee et al. 2004; Sohn et al. 2007). We also found that L1495A-N has a highly asymmetric infall motion which does not fit to a conventional model of dense core collapse, while L1521D has a slow infall motion similar to L1544.
A Fourier transform spectrometer for site testing at Dome A
NASA Astrophysics Data System (ADS)
Li, Xin-Xing; Paine, Scott; Yao, Qi-Jun; Shi, Sheng-Cai; Matsuo, Hiroshi; Yang, Ji; Zhang, Qi-Zhou
2009-07-01
Observations in tera-hertz astronomy can only be done at a site with good atmospheric transmission at millimeter and submillimeter wavelengths. With extremely dry weather and calm atmosphere resulted by high altitude and cold temperature, Dome A (or Dome Argus), Antarctica, is possibly the best site on this earth for THz astronomy. To evaluate the site condition there, we are constructing a Fourier Transform Spectrometer (FTS) based on Martin-Puplett interferometer to measure the atmospheric transmission in the frequency range of 0.75~15THz. The whole FTS system is designed for unattended and outdoor (temperatures even below -70 degrees Celsius) operation. Its total power consumption is estimated to be approximately 200W. This contribution will give a brief overview of this FTS development.
Effects of groundwater pumping in the lower Apalachicola-Chattahoochee-Flint River basin
Jones, L. Elliott
2012-01-01
USGS developed a groundwater-flow model of the Upper Floridan aquifer in lower Apalachicola-Chattahoochee-Flint River basin in southwest Georgia and adjacent parts of Alabama and Florida to determine the effect of agricultural groundwater pumping on aquifer/stream flow within the basin. Aquifer/stream flow is the sum of groundwater outflow to and inflow from streams, and is an important consideration for water managers in the development of water-allocation and operating plans. Specifically, the model was used to evaluate how agricultural pumping relates to 7Q10 low streamflow, a statistical low flow indicative of drought conditions that would occur during seven consecutive days, on average, once every 10 years. Argus ONETM, a software package that combines a geographic information system (GIS) and numerical modeling in an Open Numerical Environment, facilitated the design of a detailed finite-element mesh to represent the complex geometry of the stream system in the lower basin as a groundwater-model boundary. To determine the effects on aquifer/stream flow of pumping at different locations within the model area, a pumping rate equivalent to a typical center-pivot irrigation system (50,000 ft3/d) was applied individually at each of the 18,951 model nodes in repeated steady-state simulations that were compared to a base case representing drought conditions during October 1999. Effects of nodal pumping on aquifer/stream flow and other boundary flows, as compared with the base-case simulation, were computed and stored in a response matrix. Queries to the response matrix were designed to determine the sensitivity of targeted stream reaches to agricultural pumping. Argus ONE enabled creation of contour plots of query results to illustrate the spatial variation across the model area of simulated aquifer/streamflow reductions, expressed as a percentage of the long-term 7Q10 low streamflow at key USGS gaging stations in the basin. These results would enable water managers to assess the relative impact of agricultural pumping and drought conditions on streamflow throughout the basin, and to develop mitigation strategies to conserve water resources and preserve aquatic habitat.
ERIC Educational Resources Information Center
Monnereau, Iris; Pollnac, Richard
2012-01-01
Lobster fishing (targeting the spiny lobster "Panulirus argus") is an important economic activity throughout the Wider Caribbean Region both as a source of income and employment for the local population as well as foreign exchange for national governments. Due to the high unit prices of the product, international lobster trade provides a…
NPS TINYSCOPE Program Management
2010-09-01
SMDC - Space and Missile Defense Command SOW - Statement of Work STEM - Science, Technology, Engineering and Mathematics STP - Space Test Program...the project. A statement of work ( SOW ) is typically used to document broad responsibilities, deliverables, and the work activities required in a...given project. The SOW acts as a guideline Summary of TINYSCOPE and Argus Requirements Requirement Threshold Objective Mission IOC Sep 2011 ASAP
ERIC Educational Resources Information Center
Emrys, A. B.
2009-01-01
From the agoraphobic prairie where the father of Willa Cather's Antonia kills himself, to the claustrophobic North Dakota town of Argus devastated by storm in Louise Erdrich's "Fleur," to Lightning Flat, the grim home of Jack Twist in Annie Proulx's "Brokeback Mountain," much Great Plains literature is situational, placing…
Chen, Li; Xu, Peng; Diao, Jinling; Di, Shanshan; Li, Ruiting; Zhou, Zhiqiang
2016-04-05
Beta-cypermethrin (BCYP), a synthetic pyrethriod (PYR) pesticide which is a mixture of the alpha- and theta- cypermethrin, have been reported various toxicological profiles to non-target organisms. But little is known about assimilation, accumulation and toxic effects of BCYP in reptiles. The present study firstly elucidated absorption, tissue distribution, excretion of BCYP in Eremias argus . Treated group were administered orally with BCYP 20mg/kg body weight (bw) dissolved in corn oil. Neurotoxicity was observed at 24h after gavage, and the poisoning symptom ameliorated at 72h. The changes of BCYP concentration depended on degradation time and tissues. Lizards had a strong capacity to eliminate BCYP with different tissue distribution. The tissues concentration of BCYP from high to low were intestine, stomach, heart, kidney, blood, lung, liver and brain. Bimodal phenomena were observed in lung, liver and kidney. These results may be due to the activities of enzymes, circadian rhythm, and enterohepatic circulation in lizards. Based on the results of organ coefficient and histopathology analysis in liver, the liver was confirmed as the main target organ. Copyright © 2015 Elsevier B.V. All rights reserved.
Expanded Croatian 12 X-STR loci database with an overview of anomalous profiles.
Mršić, Gordan; Ozretić, Petar; Crnjac, Josip; Merkaš, Siniša; Sukser, Viktorija; Račić, Ivana; Rožić, Sara; Barbarić, Lucija; Popović, Maja; Korolija, Marina
2018-05-01
In order to implement X-chromosome short tandem repeat (X-STR) typing into routine forensic practice, reference database of a given population should be established. Therefore we extended already published data with additional 397 blood samples from unrelated Croatian citizens, and analyzed the total of 995 samples (549 male and 446 female) typed by Investigator ® Argus X-12 Kit. To test genetic homogeneity of consecutively processed five historic-cultural regions covering the entire national territory, we calculated pairwise Fst genetic distances between regions based on allele and full haplotype frequencies. Since the comparison did not yield any statistically significant difference, we integrated STR profile information from all regions and used the whole data set to calculate forensic parameters. The most informative marker is DXS10135 (polymorphism information content (PIC = 0.929) and the most informative linkage group (LG) is LG1 (PIC = 0.996). We confirmed linkage disequilibrium (LD) for seven marker pairs belonging to LG2, LG3 and LG4. By including LD information, we calculated cumulative power of discrimination that amounted to 0.999999999997 in females and 0.999999005 in males. We also compared Croatia with 13 European populations based on haplotype frequencies and detected no statistically significant Fst values after Bonferroni correction in any LG. Multi-dimensional scaling plot revealed tight grouping of four Croatian regions amongst populations of southern, central and northern Europe, with the exception of northern Croatia. In this study we gave the first extensive overview of aberrant profiles encountered during Investigator ® Argus X-12 typing. We found ten profiles consistent with single locus duplication followed by tetranucleotide tract length polymorphism. Locus DXS10079 is by far the most frequently affected one, presumably mutated in eight samples. We also found four profiles consistent with X-chromosome aneuploidy (three profiles with XXX pattern and one profile with XXY pattern). In conclusion, we established integral forensic Croatian X-chromosome database, proved forensic pertinence of Investigator ® Argus X-12 Kit for the entire Croatian population and identified locus DXS10079 as a potential duplication hotspot. Copyright © 2018 Elsevier B.V. All rights reserved.
Quantification of nearshore morphology based on video imaging
Alexander, P.S.; Holman, R.A.
2004-01-01
The Argus network is a series of video cameras with aerial views of beaches around the world. Intensity contrasts in time exposure images reveal areas of preferential breaking, which are closely tied to underlying bed morphology. This relationship was further investigated, including the effect of tidal elevation and wave height on the presence of wave breaking and its cross-shore position over sand bars. Computerized methods of objectively extracting shoreline and sand bar locations were developed, allowing the vast quantity of data generated by Argus to be more effectively examined. Once features were identified in the images, daily alongshore mean values were taken to create time series of shoreline and sand bar location, which were analyzed for annual cycles and cross-correlated with wave data to investigate environmental forcing and response. These data extraction techniques were applied to images from four of the Argus camera sites. A relationship between wave height and shoreline location was found in which increased wave heights resulted in more landward shoreline positions; given the short lag times over which this correlation was significant, and that the strong annual signal in wave height was not replicated in the shoreline time series, it is likely that this relationship is a result of set-up during periods of large waves. Wave height was also found to have an effect on sand bar location, whereby an increase in wave height resulted in offshore bar migration. This correlation was significant over much longer time lags than the relationship between wave height and shoreline location, and a strong annual signal was found in the location of almost all observed bars, indicating that the sand bars are migrating with changes in wave height. In the case of the site with multiple sand bars, the offshore bars responded more significantly to changes in wave height, whereas the innermost bar seemed to be shielded from incident wave energy by breaking over the other bars. A relationship was also found between a site's mean wave height and inner sand bar location; sites with the highest wave heights tended to have sand bars farther from shore than those with relatively low wave heights. ?? 2004 Elsevier B.V. All rights reserved.
Types of Weapon Programs and Their Implications for NATO Standardization or Interoperability
1978-07-01
mines , etc.). 3. Enemy Counter-measures. Lack of standardisation or Interoperability complicates Warsaw Pact problem by forcing them to counter...Licensed Production U.K. Sikorsky S-5F helicopter (U.S.) (Westland, "Hessex") Canada Canadair CC-106 transport (derivative of the Bristol Britannia ...U.K.) Canadair CP-107 Argus maritime reconnaissance aircraft (modification of the Bristol Britannia , U.K.) Federal Republic of Germany Air-Fouga
ARGUS/LLNL IR Camera Calibration and Characterization
1989-11-01
122 of the 244 rows, once every 1/60 second. The even-numbered detector rows, beginning with row zero , are read out in one field; the odd-numbered...Radiometrically, a very cold reference scene is desirable because the absolute signal level of the reference scene is subtracted from all subsequent...to have effectively zero radiant energy within the spectral passband of the sensor, and so may be ignored. 1.3 LABORATORY EQUIPMENT CONFIGURATION The
Li, Jitong; Wang, Yinghuan; Li, Wei; Xu, Peng; Guo, Baoyuan; Li, Jianzhong; Wang, Huili
2017-08-01
Triadimefon (TF, S-(+)-TF, R-(-)-TF) and its metabolite triadimenol (TN, TN-A1, A2 and TN-B1, B2) are two systemic fungicides and both of them are chiral pharmaceuticals which are widely used in agricultural industry. Many researches focused on the toxicity effects of triadimefon on mammals, while the ecotoxicological data of tiradimefon on reptiles is limited. In order to understand the toxicity mechanism of triadimefon in reptiles, the current study administrated S-(+)-TF or R-(-)-TF traidimefon (50mg/kg bw ) to Chinese lizards (Eremias argus) respectively, the absorption, distribution of triadimefon and the formation of triadimenol were analysed at different sampling times. The metabolic pathways were demonstrated through relative gene expression using quantitative real-time PCR reaction. During the experiment time, triadimefon was quickly peaked to the maximum concentration within 12h in liver, brain, kidney, and plasma, eliminated slowly. The biotransformation in kidney was the lowest and fat possessed the worst degradation ability among others. The metabolite, triadimenol was detected in blood in 2h and reached to a plateau at about 12h in most organs (fat excepted), while the process of metabolism is stereoselective. The mainly metabolite in R-(-)-TF treated group was TN-B1, and TN-A2 in S-(+)-TF group which showed the selective metabolism to other species caused by environmental conditions, differences in the animal models and concentration of TF. The related gene expression of cyp1a1, cyp3a1 and hsd11β mRNA level in lizards showed different metabolic pathways in the liver and brain. Both P450s enzymes and 11β-hydroxysteroid dehydrogenase participated in metabolic reaction in liver, while no 11β-hydroxysteroid dehydrogenase pathway observed in brain. This diversity in liver and brain may cause different degradation rate and ecotoxicological effect in different organs. Copyright © 2017 Elsevier Inc. All rights reserved.
Running and testing GRID services with Puppet at GRIF- IRFU
NASA Astrophysics Data System (ADS)
Ferry, S.; Schaer, F.; Meyer, JP
2015-12-01
GRIF is a distributed Tiers 2 centre, made of 6 different centres in the Paris region, and serving many VOs. The sub-sites are connected with 10 Gbps private network and share tools for central management. One of the sub-sites, GRIF-IRFU held and maintained in the CEA- Saclay centre, moved a year ago, to a configuration management using Puppet. Thanks to the versatility of Puppet/Foreman automation, the GRIF-IRFU site maintains usual grid services, with, among them: a CREAM-CE with a TORQUE+Maui (running a batch with more than 5000 jobs slots), a DPM storage of more than 2 PB, a Nagios monitoring essentially based on check_mk, as well as centralized services for the French NGI, like the accounting, or the argus central suspension system. We report on the actual functionalities of Puppet and present the last tests and evolutions including a monitoring with Graphite, a HT-condor multicore batch accessed with an ARC-CE and a CEPH storage file system.
NEMA NU 4-2008 comparison of preclinical PET imaging systems.
Goertzen, Andrew L; Bao, Qinan; Bergeron, Mélanie; Blankemeyer, Eric; Blinder, Stephan; Cañadas, Mario; Chatziioannou, Arion F; Dinelle, Katherine; Elhami, Esmat; Jans, Hans-Sonke; Lage, Eduardo; Lecomte, Roger; Sossi, Vesna; Surti, Suleman; Tai, Yuan-Chuan; Vaquero, Juan José; Vicente, Esther; Williams, Darin A; Laforest, Richard
2012-08-01
The National Electrical Manufacturers Association (NEMA) standard NU 4-2008 for performance measurements of small-animal tomographs was recently published. Before this standard, there were no standard testing procedures for preclinical PET systems, and manufacturers could not provide clear specifications similar to those available for clinical systems under NEMA NU 2-1994 and 2-2001. Consequently, performance evaluation papers used methods that were modified ad hoc from the clinical PET NEMA standard, thus making comparisons between systems difficult. We acquired NEMA NU 4-2008 performance data for a collection of commercial animal PET systems manufactured since 2000: microPET P4, microPET R4, microPET Focus 120, microPET Focus 220, Inveon, ClearPET, Mosaic HP, Argus (formerly eXplore Vista), VrPET, LabPET 8, and LabPET 12. The data included spatial resolution, counting-rate performance, scatter fraction, sensitivity, and image quality and were acquired using settings for routine PET. The data showed a steady improvement in system performance for newer systems as compared with first-generation systems, with notable improvements in spatial resolution and sensitivity. Variation in system design makes direct comparisons between systems from different vendors difficult. When considering the results from NEMA testing, one must also consider the suitability of the PET system for the specific imaging task at hand.
1992-07-01
of J2000.0. Origin in (DE200/LE200). right ascension is set equal to the dynamical equinox of J2000.0. See Chapter S. Lunar Refer•ec Frame Retro... sets by techniques (VLBI, SLR, LLR, GPS...) or the combination of individual solutions into a unified set of data (station coordinates, Earth...AMO-2 model from J. B. Minster. This was made by modifying the earlier subroutine. The changes were made by Don Argus and verified by Alice Gripp. 21
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenbaum, Elias; Sanders, Charlene A; Kandagor, Vincent
The development of a retinal prosthesis for artificial sight includes a study of the factors affecting the structural and functional stability of chronically implanted microelectrode arrays. Although neuron depolarization and propagation of electrical signals have been studied for nearly a century, the use of multielectrode stimulation as a proposed therapy to treat blindness is a frontier area of modern ophthalmology research. Mapping and characterizing the topographic information contained in the electric field potentials and understanding how this information is transmitted and interpreted in the visual cortex is still very much a work in progress. In order to characterize the electricalmore » field patterns generated by the device, an in vitro prototype that mimics several of the physical and chemical parameters of the in vivo visual implant device was fabricated. We carried out multiple electrical measurements in a model 'eye,' beginning with a single electrode, followed by a 9-electrode array structure, both idealized components based on the Argus II retinal implants. Correlating the information contained in the topographic features of the electric fields with psychophysical testing in patients may help reduce the time required for patients to convert the electrical patterns into graphic signals.« less
The Nearby, Young, Argus Association: Membership, Age, and Dusty Debris Disks
NASA Astrophysics Data System (ADS)
Zuckerman, Ben
2018-01-01
The Argus Association (AA) defined by Torres et al. (2008) is distinguished from other nearby young moving groups by virtue of its unusual Galactic U-velocity. As defined by Torres et al, their initial AA consisted of 35 members of the IC 2391 open cluster (~135 pc from Earth) and 29 “field members”, 15 of which are within 100 pc of Earth. The spectral types range from F through K with the exception of two M-type members of IC 2391. Zuckerman et al. (2011 & 2012) proposed 13 additional field members – 12 A-type and one F-type -- all of which lie within 80 pc of Earth. Additional AA members have been proposed, typically a few at a time, by other researchers. Deduced ages of the AA (via various techniques) lie, typically, between 40 and 60 Myr. Bell et al (2015) consider the membership and age of a subset of proposed AA stars via color-magnitude diagrams combined with a Bayesian analysis (following Malo et al 2013 & 2014). For the sample of AA stars that they considered, the group age, membership status of individual stars, and even the reality of a coeval moving group were in some doubt. The purpose of the present communication is to consider all proposed AA members – including the frequency of dusty debris disks -- in an attempt to bring some clarity to what is going on.
Landis, Andrew M. Gascho; Lapointe, Nicolas W. R.; Angermeier, Paul L.
2010-01-01
Northern snakehead (Channa argus) were first found in the Potomac River in 2004. In 2007, we documented feeding and reproductive behavior to better understand how this species is performing in this novel environment. From April to October, we used electrofishing surveys to collect data on growth, condition, and gonad weight of adult fish. Growth rates of young were measured on a daily basis for several weeks. Mean length-at-age for Potomac River northern snakehead was lower than for fish from China, Russia, and Uzbekistan. Fish condition was above average during spring and fall, but below average in summer. Below-average condition corresponded to periods of high spawning activity. Gonadosomatic index indicated that females began spawning at the end of April and continued through August. Peak spawning occurred at the beginning of June when average temperatures reached 26°C. Larval fish growth rate, after the transition to exogenous feeding, was 2.3 (SD ± 0.7) mm (total length, TL) per day. Although Potomac River northern snakehead exhibited lower overall growth rates when compared to other populations, these fish demonstrated plasticity in timing of reproduction and rapid larval growth rates. Such life history characteristics likely contribute to the success of northern snakehead in its new environment and limit managers’ options for significant control of its invasion.
Li, Yongli; Lv, Xiao; Zhou, Jing; Shi, Chenchen; Duan, Ting
2017-01-01
ABSTRACT The objective of this study was to examine how the respiratory metabolism of the snakehead Channa argus changed when it shifted from breathing water to breathing air, and how increased metabolic demands caused by temperature, feeding, and exhaustive exercise affect its survival in air. The results demonstrated that the oxygen consumption rate (MO2) of the snakehead was lower for aerial respiration than aquatic respiration by 12.1, 24.5 and 20.4% at 20, 25, and 30°C, respectively. Survival time was significantly shortened with increasing temperature and was negatively correlated with the resting MO2 in air (MO2Air). No obvious feeding metabolic response was observed in the snakeheads fed at 1% and 3% body mass levels while breathing air. The maximum MO2Air of the snakehead after exhaustive exercise was significantly higher than the resting MO2Air of the control group. The results suggest that the snakehead could survive out of water by breathing air for varying lengths of time, depending on ambient temperature and metabolic demand. Additionally, some degree of metabolic depression occurs in the snakehead when breathing air. The metabolic demand associated with exercise in the snakehead, but not that associated with feeding, can be supported by its capacity for breathing air to some extent. PMID:28396489
High Scalability Video ISR Exploitation
2012-10-01
Surveillance, ARGUS) on the National Image Interpretability Rating Scale (NIIRS) at level 6. Ultra-high quality cameras like the Digital Cinema 4K (DC-4K...Scale (NIIRS) at level 6. Ultra-high quality cameras like the Digital Cinema 4K (DC-4K), which recognizes objects smaller than people, will be available...purchase ultra-high quality cameras like the Digital Cinema 4K (DC-4K) for use in the field. However, even if such a UAV sensor with a DC-4K was flown
NEMA NU 4-2008 Comparison of Preclinical PET Imaging Systems
Goertzen, Andrew L.; Bao, Qinan; Bergeron, Mélanie; Blankemeyer, Eric; Blinder, Stephan; Cañadas, Mario; Chatziioannou, Arion F.; Dinelle, Katherine; Elhami, Esmat; Jans, Hans-Sonke; Lage, Eduardo; Lecomte, Roger; Sossi, Vesna; Surti, Suleman; Tai, Yuan-Chuan; Vaquero, Juan José; Vicente, Esther; Williams, Darin A.; Laforest, Richard
2014-01-01
The National Electrical Manufacturers Association (NEMA) standard NU 4-2008 for performance measurements of small-animal tomographs was recently published. Before this standard, there were no standard testing procedures for preclinical PET systems, and manufacturers could not provide clear specifications similar to those available for clinical systems under NEMA NU 2-1994 and 2-2001. Consequently, performance evaluation papers used methods that were modified ad hoc from the clinical PET NEMA standard, thus making comparisons between systems difficult. Methods We acquired NEMA NU 4-2008 performance data for a collection of commercial animal PET systems manufactured since 2000: micro- PET P4, microPET R4, microPET Focus 120, microPET Focus 220, Inveon, ClearPET, Mosaic HP, Argus (formerly eXplore Vista), VrPET, LabPET 8, and LabPET 12. The data included spatial resolution, counting-rate performance, scatter fraction, sensitivity, and image quality and were acquired using settings for routine PET. Results The data showed a steady improvement in system performance for newer systems as compared with first-generation systems, with notable improvements in spatial resolution and sensitivity. Conclusion Variation in system design makes direct comparisons between systems from different vendors difficult. When considering the results from NEMA testing, one must also consider the suitability of the PET system for the specific imaging task at hand. PMID:22699999
Mycobacterial infection in Northern snakehead (Channa argus) from the Potomac River catchment
Densmore, Christine L.; Iwanowicz, L.R.; Henderson, A.P.; Iwanowicz, D.D.; Odenkirk, J.S.
2016-01-01
The Northern snakehead, Channa argus (Cantor), is a non-native predatory fish that has become established regionally in some temperate freshwater habitats within the United States. Over the past decade, Northern snakehead populations have developed within aquatic ecosystems throughout the eastern USA, including the Potomac River system within Virginia, Maryland and Washington, D.C. Since this species was initially observed in this region in 2002, the population has expanded considerably (Odenkirk & Owens 2007). In the Chesapeake Bay watershed, populations of Northern snakehead exist in the lower Potomac River and Rappahannock Rivers on the Western shore of the Bay, and these fish have also been found in middle or upper reaches of river systems on the Eastern shore of the Bay, including the Nanticoke and Wicomico Rivers among others. Over the past several years, many aspects of Northern snakehead life history in the Potomac River have been described, including range and dispersal patterns, microhabitat selection and diet (Lapointe, Thorson & Angermeier 2010; Saylor, Lapointe & Angermeier 2012; Lapointe, Odenkirk & Angermeier 2013). However, comparatively little is known about their health status including susceptibility to parasitism and disease and their capacity to serve as reservoirs of disease for native wildlife. Although considered hardy by fisheries biologists, snakehead fish have demonstrated susceptibility to a number of described piscine diseases within their native range and habitat in Asia. Reported pathogens of significance in snakehead species in Asia include snakehead rhabdovirus (Lio-Po et al. 2000), aeromonad bacteria (Zheng, Cao & Yang 2012), Nocardia (Wang et al. 2007) andMycobacterium spp. (Chinabut, Limsuwan & Chantatchakool 1990; ). Mycobacterial isolates recovered from another snakehead species (Channa striata) in the previous studies have included M. marinum and M. fortuitum, as identified through molecular-based diagnostics (Puttinaowarat et al. 2002). We have conducted health screenings of Northern snakehead from the Potomac River system over the past several years and have detected few associated pathogens. Typical observations have largely consisted of incidental identification of parasitism with protozoal, monogenean or trematode organisms (unpublished data). We have also identified largemouth bass virus (LMBV) in clinically normal Northern snakehead collected from the Potomac River (Iwanowicz et al. 2013). Continued research concerning these and other pathogens of this introduced species is important to fully understand the potential impacts of these fish on indigenous wildlife and aquatic ecosystems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hashim, Marina; Abidin, Diana Atiqah Zainal; Das, Simon K.
The present study was conducted to investigate the food consumption pattern and gastric emptying time using x-radiography technique in scats fish, Scatophagus argus feeding to satiation in laboratory conditions. Prior to feeding experiment, fish of various sizes were examined their stomach volume, using freshly prepared stomachs ligatured at the tips of the burret, where the maximum amount of distilled water collected in the stomach were measured (ml). Stomach volume is correlated with maximum food intake (S{sub max}) and it can estimate the maximum stomach distension by allometric model i.e volume=0.0000089W{sup 2.93}. Gastric emptying time was estimated using a qualitative X-radiographymore » technique, where the fish of various sizes were fed to satiation at different time since feeding. All the experimental fish was feed into satiation using radio-opaque barium sulphate (BaSO{sub 4}) paste injected in the wet shrimp in proportion to the body weight. The BaSO{sub 4} was found suitable to track the movement of feed/prey in the stomach over time and gastric emptying time of scats fish can be estimated. The results of qualitative X-Radiography observation of gastric motility, showed the fish (200 gm) that fed to maximum satiation meal (circa 11 gm) completely emptied their stomach within 30 - 36 hrs. The results of the present study will provide the first baseline information on the stomach volume, gastric emptying of scats fish in captivity.« less
NASA Astrophysics Data System (ADS)
Hashim, Marina; Abidin, Diana Atiqah Zainal; Das, Simon K.; Ghaffar, Mazlan Abd.
2014-09-01
The present study was conducted to investigate the food consumption pattern and gastric emptying time using x-radiography technique in scats fish, Scatophagus argus feeding to satiation in laboratory conditions. Prior to feeding experiment, fish of various sizes were examined their stomach volume, using freshly prepared stomachs ligatured at the tips of the burret, where the maximum amount of distilled water collected in the stomach were measured (ml). Stomach volume is correlated with maximum food intake (Smax) and it can estimate the maximum stomach distension by allometric model i.e volume=0.0000089W2.93. Gastric emptying time was estimated using a qualitative X-radiography technique, where the fish of various sizes were fed to satiation at different time since feeding. All the experimental fish was feed into satiation using radio-opaque barium sulphate (BaSO4) paste injected in the wet shrimp in proportion to the body weight. The BaSO4 was found suitable to track the movement of feed/prey in the stomach over time and gastric emptying time of scats fish can be estimated. The results of qualitative X-Radiography observation of gastric motility, showed the fish (200 gm) that fed to maximum satiation meal (circa 11 gm) completely emptied their stomach within 30 - 36 hrs. The results of the present study will provide the first baseline information on the stomach volume, gastric emptying of scats fish in captivity.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Riedel, Adric R.; Alam, Munazza K.; Rice, Emily L.
We present a spectroscopic and kinematic analysis of 79 nearby M dwarfs in 77 systems. All of these dwarfs are low-proper-motion southern hemisphere objects and were identified in a nearby star survey with a demonstrated sensitivity to young stars. Using low-resolution optical spectroscopy from the Red Side Spectrograph on the South African Large Telescope, we have determined radial velocities, H-alpha, lithium 6708 Å, and potassium 7699 Å equivalent widths linked to age and activity, and spectral types for all of our targets. Combined with astrometric information from literature sources, we identify 44 young stars. Eighteen are previously known members ofmore » moving groups within 100 pc of the Sun. Twelve are new members, including one member of the TW Hydra moving group, one member of the 32 Orionis moving group, 9 members of Tucana-Horologium, one member of Argus, and two new members of AB Doradus. We also find 14 young star systems that are not members of any known groups. The remaining 33 star systems do not appear to be young. This appears to be evidence of a new population of nearby young stars not related to the known nearby young moving groups.« less
Ecology: avoidance of disease by social lobsters.
Behringer, Donald C; Butler, Mark J; Shields, Jeffrey D
2006-05-25
Transmissible pathogens are the bane of social animals, so they have evolved behaviours to decrease the probability of infection. There is no record, however, of social animals avoiding diseased individuals of their own species in the wild. Here we show how healthy, normally gregarious Caribbean spiny lobsters (Panulirus argus) avoid conspecifics that are infected with a lethal virus. Early detection and avoidance of infected, though not yet infectious, individuals by healthy lobsters confers a selective advantage and highlights the importance of host behaviour in disease transmission among natural populations.
1981-06-23
Minerals Inc. Box 90 W. Grace #100 Reno NV 89509 Anaconda Copper Co. 555 17th Street Denver CO 80217 Argus Resources Inc. Box 56 Austin NV 93099 Armenian...Donald F. 7272 Lindale Drive Sacramento CA 95828 Combined Metals Red. 1865 S. Main St. Salt Lake City UT 84115 Conlan, Mary Helen N/A Copper Range Co...hApl. Co. Mineral Services co. N/A Miragliotta, Vito 1184 S. 1000 E. Clearfield UT 84015 Neeser, Earl Francis Box 495 Goldfield NV 89013 Nev. Porphyry
Theoretical, Experimental, and Computational Evaluation of Disk-Loaded Circular Wave Guides
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.; Qureshi, A. Haq
1994-01-01
A disk-loaded circular wave guide structure and test fixture were fabricated. The dispersion characteristics were found by theoretical analysis, experimental testing, and computer simulation using the codes ARGUS and SOS. Interaction impedances were computed based on the corresponding dispersion characteristics. Finally, an equivalent circuit model for one period of the structure was chosen using equivalent circuit models for cylindrical wave guides of different radii. Optimum values for the discrete capacitors and inductors describing discontinuities between cylindrical wave guides were found using the computer code TOUCHSTONE.
Pan, Qian Sheng; Fang, Zhi Ping; Huang, Feng Jie
2000-01-01
AIM: To identify the type localization and morphology of APUD endocrine cells in the gastroenteropancreatic (GEP) system of stomach-containing teleosts, and study APUD endocrine system in the stomach, intestine and pancreas of fish species. METHODS: Two kinds of immunocytochemical (ICC) techniques of the streptavidin biotin-peroxidase complex (SABC) and streptavidin-peroxidase (S-P) method were used. The identification, localization and morphology of APUD endocrine cells scattered in the mucosa of digestive tract, intermuscular nerve plexus and glandular body of northern snakehead (Channa argus), ricefield eel (Monopterus albus), yellow catfish (Pelteobagrus ful vidraco), mandarinfish (Siniperca chuatsi), largemouth bass (Micropterus salmoides), oriental sheatfish (Silurus asotus), freshwater pomfret (Colossoma brachypomum) and nile tilapia (Tilapia nilotica) were investigated with 8 kinds of antisera. RESULTS: The positive reaction of 5-hydroxytryptamine (5-HT) immunoreactive endocrine (IRE) cells was found in the digestive tract and glandular body of 8 fish species in different degree. Only a few gastrin (GAS)-IRE cells were seen in C. argus, M. albus and P. fulvidraco. Glucagon (GLU)-IRE cells were not found in the digestive tract and glandular body but existed in pancreatic island of most fish species. The positive reaction of growth hormone (GH)-IRE cells was found only in pancreatic island of S. Chuatsi and S. Asotus, no positive reaction in the other 6 fish species. Somatostatin (SOM), calcitonin (CAL), neurofilament (NF) and insulin (INS)-IRE cells in the stomach, intestine and pancreas of 8 kinds of fish were different in distribution and types. The distribution of all 8 APUD cells was the most in gastrointestinal epithelium mucosa and then in digestive glands. The positive reaction of SOM- and 5-HT-IRE cells was found in intermuscular nerve plexus of intestine of P. fulvidraco and S.chuatsi. Only GH-IRE cells were densely scattered in the pancreatic islands of S. chuatsi and S. asotus, and odd distribution in the pancreas of S. asotus. SOM-IRE cells were distributed in the pancreatic islands of S. asotus, C. Brachypomum and T. nilotica. There were INS-IRE cells in the pancreatic islands of S. chuatsi and S. asolus. Eight kinds of APUD cells had longer cell body and cytoplasmic process when they were located in the gastrointestinal epithelium, and had shorter cell body and cytoplasmic process in the gastric gland, and irregular shape in the esophagus and pancreatic island. CONCLUSION: Eight kinds of IRE cells were identified in the GEP system of stomach-containing teleosts. These endocrine cells were scattered in gastrointestinal mucosa, intermuscular nerve plexus, gland body, pancreatic gland and islands under APUD system. CAL- and GH-IRE cells in the pancreatic islands of fishes showed functional diversity for these two hormones. Their morphological feature provides evidence of endocrine-paracrine and endocrine-exocrine acting mode. This research can morphologically prove that the GEP endocrine system of fish (the lowest vertebrate) is almost the same as of mammal and human. PMID:11819706
Anomaly detection driven active learning for identifying suspicious tracks and events in WAMI video
NASA Astrophysics Data System (ADS)
Miller, David J.; Natraj, Aditya; Hockenbury, Ryler; Dunn, Katherine; Sheffler, Michael; Sullivan, Kevin
2012-06-01
We describe a comprehensive system for learning to identify suspicious vehicle tracks from wide-area motion (WAMI) video. First, since the road network for the scene of interest is assumed unknown, agglomerative hierarchical clustering is applied to all spatial vehicle measurements, resulting in spatial cells that largely capture individual road segments. Next, for each track, both at the cell (speed, acceleration, azimuth) and track (range, total distance, duration) levels, extreme value feature statistics are both computed and aggregated, to form summary (p-value based) anomaly statistics for each track. Here, to fairly evaluate tracks that travel across different numbers of spatial cells, for each cell-level feature type, a single (most extreme) statistic is chosen, over all cells traveled. Finally, a novel active learning paradigm, applied to a (logistic regression) track classifier, is invoked to learn to distinguish suspicious from merely anomalous tracks, starting from anomaly-ranked track prioritization, with ground-truth labeling by a human operator. This system has been applied to WAMI video data (ARGUS), with the tracks automatically extracted by a system developed in-house at Toyon Research Corporation. Our system gives promising preliminary results in highly ranking as suspicious aerial vehicles, dismounts, and traffic violators, and in learning which features are most indicative of suspicious tracks.
NASA Astrophysics Data System (ADS)
Fleming, J. R.
2010-12-01
James A. Van Allen’s celebrated discovery of Earth’s radiation belts in 1958 using Explorer 1 and 3 satellites was immediately followed by his agreement to monitor tests of nuclear weapons in space aimed at disrupting the magnetosphere. This is “space geoengineering” on a planetary scale. “Space is radioactive,” noted Van Allen’s colleague Eric Ray, and the military wanted to make it even more radioactive by nuclear detonations that, in time of war might disrupt enemy radio communications from half a world away and damage or destroy enemy intercontinental ballistic missiles. This study of Van Allen’s participation in Project Argus (1958) and Project Starfish (1962) is based on new posthumous accessions to the Van Allen Papers. At the time radio astronomers protested that, “No government has the right to change the environment in any significant way without prior international study and agreement.” Van Allen later regretted his participation in experiments that disrupted the natural magnetosphere. In a larger policy framework, the history of these space interventions and the protests they generated serve as a cautionary tale for today’s geoengineers who are proposing heavy-handed manipulation of the planetary environment as a response to future climate warming. Anyone claiming that geoengineering has not yet been attempted should be reminded of the planetary-scale engineering of these nukes in space. N. Christofilos describing the intended effect of the Argus nuclear explosions on the magnetosphere, which would direct a stream of radioactive particles along magnetic lines of force half a world away.
Oliveira, T C; Santos, A B R; Rabelo, K C N; Souza, C A; Santos, S M; Crovella, S
2016-11-03
The use of insects to answer questions in criminal investigations, as well as a combination of forensic genetic techniques to obtain human DNA from the organisms, especially necrophagous dipterians, have gained ground in recent decades among researchers and professionals in this area. The objective of our study was to evaluate and compare two methods of human DNA extraction, commonly used for forensic samples, to obtain human autosomal DNA and X chromosome short tandem repeat profiles from the digestive tract of Chrysomya albiceps (Diptera: Calliphoridae) larvae. Immature specimens were collected from corpses at the Institute of Forensic Medicine of Pernambuco and raised in bovine ground meat to allow stabilization of the colony. Groups of larvae in the third instar were provided with bovine ground meat plus human blood for 48 h, dissected, and then subjected to DNA extraction. DNA was extracted using two methods: a DNA IQ™ kit and a phenol-chloroform method. Genomic DNA was amplified using AmpFℓSTR ® Identifiler ® Plus PCR and Argus-X-12 ® kits, and samples were sequenced to determine if the two extraction techniques generated reliable profiles that were compatible with a reference sample. The existence of comparable profiles from both techniques demonstrates the usefulness of dipteran larvae for obtaining human DNA from corpses, which can be further used to correlate genetic profiles in a crime scene when other traces are not available. However, several variables still require revision; thus, the technique should be further investigated for its validity, security, and, in particular, its reproducibility.
Kertész, Krisztián; Bálint, Zsolt; Biró, László Péter
2016-01-01
Structural coloration variability was investigated in two Blue butterfly species that are common in Hungary. The males of Polyommatus icarus (Common Blue) and Plebejus argus (Silver-studded Blue) use their blue wing coloration for conspecific recognition. Despite living in the same type of habitat, these two species display differences in prezygotic mating strategy: the males of P. icarus are patrolling, while P. argus males have sedentary behavior. Therefore, the species-specific photonic nanoarchitecture, which is the source of the structural coloration, may have been subjected to different evolutionary effects. Despite the increasing interest in photonic nanoarchitectures of biological origin, there is a lack of studies focused on the biological variability of structural coloration that examine a statistically relevant number of individuals from the same species. To investigate possible structural color variation within the same species in populations separated by large geographical distances, climatic differences, or applied experimental conditions, one has to be able to compare these variations to the normal biological variability within a single population. The structural coloration of the four wings of 25 male individuals (100 samples for each species) was measured and compared using different light-collecting setups: perpendicular and with an integrating sphere. Significant differences were found in the near UV wavelength region that are perceptible by these polyommatine butterflies but are invisible to human observers. The differences are attributed to the differences in the photonic nanoarchitecture in the scales of these butterflies. Differences in the intensity of structural coloration were also observed and were tentatively attributed to the different prezygotic mating strategies of these insects. Despite the optical complexity of the scale covered butterfly wings, for sufficiently large sample batches, the averaged normal incidence measurements and the averaged measurements using an integrating sphere are in agreement. PMID:27832120
Tadesse, Tizeta; Schmidt, Manfred; Walthall, William W.; Tai, Phang C.; Derby, Charles D.
2011-01-01
achaete-scute complex (ASC) genes, which encode basic helix-loop-helix transcription factors, regulate embryonic and adult neurogenesis in many animals. In adult arthropods, including crustaceans, ASC homologs have been identified but rarely functionally characterized. We took advantage of the recently identified crustacean homolog, splash (spiny lobster achaete scute homolog), in the olfactory organ of the Caribbean spiny lobster Panulirus argus to examine its role in adult neurogenesis. We tested the hypothesis that splash is associated with but not restricted to sensory neuron formation in the olfactory organ, the antennular lateral flagellum (LF), of adult spiny lobsters. We demonstrated splash labeling in epithelial cells across LF developmental zones (i.e., proliferation and mature zones), in auxiliary cells surrounding dendrites of olfactory receptor neurons (ORNs), and in immature and mature ORNs, but not in granulocytes or chromatophores. Since ORN proliferation varies with molt stage, we examined splash expression across molt stages and found that molt stage affected splash expression in the ORN mature zone but not in the proliferation zone. In vivo incorporation of bromodeoxyuridine (BrdU) showed no correlation in the cellular pattern of splash expression and BrdU labeling. The intensity of splash labeling was dramatically enhanced in the proliferation zones following LF damage, suggesting enhanced splash expression during repair and/or regeneration. We conclude that splash is not closely associated with the formation of sensory neurons under normal physiological conditions, and we propose that splash is involved in repair and regeneration. We also propose that splash has additional roles other than neurogenesis in adult crustaceans. PMID:21394934
Tadesse, Tizeta; Schmidt, Manfred; Walthall, William W; Tai, Phang C; Derby, Charles D
2011-04-01
achaete-scute complex (ASC) genes, which encode basic helix-loop-helix transcription factors, regulate embryonic and adult neurogenesis in many animals. In adult arthropods, including crustaceans, ASC homologs have been identified but rarely functionally characterized. We took advantage of the recently identified crustacean homolog, splash (spiny lobster achaete scute homolog), in the olfactory organ of the Caribbean spiny lobster Panulirus argus to examine its role in adult neurogenesis. We tested the hypothesis that splash is associated with but not restricted to sensory neuron formation in the olfactory organ, the antennular lateral flagellum (LF), of adult spiny lobsters. We demonstrated splash labeling in epithelial cells across LF developmental zones (i.e., proliferation and mature zones), in auxiliary cells surrounding dendrites of olfactory receptor neurons (ORNs), and in immature and mature ORNs, but not in granulocytes or chromatophores. Since ORN proliferation varies with molt stage, we examined splash expression across molt stages and found that molt stage affected splash expression in the ORN mature zone but not in the proliferation zone. In vivo incorporation of bromodeoxyuridine (BrdU) showed no correlation in the cellular pattern of splash expression and BrdU labeling. The intensity of splash labeling was dramatically enhanced in the proliferation zones following LF damage, suggesting enhanced splash expression during repair and/or regeneration. We conclude that splash is not closely associated with the formation of sensory neurons under normal physiological conditions, and we propose that splash is involved in repair and regeneration. We also propose that splash has additional roles other than neurogenesis in adult crustaceans. 2010 Wiley Periodicals, Inc.
Schmidt, Manfred; Derby, Charles D.
2013-01-01
New interneurons are continuously generated in small proliferation zones within neuronal somata clusters in the olfactory deutocerebrum of adult decapod crustaceans. Each proliferation zone is connected to a clump of cells containing one neural stem cell (i.e., adult neuroblast), thus forming a “neurogenic complex.” Here we provide a detailed analysis of the cytoarchitecture of neurogenic complexes in adult spiny lobsters, Panulirus argus, based on transmission electron microscopy and labeling with cell-type-selective markers. The clump of cells is composed of unique bipolar clump-forming cells that collectively completely envelop the adult neuroblast and are themselves ensheathed by a layer of processes of multipolar cell body glia. An arteriole is attached to the clump of cells, but dye perfusion experiments show that hemolymph has no access to the interior of the clump of cells. Thus, the clump of cells fulfills morphological criteria of a protective stem cell niche, with clump-forming cells constituting the adult neuroblast’s microenvironment together with the cell body glia processes separating it from other tissue components. Bromodeoxyuridine pulse-chase experiments with short survival times suggest that adult neuroblasts are not quiescent but rather cycle actively during daytime. We propose a cell lineage model in which an asymmetrically dividing adult neuroblast repopulates the pool of neuronal progenitor cells in the associated proliferation zone. In conclusion, as in mammalian brains, adult neurogenesis in crustacean brains is fueled by neural stem cells that are maintained by stem cell niches that preserve elements of the embryonic microenvironment and contain glial and vascular elements. PMID:21523781
Briones-Fourzán, Patricia; Candia-Zulbarán, Rebeca I; Negrete-Soto, Fernando; Barradas-Ortiz, Cecilia; Huchin-Mian, Juan P; Lozano-Álvarez, Enrique
2012-08-27
In Bahía de la Ascensión, Mexico, 'casitas' (large artificial shelters) are extensively used to harvest Caribbean spiny lobsters Panulirus argus. After the discovery of a pathogenic virus, Panulirus argus virus 1 (PaV1), in these lobsters, laboratory experiments revealed that PaV1 could be transmitted by contact and through water, and that lobsters avoided shelters harboring diseased conspecifics. To examine these issues in the context of casitas, which typically harbor multiple lobsters of all sizes, we examined the distribution and aggregation patterns of lobsters in the absence/presence of diseased conspecifics (i.e. visibly infected with PaV1) in 531 casitas distributed over 3 bay zones, 1 poorly vegetated ('Vigía Chico', average depth: 1.5 m) and 2 more extensively vegetated ('Punta Allen': 2.5 m; 'Los Cayos': 2.4 m). All zones had relatively high indices of predation risk. Using several statistical approaches, we found that distribution parameters of lobsters were generally not affected by the presence of diseased conspecifics in casitas. Interestingly, however, in the shallower and less vegetated zone (Vigía Chico), individual casitas harbored more lobsters and lobsters were actually more crowded in casitas containing diseased conspecifics, yet disease prevalence was the lowest in lobsters of all sizes. These results suggest that (1) investment in disease avoidance by lobsters is partially modulated by local habitat features, (2) contact transmission rates of PaV1 may be lower in nature than in the laboratory, and (3) water-borne transmission rates may be lower in shallow, poorly vegetated habitats more exposed to solar ultraviolet radiation, which can damage viral particles.
Schmidt, Manfred; Derby, Charles D
2011-08-15
New interneurons are continuously generated in small proliferation zones within neuronal somata clusters in the olfactory deutocerebrum of adult decapod crustaceans. Each proliferation zone is connected to a clump of cells containing one neural stem cell (i.e., adult neuroblast), thus forming a "neurogenic complex." Here we provide a detailed analysis of the cytoarchitecture of neurogenic complexes in adult spiny lobsters, Panulirus argus, based on transmission electron microscopy and labeling with cell-type-selective markers. The clump of cells is composed of unique bipolar clump-forming cells that collectively completely envelop the adult neuroblast and are themselves ensheathed by a layer of processes of multipolar cell body glia. An arteriole is attached to the clump of cells, but dye perfusion experiments show that hemolymph has no access to the interior of the clump of cells. Thus, the clump of cells fulfills morphological criteria of a protective stem cell niche, with clump-forming cells constituting the adult neuroblast's microenvironment together with the cell body glia processes separating it from other tissue components. Bromodeoxyuridine pulse-chase experiments with short survival times suggest that adult neuroblasts are not quiescent but rather cycle actively during daytime. We propose a cell lineage model in which an asymmetrically dividing adult neuroblast repopulates the pool of neuronal progenitor cells in the associated proliferation zone. In conclusion, as in mammalian brains, adult neurogenesis in crustacean brains is fueled by neural stem cells that are maintained by stem cell niches that preserve elements of the embryonic microenvironment and contain glial and vascular elements. Copyright © 2011 Wiley-Liss, Inc.
Candia-Zulbarán, Rebeca I; Briones-Fourzán, Patricia; Negrete-Soto, Fernando; Barradas-Ortiz, Cecilia; Lozano-Álvarez, Enrique
2012-08-27
In Bahía de la Ascensión, Mexico, the fishery for spiny lobsters Panulirus argus is based on the extensive use of casitas, large artificial shelters that can harbor the full size range of these highly gregarious lobsters. The discovery of a pathogenic virus in these lobsters (Panulirus argus virus 1, or PaV1) has raised concern about its potential effects on casita-based fisheries. Because in Bahía de la Ascensión visibly infected lobsters represent an immediate loss of revenue, we examined variability in clinical prevalence of PaV1 (percentage of lobsters visibly infected) in thousands of lobsters sampled from the commercial catch at the onset of 3 consecutive fishing years, and from 530 casitas distributed over 3 zones within the bay during 2 fishing and 2 closed seasons. In the commercial catch (lobsters 67 to 147 mm carapace length [CL]), clinical prevalence of PaV1 was low and was not affected by year or sex. In lobsters (9.2 to 115.0 mm CL) that occupied casitas, clinical prevalence of PaV1 varied with sampling season and was always higher in juveniles than in subadults or adults, but was consistently lower in one zone relative to the other 2 zones. The average clinical prevalence of PaV1 in this bay was statistically similar to the average clinical prevalence reported in Cuba, where casitas are also used, and in Florida Bay, USA, where casitas are not used. To date, PaV1 has had no discernible impact on the lobster fishery in Bahía de la Ascensión, suggesting that clinical prevalence is not influenced by the use of casitas per se.
Piszter, Gábor; Kertész, Krisztián; Bálint, Zsolt; Biró, László Péter
2016-01-01
Structural coloration variability was investigated in two Blue butterfly species that are common in Hungary. The males of Polyommatus icarus (Common Blue) and Plebejus argus (Silver-studded Blue) use their blue wing coloration for conspecific recognition. Despite living in the same type of habitat, these two species display differences in prezygotic mating strategy: the males of P. icarus are patrolling, while P. argus males have sedentary behavior. Therefore, the species-specific photonic nanoarchitecture, which is the source of the structural coloration, may have been subjected to different evolutionary effects. Despite the increasing interest in photonic nanoarchitectures of biological origin, there is a lack of studies focused on the biological variability of structural coloration that examine a statistically relevant number of individuals from the same species. To investigate possible structural color variation within the same species in populations separated by large geographical distances, climatic differences, or applied experimental conditions, one has to be able to compare these variations to the normal biological variability within a single population. The structural coloration of the four wings of 25 male individuals (100 samples for each species) was measured and compared using different light-collecting setups: perpendicular and with an integrating sphere. Significant differences were found in the near UV wavelength region that are perceptible by these polyommatine butterflies but are invisible to human observers. The differences are attributed to the differences in the photonic nanoarchitecture in the scales of these butterflies. Differences in the intensity of structural coloration were also observed and were tentatively attributed to the different prezygotic mating strategies of these insects. Despite the optical complexity of the scale covered butterfly wings, for sufficiently large sample batches, the averaged normal incidence measurements and the averaged measurements using an integrating sphere are in agreement.
Rigby, C L; White, W T; Smart, J J; Simpfendorfer, C A
2016-03-01
Two Australian endemic elasmobranchs, the Argus skate Dipturus polyommata and the eastern spotted gummy shark Mustelus walkeri, were collected from the by-catch of a prawn Melicertus plebejus trawl fishery off Queensland. Age and growth parameters were estimated from growth band counts in vertebral sections of 220 D. polyommata and 44 M. walkeri. Dipturus polyommata males and females had an observed maximum age of 10 years and reached maximum sizes of 369 and 371 mm total length (LT ), respectively. Mustelus walkeri lived longer, with the oldest female aged 16 years and measuring 1050 mm stretched total length (LST ), and oldest male aged 9 years and 805 mm LST . Dipturus polyommata grew relatively fast with a von Bertalanffy growth completion parameter of k = 0·208 year(-1) with males reaching maturity at 4·0 years (c. 278 mm LT ) and females at 5·1 years (c. 305 mm LT ). Mustelus walkeri grew more slowly with k = 0·033 year(-1) with males estimated to mature at 7-9 years (670-805 mm LST ) and females at 10-14 years (833-1012 mm LST ). Length at birth inferred from neonate D. polyommata was 89-111 mm LT while for M. walkeri it was estimated to be 273 LST based on the value of L0 from the von Bertalanffy growth model. Both species appeared to have continuous reproductive cycles and low fecundity with an average ovarian fecundity of eight follicles for D. polyommata and a litter size of five to seven pups for M. walkeri. Based on these life-history traits, D. polyommata is more resilient to fishing pressure than M. walkeri. © 2016 The Fisheries Society of the British Isles.
Analysis of 12 X-STR loci in the population of south Croatia.
Mršić, Gordan; Ozretić, Petar; Crnjac, Josip; Merkaš, Siniša; Račić, Ivana; Rožić, Sara; Sukser, Viktorija; Popović, Maja; Korolija, Marina
2017-02-01
The aim of the study was to assess forensic pertinence of 12 short tandem repeats (STRs) on X-chromosome in south Croatia population. Investigator ® Argus X-12 kit was used to co-amplify 12 STR loci belonging to four linkage groups (LGs) on X-chromosome in 99 male and 98 female DNA samples of unrelated donors. PCR products were analyzed by capillary electrophoresis. Population genetic and forensic parameters were calculated by the Arlequin and POPTREE2 software, and an on-line tool available at ChrX-STR.org. Hardy-Weinberg equilibrium was confirmed for all X-STR markers in female samples. Biallelic patterns at DXS10079 locus were detected in four male samples. Polymorphism information content for the most (DXS10135) and the least (DXS8378) informative markers was 0.9212 and 0.6347, respectively. In both male and female samples, combined power of discrimination exceeded 0.999999999. As confirmed by linkage disequilibrium test, significant association of marker pair DXS10074-DXS10079 (P = 0.0004) within LG2 and marker pair DXS10101-DXS10103 (P = 0.0003) within LG3 was found only in male samples. Number of observed haplotypes in our sample pool amounted 3.01, 7.53, 5 and 3.25% of the number of possible haplotypes for LG1, LG2, LG3 and LG4, respectively. According to haplotype diversity value of 0.9981, LG1 was the most informative. In comparison of south Croatia with 26 world populations, pair-wise [Formula: see text] values increase in parallel with geographical distance. Overall statistical assessment confirmed suitability of Investigator ® Argus X-12 kit for forensic casework in both identification and familial testing in the population of south Croatia.
Chang, Jing; Li, Jitong; Wang, Huili; Wang, Yinghuan; Guo, Baoyuan; Yin, Jing; Hao, Weiyu; Li, Wei; Li, Jianzhong; Xu, Peng
2016-11-01
Lambda-cyhalothrin (LCT) is a widely used pyrethroid with neurotoxicity. However, little is known about the toxicokinetics of LCT in reptiles. In this study, the absorption, distribution, metabolism and excretion of LCT in Chinese lizards (Eremias Argus) were determined following a single dose (10 mg kg -1 ) treatment. In the liver, brain, gonads and skin, LCT levels peaked within several hours and then decreased rapidly. However, the concentration of LCT gradually increased in the fat tissue. More than 90% of the LCT dose was excreted in the faeces. One LCT metabolite, 3-phenoxybenzoic acid (PBA), was detected in lizard plasma and tissues. PBA preferentially accumulates in the brain and plasma. The half-life of PBA in the brain was 3.2 days, which was 35.4-fold greater than that of LCT. In the plasma, the concentration of PBA was significantly higher than that of LCT. The bioaccumulation of LCT in tissues was enantioselective, and the enantiomeric fractions (EF) ranged from 0.72 to 0.26. The preferential accumulation of enantiomers changed according to exposure time, but the reasons behind this phenomenon were not clear. For pathological analysis, vacuolation of the cytoplasm and large areas of necrosis were observed in the liver sections after 168 h of dosing. The liver tissues exhibited both decreases in the hepatosomatic index and histopathological lesions during the exposure period. In this study, the effect concentration of LCT in lizards was 200-fold lower than its LD 50 value used in risk assessments for birds. These results may provide additional information for the risk assessment of LCT for reptiles and indicate that birds may not be an ideal surrogate for reptile toxicity evaluation. Copyright © 2016 Elsevier Ltd. All rights reserved.
49 CFR 659.23 - System security plan: contents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...
Optical Polarization in the Nearshore
NASA Astrophysics Data System (ADS)
Holman, R.
2008-12-01
A recent addition to the suite of optical remote sensing methods that have been used to study nearshore processes is the use of imaging polarimetric cameras. Both the degree of polarization and the azimuth of polarized light contain information about the imaged surfaces from which light has been reflected or scattered. In 2007, a polarimetric Argus camera was installed atop the tower at Duck, NC. This talk will examine the various polarization signatures that can be exploited, including the potential for measuring the sea surface slope spectrum of nearshore surf zone waves, the slope of the foreshore beach, water content of foreshore sediments and bubble signatures of dissipating waves.
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
2010-08-22
Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems
31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?
Code of Federal Regulations, 2010 CFR
2010-07-01
... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...
Correlation Research of Medical Security Management System Network Platform in Medical Practice
NASA Astrophysics Data System (ADS)
Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang
Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.
76 FR 58786 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-22
... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Legacy Treasury Direct® Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury... Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System. (a) Eligible... book-entry securities system. (b) Conversion of Registered Security to book-entry form to be held in...
31 CFR 357.0 - Book-entry systems.
Code of Federal Regulations, 2014 CFR
2014-07-01
... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...
31 CFR 357.0 - Book-entry systems.
Code of Federal Regulations, 2012 CFR
2012-07-01
... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...
31 CFR 357.0 - Book-entry systems.
Code of Federal Regulations, 2011 CFR
2011-07-01
... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...
31 CFR 357.0 - Book-entry systems.
Code of Federal Regulations, 2013 CFR
2013-07-01
... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...
An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012
NASA Astrophysics Data System (ADS)
Li, X. S.; Peng, Z. Y.; Li, T. T.
2016-08-01
This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...
76 FR 43993 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...
31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.
Code of Federal Regulations, 2010 CFR
2010-07-01
... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
ERIC Educational Resources Information Center
De Patta, Joe
2003-01-01
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
33 CFR 106.255 - Security systems and equipment maintenance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... maintained according to manufacturers' recommendations. (b) Security systems must be regularly tested in... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a...
2010-08-22
practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and
75 FR 56079 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-15
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...
Computer Security Systems Enable Access.
ERIC Educational Resources Information Center
Riggen, Gary
1989-01-01
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
Genomic characterization and taxonomic position of a rhabdovirus from a hybrid snakehead.
Zeng, Weiwei; Wang, Qing; Wang, Yingying; Liu, Cun; Liang, Hongru; Fang, Xiang; Wu, Shuqin
2014-09-01
A new rhabdovirus, tentatively designated as hybrid snakehead rhabdovirus C1207 (HSHRV-C1207), was first isolated from a moribund hybrid snakehead (Channa maculata×Channa argus) in China. We present the complete genome sequence of HSHRV-C1207 and a comprehensive sequence comparison between HSHRV-C1207 and other rhabdoviruses. Sequence alignment and phylogenetic analysis revealed that HSHRV-C1207 shared the highest degree of homology with Monopterus albus rhabdovirus and Siniperca chuatsi rhabdovirus. All three viruses clustered into a single group that was distinct from the recognized genera in the family Rhabdoviridae. Our analysis suggests that HSHRV-C1207, as well as MARV and SCRV, should be assigned to a new rhabdovirus genus.
Diseases of spiny lobsters: a review.
Shields, J D
2011-01-01
Spiny lobsters have few reported pathogens, parasites and symbionts. However, they do have a diverse fauna comprised of a pathogenic virus, several bacteria, protozoans, helminths and even symbiotic crustaceans. A few idiopathic syndromes have also been reported, but these appear correlated with lobsters held in poor conditions. Fungal and bacterial pathogens present significant threats for rearing spiny lobsters in aquaculture settings, but only one pathogen, Panulirus argus virus 1, is thought to have damaged a fishery for a spiny lobster. No doubt others will emerge as lobsters are brought into aquaculture setting and as fishing pressure intensifies with stocks become more susceptible to anthropogenic stressors. Copyright © 2010 Elsevier Inc. All rights reserved.
Miyazaki, Yusuke; Teramura, Akinori; Senou, Hiroshi
2016-01-01
An apparent illegal introduction of Lepomis macrochirus macrochirus from Yokohama City, Kanagawa Prefecture, Japan, is reported based on a juvenile specimen and a photograph of two adults collected on 14 June 2015 and deposited in the Kangawa Prefectural Museum of Natural History. The specimens and photographs were initially reported on the internet-based social networking site, Twitter. Two specimens of Carassius auratus, including an aquarium form, were also reported at the same locality and date, suggesting that the illegal introductions originated from an aquarium release. Our report demonstrates an example of web data mining in the discipline of Citizen Science.
77 FR 56628 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...
78 FR 45913 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-30
... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...
77 FR 26259 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
.... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...
75 FR 67697 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...
75 FR 43494 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...
8 CFR 103.34 - Security of records systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records systems...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orrell, S.; Ralstin, S.
1992-04-01
Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orrell, S.; Ralstin, S.
1992-01-01
Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less
Information technology security system engineering methodology
NASA Technical Reports Server (NTRS)
Childs, D.
2003-01-01
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
6 CFR 5.31 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...
Personal health record systems and their security protection.
Win, Khin Than; Susilo, Willy; Mu, Yi
2006-08-01
The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.
28 CFR 700.24 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...
Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz
2015-01-01
Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2013 CFR
2013-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2014 CFR
2014-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226
Security threat assessment of an Internet security system using attack tree and vague sets.
Chang, Kuei-Hu
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
77 FR 32111 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... or fraud, or harm to the security or integrity of this system or other systems or programs (whether... to comment. FCC/MB-2 System Name: Broadcast Station Public Inspection Files. Security Classification: The FCC's Security Operations Center (SOC) has not assigned a security classification to this system...
NASA Astrophysics Data System (ADS)
Yang, Wei; Chen, Huapu; Cui, Xuefan; Zhang, Kewei; Jiang, Dongneng; Deng, Siping; Zhu, Chunhua; Li, Guangli
2017-09-01
Spotted scat (Scatophagus argus) is an economically important farmed fish, particularly in East and Southeast Asia. Because there has been little research on reproductive development and regulation in this species, the lack of a mature artificial reproduction technology remains a barrier for the sustainable development of the aquaculture industry. More genetic and genomic background knowledge is urgently needed for an in-depth understanding of the molecular mechanism of reproductive process and identification of functional genes related to sexual differentiation, gonad maturation and gametogenesis. For these reasons, we performed transcriptomic analysis on spotted scat using a multiple tissue sample mixing strategy. The Illumina RNA sequencing generated 118 510 486 raw reads. After trimming, de novo assembly was performed and yielded 99 888 unigenes with an average length of 905.75 bp. A total of 45 015 unigenes were successfully annotated to the Nr, Swiss-Prot, KOG and KEGG databases. Additionally, 23 783 and 27 183 annotated unigenes were assigned to 56 Gene Ontology (GO) functional groups and 228 KEGG pathways, respectively. Subsequently, 2 474 transcripts associated with reproduction were selected using GO term and KEGG pathway assignments, and a number of reproduction-related genes involved in sex differentiation, gonad development and gametogenesis were identified. Furthermore, 22 279 simple sequence repeat (SSR) loci were discovered and characterized. The comprehensive transcript dataset described here greatly increases the genetic information available for spotted scat and contributes valuable sequence resources for functional gene mining and analysis. Candidate transcripts involved in reproduction would make good starting points for future studies on reproductive mechanisms, and the putative sex differentiation-related genes will be helpful for sex-determining gene identification and sex-specific marker isolation. Lastly, the SSRs can serve as marker resources for future research into genetics, marker-assisted selection (MAS) and conservation biology.
Gaither, Michelle R; Bowen, Brian W; Bordenave, Tiana-Rae; Rocha, Luiz A; Newman, Stephen J; Gomez, Juan A; van Herwerden, Lynne; Craig, Matthew T
2011-07-01
The Coral Triangle (CT), bounded by the Philippines, the Malay Peninsula, and New Guinea, is the epicenter of marine biodiversity. Hypotheses that explain the source of this rich biodiversity include 1) the center of origin, 2) the center of accumulation, and 3) the region of overlap. Here we contribute to the debate with a phylogeographic survey of a widely distributed reef fish, the Peacock Grouper (Cephalopholis argus; Epinephelidae) at 21 locations (N = 550) using DNA sequence data from mtDNA cytochrome b and two nuclear introns (gonadotropin-releasing hormone and S7 ribosomal protein). Population structure was significant (ΦST = 0.297, P < 0.001; FST = 0.078, P < 0.001; FST = 0.099, P < 0.001 for the three loci, respectively) among five regions: French Polynesia, the central-west Pacific (Line Islands to northeastern Australia), Indo-Pacific boundary (Bali and Rowley Shoals), eastern Indian Ocean (Cocos/Keeling and Christmas Island), and western Indian Ocean (Diego Garcia, Oman, and Seychelles). A strong signal of isolation by distance was detected in both mtDNA (r = 0.749, P = 0.001) and the combined nuclear loci (r = 0.715, P < 0.001). We detected evidence of population expansion with migration toward the CT. Two clusters of haplotypes were detected in the mtDNA data (d = 0.008), corresponding to the Pacific and Indian Oceans, with a low level of introgression observed outside a mixing zone at the Pacific-Indian boundary. We conclude that the Indo-Pacific Barrier, operating during low sea level associated with glaciation, defines the primary phylogeographic pattern in this species. These data support a scenario of isolation on the scale of 105 year glacial cycles, followed by population expansion toward the CT, and overlap of divergent lineages at the Pacific-Indian boundary. This pattern of isolation, divergence, and subsequent overlap likely contributes to species richness at the adjacent CT and is consistent with the region of overlap hypothesis.
Jiao, Y.; Lapointe, N.W.R.; Angermeier, P.L.; Murphy, B.R.
2009-01-01
Models of species' demographic features are commonly used to understand population dynamics and inform management tactics. Hierarchical demographic models are ideal for the assessment of non-indigenous species because our knowledge of non-indigenous populations is usually limited, data on demographic traits often come from a species' native range, these traits vary among populations, and traits are likely to vary considerably over time as species adapt to new environments. Hierarchical models readily incorporate this spatiotemporal variation in species' demographic traits by representing demographic parameters as multi-level hierarchies. As is done for traditional non-hierarchical matrix models, sensitivity and elasticity analyses are used to evaluate the contributions of different life stages and parameters to estimates of population growth rate. We applied a hierarchical model to northern snakehead (Channa argus), a fish currently invading the eastern United States. We used a Monte Carlo approach to simulate uncertainties in the sensitivity and elasticity analyses and to project future population persistence under selected management tactics. We gathered key biological information on northern snakehead natural mortality, maturity and recruitment in its native Asian environment. We compared the model performance with and without hierarchy of parameters. Our results suggest that ignoring the hierarchy of parameters in demographic models may result in poor estimates of population size and growth and may lead to erroneous management advice. In our case, the hierarchy used multi-level distributions to simulate the heterogeneity of demographic parameters across different locations or situations. The probability that the northern snakehead population will increase and harm the native fauna is considerable. Our elasticity and prognostic analyses showed that intensive control efforts immediately prior to spawning and/or juvenile-dispersal periods would be more effective (and probably require less effort) than year-round control efforts. Our study demonstrates the importance of considering the hierarchy of parameters in estimating population growth rate and evaluating different management strategies for non-indigenous invasive species. ?? 2009 Elsevier B.V.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...
Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A
2013-10-01
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Koyama, Tadashi
2005-04-01
We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.
49 CFR 659.25 - Annual review of system safety program plan and system security plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...
Code of Federal Regulations, 2011 CFR
2011-10-01
... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... Federal review. (f) ADP System Security Requirements and Review Process—(1) ADP System Security Requirement. State agencies are responsible for the security of all ADP projects under development, and...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 4 2011-10-01 2011-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry. ...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry. ...
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
An E-Hospital Security Architecture
NASA Astrophysics Data System (ADS)
Tian, Fang; Adams, Carlisle
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.
ERIC Educational Resources Information Center
Okolo, Nkiru Benjamin
2016-01-01
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Code of Federal Regulations, 2010 CFR
2010-10-01
... 2301.101 Federal Acquisition Regulations System SOCIAL SECURITY ADMINISTRATION GENERAL SOCIAL SECURITY ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 2301.101 Purpose. (a) The Social Security... Social Security Administration (SSA) which conform to the Federal Acquisition Regulation (FAR) System. (b...
Quality of protection evaluation of security mechanisms.
Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail
2014-01-01
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 5 2012-10-01 2012-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
47 CFR 80.277 - Ship Security Alert System (SSAS).
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...
20 CFR 404.1901 - Introduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... social security system of the United States and the social security system of a foreign country. An... be based on a combination of a person's periods of coverage under the social security system of the United States and the social security system of the foreign country. An agreement also provides for the...
Code of Federal Regulations, 2010 CFR
2010-10-01
... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...
49 CFR 659.21 - System security plan: general requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...
Multimedia Security System for Security and Medical Applications
ERIC Educational Resources Information Center
Zhou, Yicong
2010-01-01
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
Research and realization of info-net security controlling system
NASA Astrophysics Data System (ADS)
Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-03-01
The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.
Tjora, Aksel; Tran, Trung; Faxvaag, Arild
2005-05-31
Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces.
Tran, Trung; Faxvaag, Arild
2005-01-01
Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces. PMID:15998606
FAA computer security : concerns remain due to personnel and other continuing weaknesses
DOT National Transportation Integrated Search
2000-08-01
FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...
22 CFR 308.10 - Security of records systems-manual and automated.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security of records systems-manual and automated... Security of records systems—manual and automated. The head of the agency has the responsibility of... destruction of manual and automatic record systems. These security safeguards shall apply to all systems in...
12 CFR 792.67 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Security of systems of records. 792.67 Section... AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.67 Security of systems of records. (a) Each system manager, with the approval of the head of that...
Securing the Global Airspace System Via Identity-Based Security
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2015-01-01
Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
Information Systems Security Management: A Review and a Classification of the ISO Standards
NASA Astrophysics Data System (ADS)
Tsohou, Aggeliki; Kokolakis, Spyros; Lambrinoudakis, Costas; Gritzalis, Stefanos
The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the "correct" system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved parties and the security mechanisms that will be implemented do not comply with some globally accepted rules and practices, then the system that will be designed will not necessarily achieve the desired security level and it will be very difficult to securely interoperate with other systems. It is therefore clear that the role and contribution of international standards to the design and implementation of security mechanisms is dominant. In this paper we provide a state of the art review on information security management standards published by the International Organization for Standardization and the International Electrotechnical Commission. Such an analysis is meaningful to security practitioners for an efficient management of information security. Moreover, the classification of the standards in the clauses of ISO/IEC 27001:2005 that results from our analysis is expected to provide assistance in dealing with the plethora of security standards.
Quality of Protection Evaluation of Security Mechanisms
Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail
2014-01-01
Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
Contextualizing Secure Information System Design: A Socio-Technical Approach
ERIC Educational Resources Information Center
Charif, Abdul Rahim
2017-01-01
Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to "technological fixes" neither is the design of SIS. Technical security cannot ensure IS security.…
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung
2012-06-01
The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
Secure electronic commerce communication system based on CA
NASA Astrophysics Data System (ADS)
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
2001-07-01
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
Evaluation on Electronic Securities Settlements Systems by AHP Methods
NASA Astrophysics Data System (ADS)
Fukaya, Kiyoyuki; Komoda, Norihisa
Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Design and implementation of a secure workflow system based on PKI/PMI
NASA Astrophysics Data System (ADS)
Yan, Kai; Jiang, Chao-hui
2013-03-01
As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
DOT National Transportation Integrated Search
2013-07-29
The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...
ERIC Educational Resources Information Center
Daneman, Kathy
1998-01-01
Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)
The electronic security partnership of safety/security and information systems departments.
Yow, J Art
2012-01-01
The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.
Process Improvement Should Link to Security: SEPG 2007 Security Track Recap
2007-09-01
the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security
Strengthening the Security of ESA Ground Data Systems
NASA Astrophysics Data System (ADS)
Flentge, Felix; Eggleston, James; Garcia Mateos, Marc
2013-08-01
A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.
Barboza, Philippe; Vaillant, Laetitia; Le Strat, Yann; Hartley, David M; Nelson, Noele P; Mawudeku, Abla; Madoff, Lawrence C; Linge, Jens P; Collier, Nigel; Brownstein, John S; Astagneau, Pascal
2014-01-01
Internet-based biosurveillance systems have been developed to detect health threats using information available on the Internet, but system performance has not been assessed relative to end-user needs and perspectives. Infectious disease events from the French Institute for Public Health Surveillance (InVS) weekly international epidemiological bulletin published in 2010 were used to construct the gold-standard official dataset. Data from six biosurveillance systems were used to detect raw signals (infectious disease events from informal Internet sources): Argus, BioCaster, GPHIN, HealthMap, MedISys and ProMED-mail. Crude detection rates (C-DR), crude sensitivity rates (C-Se) and intrinsic sensitivity rates (I-Se) were calculated from multivariable regressions to evaluate the systems' performance (events detected compared to the gold-standard) 472 raw signals (Internet disease reports) related to the 86 events included in the gold-standard data set were retrieved from the six systems. 84 events were detected before their publication in the gold-standard. The type of sources utilised by the systems varied significantly (p<0001). I-Se varied significantly from 43% to 71% (p=0001) whereas other indicators were similar (C-DR: p=020; C-Se, p=013). I-Se was significantly associated with individual systems, types of system, languages, regions of occurrence, and types of infectious disease. Conversely, no statistical difference of C-DR was observed after adjustment for other variables. Although differences could result from a biosurveillance system's conceptual design, findings suggest that the combined expertise amongst systems enhances early detection performance for detection of infectious diseases. While all systems showed similar early detection performance, systems including human moderation were found to have a 53% higher I-Se (p=00001) after adjustment for other variables. Overall, the use of moderation, sources, languages, regions of occurrence, and types of cases were found to influence system performance.
Petri net modeling of encrypted information flow in federated cloud
NASA Astrophysics Data System (ADS)
Khushk, Abdul Rauf; Li, Xiaozhong
2017-08-01
Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.
Addressing software security and mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2003-01-01
Traditionally, security is viewed as an organizational and Information Technology (IIJ systems function comprising of Firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.
Addressing software security and mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2004-01-01
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...
Building Security. Honeywell Planning Guide.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…
Using SysML to model complex systems for security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cano, Lester Arturo
2010-08-01
As security systems integrate more Information Technology the design of these systems has tended to become more complex. Some of the most difficult issues in designing Complex Security Systems (CSS) are: Capturing Requirements: Defining Hardware Interfaces: Defining Software Interfaces: Integrating Technologies: Radio Systems: Voice Over IP Systems: Situational Awareness Systems.
Perimeter security alarm system based on fiber Bragg grating
NASA Astrophysics Data System (ADS)
Zhang, Cui; Wang, Lixin
2010-11-01
With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Developing an Undergraduate Information Systems Security Track
ERIC Educational Resources Information Center
Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna
2013-01-01
Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…
Designing a Retirement System for Federal Workers Covered by Social Security.
ERIC Educational Resources Information Center
Library of Congress, Washington, DC. Congressional Research Service.
A study examined principal cost and benefit issues to be resolved in designing a new retirement system for Federal workers covered by Social Security. The new Federal system would be built on the base of Social Security and would take into account the Social Security program's taxes and benefits. The current Civil Service Retirement System (CSRS)…
Barboza, Philippe; Vaillant, Laetitia; Le Strat, Yann; Hartley, David M.; Nelson, Noele P.; Mawudeku, Abla; Madoff, Lawrence C.; Linge, Jens P.; Collier, Nigel; Brownstein, John S.; Astagneau, Pascal
2014-01-01
Background Internet-based biosurveillance systems have been developed to detect health threats using information available on the Internet, but system performance has not been assessed relative to end-user needs and perspectives. Method and Findings Infectious disease events from the French Institute for Public Health Surveillance (InVS) weekly international epidemiological bulletin published in 2010 were used to construct the gold-standard official dataset. Data from six biosurveillance systems were used to detect raw signals (infectious disease events from informal Internet sources): Argus, BioCaster, GPHIN, HealthMap, MedISys and ProMED-mail. Crude detection rates (C-DR), crude sensitivity rates (C-Se) and intrinsic sensitivity rates (I-Se) were calculated from multivariable regressions to evaluate the systems’ performance (events detected compared to the gold-standard) 472 raw signals (Internet disease reports) related to the 86 events included in the gold-standard data set were retrieved from the six systems. 84 events were detected before their publication in the gold-standard. The type of sources utilised by the systems varied significantly (p<0001). I-Se varied significantly from 43% to 71% (p = 0001) whereas other indicators were similar (C-DR: p = 020; C-Se, p = 013). I-Se was significantly associated with individual systems, types of system, languages, regions of occurrence, and types of infectious disease. Conversely, no statistical difference of C-DR was observed after adjustment for other variables. Conclusion Although differences could result from a biosurveillance system's conceptual design, findings suggest that the combined expertise amongst systems enhances early detection performance for detection of infectious diseases. While all systems showed similar early detection performance, systems including human moderation were found to have a 53% higher I-Se (p = 00001) after adjustment for other variables. Overall, the use of moderation, sources, languages, regions of occurrence, and types of cases were found to influence system performance. PMID:24599062
A Complex Systems Approach to More Resilient Multi-Layered Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa
In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less
Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari
2002-01-01
The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min
2012-01-01
Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648
Analyzing the security of an existing computer system
NASA Technical Reports Server (NTRS)
Bishop, M.
1986-01-01
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
ERIC Educational Resources Information Center
Edwards, Gregory
2011-01-01
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
10 CFR 95.49 - Security of automatic data processing (ADP) systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Security requirements for... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 3052.204-70 Security requirements...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Security requirements for... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 3052.204-70 Security requirements...
Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design
DOT National Transportation Integrated Search
1992-12-01
The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...
5 CFR 9701.231 - Conversion of positions and employees to the DHS classification system.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Transitional...
Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio
2015-08-01
The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.
10 CFR 1008.22 - Use and collection of social security numbers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... from its inventory of record systems. TSA will rely upon DHS/ALL-017 General Legal Records (November 23, 2011, 76 FR 72428) to cover its legal activities. Eliminating the system of records notice DHS/TSA-009... Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... Assistance Files System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of...
Code of Federal Regulations, 2010 CFR
2010-10-01
... record systems. These security safeguards shall apply to all systems in which identifiable personal data... data and automated systems shall be adequately trained in the security and privacy of personal data. (4... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...
Code of Federal Regulations, 2010 CFR
2010-10-01
... record systems. These security safeguards shall apply to all systems in which identifiable personal data... the security and privacy of such records. (7) The disposal and destruction of records within a system... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
10 CFR 1008.22 - Use and collection of social security numbers.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...
10 CFR 1008.22 - Use and collection of social security numbers.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...
10 CFR 1008.22 - Use and collection of social security numbers.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...
10 CFR 1008.22 - Use and collection of social security numbers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...
Security Techniques for Sensor Systems and the Internet of Things
ERIC Educational Resources Information Center
Midi, Daniele
2016-01-01
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…
Gruber, T
1996-01-01
The author presents guidelines to help a security department select a computer system to track security activities--whether it's a commercial software product, an in-house developed program, or a do-it-yourself designed system. Computerized security activity reporting, he believes, is effective and beneficial.
Network security system for health and medical information using smart IC card
NASA Astrophysics Data System (ADS)
Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki
1998-07-01
A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.
Information security system quality assessment through the intelligent tools
NASA Astrophysics Data System (ADS)
Trapeznikov, E. V.
2018-04-01
The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.
33 CFR 105.250 - Security systems and equipment maintenance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... systems must be regularly tested in accordance with the manufacturers' recommendations; noted deficiencies... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and...
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
Evaluation of power system security and development of transmission pricing method
NASA Astrophysics Data System (ADS)
Kim, Hyungchul
The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
Model-Driven Configuration of SELinux Policies
NASA Astrophysics Data System (ADS)
Agreiter, Berthold; Breu, Ruth
The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
DOT National Transportation Integrated Search
1992-12-01
The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... establishment of a new human resources management system within the Department of Homeland Security (DHS), as...
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Situated Usability Testing for Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.
2011-03-02
While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Finite-Time Performance of Local Search Algorithms: Theory and Application
2010-06-10
security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official
Information security requirements in patient-centred healthcare support systems.
Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah
2013-01-01
Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.
Cyber security with radio frequency interferences mitigation study for satellite systems
NASA Astrophysics Data System (ADS)
Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik
2016-05-01
Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
NASA Electronic Library System (NELS): The system impact of security
NASA Technical Reports Server (NTRS)
Mcgregor, Terry L.
1993-01-01
This paper discusses security issues as they relate to the NASA Electronic Library System which is currently in use as the repository system for AdaNET System Version 3 (ASV3) being operated by MountainNET, Inc. NELS was originally designed to provide for public, development, and secure collections and objects. The secure feature for collections and objects was deferred in the initial system for implementation at a later date. The NELS system is now 9 months old and many lessons have been learned about the use and maintenance of library systems. MountainNET has 9 months of experience in operating the system and gathering feedback from the ASV3 user community. The user community has expressed an interest in seeing security features implemented in the current system. The time has come to take another look at the whole issue of security for the NELS system. Two requirements involving security have been put forth by MountainNET for the ASV3 system. The first is to incorporate at the collection level a security scheme to allow restricted access to collections. This should be invisible to end users and be controlled by librarians. The second is to allow inclusion of applications which can be executed only by a controlled group of users; for example, an application which can be executed by librarians only. The requirements provide a broad framework in which to work. These requirements raise more questions than answers. To explore the impact of these requirements a top down approach will be used.
Merging leadership and innovation to secure a large health system.
Bellino, Joseph V; Shaw, Sharon
2014-01-01
In this article the security system executive for a 13-hospital system spells out how partnering with capable and motivated vendors and gaining the cooperation of other departments enabled him to convert disparate security systems with equipment from multiple manufacturers into a cost-effective centralized system.
77 FR 60401 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-03
... computer password protection.'' * * * * * System manager(s) and address: Delete entry and replace with...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency (NSA) is proposing to amend a system of...
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Hsien-Hsin S
The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less
DOT National Transportation Integrated Search
2013-12-27
This report presents an analysis by Booz Allen Hamilton (Booz Allen) of the technical design for the Security Credentials Management System (SCMS) intended to support communications security for the connected vehicle system. The SCMS technical design...
Security warning system monitors up to fifteen remote areas simultaneously
NASA Technical Reports Server (NTRS)
Fusco, R. C.
1966-01-01
Security warning system consisting of 15 television cameras is capable of monitoring several remote or unoccupied areas simultaneously. The system uses a commutator and decommutator, allowing time-multiplexed video transmission. This security system could be used in industrial and retail establishments.
5 CFR 9701.373 - Conversion of employees to the DHS pay system.
Code of Federal Regulations, 2010 CFR
2010-01-01
... system. 9701.373 Section 9701.373 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Transitional Provisions...
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
Assessment on security system of radioactive sources used in hospitals of Thailand
NASA Astrophysics Data System (ADS)
Jitbanjong, Petchara; Wongsawaeng, Doonyapong
2016-01-01
Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.
Larval Connectivity and the International Management of Fisheries
Kough, Andrew S.; Paris, Claire B.; Butler, Mark J.
2013-01-01
Predicting the oceanic dispersal of planktonic larvae that connect scattered marine animal populations is difficult, yet crucial for management of species whose movements transcend international boundaries. Using multi-scale biophysical modeling techniques coupled with empirical estimates of larval behavior and gamete production, we predict and empirically verify spatio-temporal patterns of larval supply and describe the Caribbean-wide pattern of larval connectivity for the Caribbean spiny lobster (Panulirus argus), an iconic coral reef species whose commercial value approaches $1 billion USD annually. Our results provide long sought information needed for international cooperation in the management of marine resources by identifying lobster larval connectivity and dispersal pathways throughout the Caribbean. Moreover, we outline how large-scale fishery management could explicitly recognize metapopulation structure by considering larval transport dynamics and pelagic larval sanctuaries. PMID:23762273
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
Code of Federal Regulations, 2010 CFR
2010-07-01
... AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy...-entry system, and TreasuryDirect ®. A security may also be transferred between accounts in Legacy... system. A transfer of a security from Legacy Treasury Direct to the commercial book-entry system is...
32 CFR 637.20 - Security surveillance systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 4 2010-07-01 2010-07-01 true Security surveillance systems. 637.20 Section 637... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20 Security surveillance systems. Closed circuit video recording systems, to include those with an audio capability, may be...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 4 2014-10-01 2014-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 4 2013-10-01 2013-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...
49 CFR 234.211 - Security of warning system apparatus.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 4 2012-10-01 2012-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...
NASA Astrophysics Data System (ADS)
Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.
2018-03-01
Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.
System and method for key generation in security tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.
Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).
20 CFR 404.1903 - Negotiating totalization agreements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security system of general application in effect. The system shall be considered to be in effect if it is collecting social security taxes or paying social security benefits. ... Section 404.1903 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND...
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
Information Security and Integrity Systems
NASA Technical Reports Server (NTRS)
1990-01-01
Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.
Security and Privacy in Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.
As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less
Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry
ERIC Educational Resources Information Center
Willey, Lorrie; White, Barbara Jo
2013-01-01
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Aviation security : vulnerabilities still exist in the aviation security system
DOT National Transportation Integrated Search
2000-04-06
The testimony today discusses the Federal Aviation Administration's (FAA) efforts to implement and improve security in two key areas: air traffic control computer systems and airport passenger screening checkpoints. Computer systems-and the informati...
76 FR 18445 - Financial Market Utilities
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-04
... IOSCO jointly issued a set of minimum standards for securities settlement systems (the ``Recommendations for Securities Settlement Systems''). In 2004, the CPSS and IOSCO jointly published recommendations...,'' and collectively with the Recommendations for Securities Settlement Systems, the ``CPSS-IOSCO...
A novel wireless local positioning system for airport (indoor) security
NASA Astrophysics Data System (ADS)
Zekavat, Seyed A.; Tong, Hui; Tan, Jindong
2004-09-01
A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of... titled, ``DHS/USCG-024 Auxiliary Database (AUXDATA) System of Records.'' The AUXDATA system is the USCG's...
Code of Federal Regulations, 2010 CFR
2010-01-01
... OPERATIONS Farm Credit System Financial Assistance Corporation Securities § 615.5560 Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities. (a) The Farm Credit System Financial... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry Procedure for Farm Credit System...
75 FR 28253 - Privacy Act of 1974; Notice of new System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-20
... certified by the National Computer Security Association. RETENTION AND DISPOSAL: System records are retained... Agency suspects or has confirmed that the security or confidentiality of information in the system of... security or integrity of this system or other systems or programs (whether maintained by GSA or another...
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
NASA Technical Reports Server (NTRS)
Powell, John D.; Gilliam, David
2004-01-01
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...
24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...
24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...
Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy
Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Security) maintained in the Book-entry System, as set forth in Federal Reserve Bank Operating Circulars. (b...: Book-entry Ginnie Mae Security. A Ginnie Mae Security issued or maintained in the Book-entry System... Reserve Banks. Book-entry System. The automated book-entry system operated by the Federal Reserve Banks...
33 CFR 104.260 - Security systems and equipment maintenance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated and maintained according to the manufacturer's recommendation. (b) The results...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halbgewachs, Ronald D.; Chavez, Adrian R.
Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Strait, R.S.; Wagner, E.E.
1994-07-01
The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less
Secure ADS-B authentication system and method
NASA Technical Reports Server (NTRS)
Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)
2010-01-01
A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and... information contained in those systems. Each system's level of security shall protect the integrity...
5 CFR 9701.314 - DHS responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.314 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.314 DHS...
5 CFR 9701.405 - Performance management system requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requirements. 9701.405 Section 9701.405 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.405 Performance...
NEW DEBRIS DISKS IN NEARBY YOUNG MOVING GROUPS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moór, A.; Kóspál, Á.; Ábrahám, P.
A significant fraction of nearby young moving group members harbor circumstellar debris dust disks. Due to their proximity and youth, these disks are attractive targets for studying the early evolution of debris dust and planetesimal belts. Here we present 70 and 160 μ m observations of 31 systems in the β Pic moving group, and in the Tucana–Horologium, Columba, Carina, and Argus associations, using the Herschel Space Observatory . None of these stars were observed at far-infrared wavelengths before. Our Herschel measurements were complemented by photometry from the WISE satellite for the whole sample, and by submillimeter/millimeter continuum data formore » one source, HD 48370. We identified six stars with infrared excess, four of them are new discoveries. By combining our new findings with results from the literature, we examined the incidence and general characteristics of debris disks around Sun-like members of the selected groups. With their dust temperatures of <45 K the newly identified disks around HD 38397, HD 48370, HD 160305, and BD-20 951 represent the coldest population within this sample. For HD 38397 and HD 48370, the emission is resolved in the 70 μ m Photodetector Array Camera and Spectrograph images, the estimated radius of these disks is ∼90 au. Together with the well-known disk around HD 61005, these three systems represent the highest mass end of the known debris disk population around young G-type members of the selected groups. In terms of dust content, they resemble the hypothesized debris disk of the ancient solar system.« less
Network systems security analysis
NASA Astrophysics Data System (ADS)
Yilmaz, Ä.°smail
2015-05-01
Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2011 CFR
2011-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
49 CFR 659.23 - System security plan: contents.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security...
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
13 CFR 102.33 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...
76 FR 21768 - Privacy Act of 1974; Consolidation of System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-18
... inventory of record systems titled, Department of Homeland Security/Directorate of Science and Technology... the existing Department of Homeland Security system of records notice titled, Department of Homeland Security/ALL--002 Mailing and Other Lists System, November 25, 2008. DATES: Effective Date: May 18, 2011...
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2013 CFR
2013-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2012 CFR
2012-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2014 CFR
2014-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2010 CFR
2010-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-23
... Federal agency for pipeline security, it is important for TSA to have contact information for company... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY...
33 CFR 127.305 - Operations Manual.
Code of Federal Regulations, 2010 CFR
2010-07-01
... security personnel; (e) A description of the security systems for the marine transfer area for LNG; (f) The...) Transfer operations start-up and shutdown; (3) Security violations; and (4) The communications systems; and... Section 127.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
DOT National Transportation Integrated Search
2001-09-20
A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true IT security requirements... security requirements. These IT security requirements cover all NASA contracts in which IT plays a role in...-63, Electronic Authentication Guideline) access to NASA's computer systems, networks, or IT...
From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication
NASA Astrophysics Data System (ADS)
Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San
Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.
Assessment on security system of radioactive sources used in hospitals of Thailand
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong
Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources usedmore » in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.« less
Information Security Management - Part Of The Integrated Management System
NASA Astrophysics Data System (ADS)
Manea, Constantin Adrian
2015-07-01
The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security
NASA Astrophysics Data System (ADS)
Feng, Nan; Wu, Harris; Li, Minqiang; Wu, Desheng; Chen, Fuzan; Tian, Jin
2016-09-01
Information sharing across organisations is critical to effectively managing the security risks of inter-organisational information systems. Nevertheless, few previous studies on information systems security have focused on inter-organisational information sharing, and none have studied the sharing of inferred beliefs versus factual observations. In this article, a multiagent collaborative model (MACM) is proposed as a practical solution to assess the risk level of each allied organisation's information system and support proactive security treatment by sharing beliefs on event probabilities as well as factual observations. In MACM, for each allied organisation's information system, we design four types of agents: inspection agent, analysis agent, control agent, and communication agent. By sharing soft findings (beliefs) in addition to hard findings (factual observations) among the organisations, each organisation's analysis agent is capable of dynamically predicting its security risk level using a Bayesian network. A real-world implementation illustrates how our model can be used to manage security risks in distributed information systems and that sharing soft findings leads to lower expected loss from security risks.
Ad-Hoc Networks and the Mobile Application Security System (MASS)
2006-01-01
solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems
Federal Security Laboratory Governance Panels: Observations and Recommendations
2013-01-01
operates under a sole-source, cost-plus-fixed-fee contract administered by the U.S. Navy’s Naval Sea Systems Command. There are currently 14 UARCs, 13... system of research organizations that support science and technology for U.S. national security. Within this system , the Departments of Defense, Energy...and Homeland Security support about 80 laboratories that focus predominantly on national security matters. These laboratories have different
26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon...
System security in the space flight operations center
NASA Technical Reports Server (NTRS)
Wagner, David A.
1988-01-01
The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.
20 CFR 404.1902 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... administration of a social security system including responsibility for implementing an agreement; the Social... coordination between the social security systems of the countries party to the agreement. The term agreement... system including applicable laws and international social security agreements; the Commissioner of Social...
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Approach to estimation of level of information security at enterprise based on genetic algorithm
NASA Astrophysics Data System (ADS)
V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.
2018-05-01
In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
Turning Access into a web-enabled secure information system for clinical trials.
Dongquan Chen; Chen, Wei-Bang; Soong, Mayhue; Soong, Seng-Jaw; Orthner, Helmuth F
2009-08-01
Organizations that have limited resources need to conduct clinical studies in a cost-effective, but secure way. Clinical data residing in various individual databases need to be easily accessed and secured. Although widely available, digital certification, encryption, and secure web server, have not been implemented as widely, partly due to a lack of understanding of needs and concerns over issues such as cost and difficulty in implementation. The objective of this study was to test the possibility of centralizing various databases and to demonstrate ways of offering an alternative to a large-scale comprehensive and costly commercial product, especially for simple phase I and II trials, with reasonable convenience and security. We report a working procedure to transform and develop a standalone Access database into a secure Web-based secure information system. For data collection and reporting purposes, we centralized several individual databases; developed, and tested a web-based secure server using self-issued digital certificates. The system lacks audit trails. The cost of development and maintenance may hinder its wide application. The clinical trial databases scattered in various departments of an institution could be centralized into a web-enabled secure information system. The limitations such as the lack of a calendar and audit trail can be partially addressed with additional programming. The centralized Web system may provide an alternative to a comprehensive clinical trial management system.
Evaluation of a Cyber Security System for Hospital Network.
Faysel, Mohammad A
2015-01-01
Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.
Prototype system of secure VOD
NASA Astrophysics Data System (ADS)
Minemura, Harumi; Yamaguchi, Tomohisa
1997-12-01
Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.
12 CFR 615.5450 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5450... the claimant for another person to hold, transfer, or deal with the security. (b) Book-entry security means a Farm Credit security issued or maintained in the Book-entry System. (c) Book-entry System means...
17 CFR 242.301 - Requirements for alternative trading systems.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...
17 CFR 242.301 - Requirements for alternative trading systems.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...
17 CFR 242.301 - Requirements for alternative trading systems.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...
17 CFR 242.301 - Requirements for alternative trading systems.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Requirements for alternative trading systems. 242.301 Section 242.301 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY...
Teaching RFID Information Systems Security
ERIC Educational Resources Information Center
Thompson, Dale R.; Di, Jia; Daugherty, Michael K.
2014-01-01
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Jiang, Dong-Neng; Li, Jian-Tao; Tao, Ya-Xiong; Chen, Hua-Pu; Deng, Si-Ping; Zhu, Chun-Hua; Li, Guang-Li
2017-05-01
Melanocortin-4 receptor (Mc4r) function related to reproduction in fish has not been extensively investigated. Here, we report on gene expression changes by real-time PCR following treatment with Mc4r agonists and antagonists in the spotted scat (Scatophagus argus). Using in vitro incubated hypothalamus, the Mc4r nonselective agonist NDP-MSH ([Nle 4 , D-Phe 7 ]-α-melanocyte stimulating hormone; 10 -6 M) and selective agonist THIQ (N-[(3R)-1, 2, 3, 4-Tetrahydroisoquinolinium-3-ylcarbonyl]- (1R)-1-(4-chlorobenzyl)-2-[4-cyclohexyl-4-(1H-1,2,4-triazol-1-ylmethyl) piperidin-1-yl]-2-oxoethylamine; 10 -7 M) significantly increased the expression of gnrh (Gonadotropin releasing hormone), while the Mc4r nonselective antagonist SHU9119 (Ac-Nle-[Asp-His-DPhe/DNal(2')-Arg-Trp-Lys]-NH2; 10 -6 M) and selective antagonist Ipsen 5i (compound 5i synthesized in Ipsen Research Laboratories; 10 -6 M) significantly inhibited gnrh expression after 3 h of incubation. In incubated pituitary tissue, NDP-MSH and THIQ significantly increased the expression of fshb (Follicle-stimulating hormone beta subunit) and lhb (Luteinizing hormone beta subunit), while SHU9119 and Ipsen 5i significantly decreased fshb and lhb expression after 3 h of incubation. During the in vivo experiment, THIQ (1 mg/kg bw) significantly increased gnrh expression in hypothalamic tissue, as well as the fshb and lhb expression in pituitary tissue 12 h after abdominal injection. Furthermore, Ipsen 5i (1 mg/kg bw) significantly inhibited gnrh expression in hypothalamic tissue, as well as fshb and lhb gene expression in pituitary tissue 12 h after abdominal injection. In summary, Mc4r singling appears to stimulate gnrh expression in the hypothalamus, thereby modulating the synthesis of Fsh and Lh in the pituitary. In addition, Mc4r also appears to directly regulate fshb and lhb levels in the pituitary in spotted scat. Our study suggests that Mc4r, through the hypothalamus and pituitary, participates in reproductive regulation in fish.
Lopeztegui Castillo, Alexander; Capetillo Piñar, Norberto; Betanzos Vega, Abel
2012-03-01
Nutritional condition can affect survival and growth rate of crustaceans, and this is mostly affected by habitat conditions. This study describes the space-temporary nutritional changes in this commercially important species. With this aim, the variations in the nutritional condition (K) of lobsters from four zones (1, 2, 4 and 5) in the Gulf of Batabanó, Cuba, were determined. For this, the weight/length ratio (K=Pt/Lt) was calculated using animals captured in 1981 and 2010. The nutritional condition between areas and sexes, and years and sexes, was contrasted by a bifactorial ANOVA, and the overall length and weight of lobsters were compared using a t-Test for independent samples and unifactorial ANOVA. It was found that the nutritional condition was significantly greater in males than in females. In addition, significant variations between zones were detected for both years. Nutritional condition of lobsters from Zone five was the highest for 1981, while it was Zone two for 2010. Lobsters nutritional state showed significant variations between years, being greater in 1981 (2.34 +/- 0.84g/mm) than in 2010 (1.96 +/- 0.49g/mm). The inter-zones variations as well as the inter-annual ones seem to be related to the reported variations of the bottom type and the vegetation cover. Seasonal variations in the abundance and distribution of benthic organisms, that constitute food for lobsters, could also be influencing. The differences between sexes, however, were assumed as a consequence of the methodology used and the sexual dimorphism of the species. Due to other K estimation methods, that do not include morphometric measurements, these differences were not detected. We suggested that the P. argus nutritional condition is a good estimator of the habitat condition. Besides, according to the applied K estimation methodology, it was found that different groups of lobsters that have resemblant nutritional condition, did not necessarily observe similarities in the overall mean length or weight, so they could exist under different habitat conditions.
2011-01-01
Background The Coral Triangle (CT), bounded by the Philippines, the Malay Peninsula, and New Guinea, is the epicenter of marine biodiversity. Hypotheses that explain the source of this rich biodiversity include 1) the center of origin, 2) the center of accumulation, and 3) the region of overlap. Here we contribute to the debate with a phylogeographic survey of a widely distributed reef fish, the Peacock Grouper (Cephalopholis argus; Epinephelidae) at 21 locations (N = 550) using DNA sequence data from mtDNA cytochrome b and two nuclear introns (gonadotropin-releasing hormone and S7 ribosomal protein). Results Population structure was significant (ΦST = 0.297, P < 0.001; FST = 0.078, P < 0.001; FST = 0.099, P < 0.001 for the three loci, respectively) among five regions: French Polynesia, the central-west Pacific (Line Islands to northeastern Australia), Indo-Pacific boundary (Bali and Rowley Shoals), eastern Indian Ocean (Cocos/Keeling and Christmas Island), and western Indian Ocean (Diego Garcia, Oman, and Seychelles). A strong signal of isolation by distance was detected in both mtDNA (r = 0.749, P = 0.001) and the combined nuclear loci (r = 0.715, P < 0.001). We detected evidence of population expansion with migration toward the CT. Two clusters of haplotypes were detected in the mtDNA data (d = 0.008), corresponding to the Pacific and Indian Oceans, with a low level of introgression observed outside a mixing zone at the Pacific-Indian boundary. Conclusions We conclude that the Indo-Pacific Barrier, operating during low sea level associated with glaciation, defines the primary phylogeographic pattern in this species. These data support a scenario of isolation on the scale of 105 year glacial cycles, followed by population expansion toward the CT, and overlap of divergent lineages at the Pacific-Indian boundary. This pattern of isolation, divergence, and subsequent overlap likely contributes to species richness at the adjacent CT and is consistent with the region of overlap hypothesis. PMID:21722383
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
2015-11-01
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
Performance of an optical identification and interrogation system
NASA Astrophysics Data System (ADS)
Venugopalan, A.; Ghosh, A. K.; Verma, P.; Cheng, S.
2008-04-01
A free space optics based identification and interrogation system has been designed. The applications of the proposed system lie primarily in areas which require a secure means of mutual identification and information exchange between optical readers and tags. Conventional RFIDs raise issues regarding security threats, electromagnetic interference and health safety. The security of RF-ID chips is low due to the wide spatial spread of radio waves. Malicious nodes can read data being transmitted on the network, if they are in the receiving range. The proposed system provides an alternative which utilizes the narrow paraxial beams of lasers and an RSA-based authentication scheme. These provide enhanced security to communication between a tag and the base station or reader. The optical reader can also perform remote identification and the tag can be read from a far off distance, given line of sight. The free space optical identification and interrogation system can be used for inventory management, security systems at airports, port security, communication with high security systems, etc. to name a few. The proposed system was implemented with low-cost, off-the-shelf components and its performance in terms of throughput and bit error rate has been measured and analyzed. The range of operation with a bit-error-rate lower than 10-9 was measured to be about 4.5 m. The security of the system is based on the strengths of the RSA encryption scheme implemented using more than 1024 bits.
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
Brock, Gordon; Gurekas, Vydas; Gelinas, Anne-Fredrique; Rollin, Karina
2009-01-01
Little has been published on the management of psychiatric crises in rural areas, and little is known of the security needs or use of "secure rooms" in rural hospitals. We conducted a 3-year retrospective chart audit on the use of our secure room/security guard system at a rural hospital in a town of 3500, located 220 km from our psychiatric referral centre. Use of our secure room/security guard system occurred at the rate of 1.1 uses/1000 emergency department visits, with the most common indication being physician perception of risk of patient suicide or self-harm. Concern for staff safety was a factor in 10% of uses. Eighty percent of patients were treated locally, with most being released from the secure room after 2 days or less. Fourteen percent of patients required ultimate transfer to our psychiatric referral centre and 6% to a detoxification centre. The average annual cost of security was $16 259.61. A secure room can provide the opportunity for close observation of a potentially self-harming patient, additional security for staff and early warning if a patient flees the hospital. Most admissions were handled locally, obviating the need for transfer to distant psychiatric referral centres. Most patients who were admitted were already known as having a psychiatric illness and 80% of the patients required the use of the secure room/security guard system for less than a 2-night stay, suggesting that most rural mental health crises pass quickly. Most patients admitted to a rural hospital with a mental health crisis can be managed locally if an adequate secure room/security guard system is available.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
39 CFR 501.7 - Postage Evidencing System requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Performance Criteria for Information-Based Indicia and Security Architecture for Open IBI Postage Evidencing Systems or Performance Criteria for Information-Based Indicia and Security Architecture for Closed IBI... Information-Based Indicia and Security Architecture for Open IBI Postage Evidencing Systems or Performance...
39 CFR 501.7 - Postage Evidencing System requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Performance Criteria for Information-Based Indicia and Security Architecture for Open IBI Postage Evidencing Systems or Performance Criteria for Information-Based Indicia and Security Architecture for Closed IBI... Information-Based Indicia and Security Architecture for Open IBI Postage Evidencing Systems or Performance...
5 CFR 9701.313 - Homeland Security Compensation Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... Undersecretary for Management. The Compensation Committee has 14 members, including 4 officials of labor...
76 FR 81359 - National Security Personnel System
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization...
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
Distributed intrusion detection system based on grid security model
NASA Astrophysics Data System (ADS)
Su, Jie; Liu, Yahui
2008-03-01
Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.
Integrated secure solution for electronic healthcare records sharing
NASA Astrophysics Data System (ADS)
Yao, Yehong; Zhang, Chenghao; Sun, Jianyong; Jin, Jin; Zhang, Jianguo
2007-03-01
The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.
Security Frameworks for Machine-to-Machine Devices and Networks
NASA Astrophysics Data System (ADS)
Demblewski, Michael
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
Participation in the ARGUS experiment at the DORIS collider at DESY, Hamburg, Germany
DOE Office of Scientific and Technical Information (OSTI.GOV)
Darden, C.
1986-03-27
Progress reported for 1985 includes publishing final results for investigation of F mesons. Particle decays were sought including a gamma line at 9.46 GeV. One such decay was Upsilon(1S)..--> gamma..H/sup 0/. A search for fractionally charged particles is reported. The muon pair branching ratio was determined for decays of the Upsilon(2S). Six anti-deuterons were seen in a data sample of over 720,000 electron-positron annihilation events. A clear D/sup 0/ signal was seen in the K/sup +/K/sup -/ channel. Results were obtained for the radiative transitions from the Upsilon(2S) to the 1/sup 3/P states of the banti-b system. Fifteen events weremore » also seen which were interpreted to be the color suppressed decay of a B meson to J/psi. A new upper limit was set for the mass of the tau neutrino. A CAMAC booster was used to reduce dead time in the experiment. New preamplifiers raised the vertex drift chambers enough above the electromagnetic noise of the storage ring that it was no longer a problem. The performance of the inner compensation coils, storage ring, and main drift chamber are reported, as well as the time of flight, shower, and muon counters. (LEW)« less
Que, Ting-zhi; Zhao, Shu-min; Li, Cheng-tao
2010-08-01
Determination strategies for half sibling sharing a same mother were investigated through the detection of autosomal and X-chromosomal STR (X-STR) loci and polymorphisms on hypervariable (HV) region of mitochondrial DNA (mtDNA). Genomic DNA were extracted from blood stain samples of the 3 full siblings and one dubious half sibling sharing the same mother with them. Fifteen autosomal STR loci were genotyped by Sinofiler kit, and 19 X-STR loci were genotyped by Mentype Argus X-8 kit and 16 plex in-house system. Polymorphisms of mtDNA HV-I and HV-II were also detected with sequencing technology. Full sibling relationship between the dubious half sibling and each of the 3 full siblings were excluded based on the results of autosomal STR genotyping and calculation of full sibling index (FSI) and half sibling index (HIS). Results of sequencing for mtDNA HV-I and HV-II showed that all of the 4 samples came from a same maternal line. X-STR genotyping results determined that the dubious half sibling shared a same mother with the 3 full siblings. It is reliable to combine three different genotyping technologies including autosomal STR, X-STR and sequencing of mtDNA HV-I and HV-II for determination of half sibling sharing a same mother.
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
The Use of Electronic Book Theft Detection Systems in Libraries.
ERIC Educational Resources Information Center
Witt, Thomas B.
1996-01-01
Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
Security Systems Commissioning: An Old Trick for Your New Dog
ERIC Educational Resources Information Center
Black, James R.
2009-01-01
Sophisticated, software-based security systems can provide powerful tools to support campus security. By nature, such systems are flexible, with many capabilities that can help manage the process of physical protection. However, the full potential of these systems can be overlooked because of unfamiliarity with the products, weaknesses in security…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-02
... proceeding were required to file system security statements under the Commission's rules. (Security systems..., including broadband Internet access and interconnected VoIP providers, must file updates to their systems... Commission's rules, the information in the CALEA security system filings and petitions will not be made...
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Security Management Strategies for Protecting Your Library's Network.
ERIC Educational Resources Information Center
Ives, David J.
1996-01-01
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
76 FR 3098 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
...: National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800..., Privacy Act and Mandatory Declassification Review Records. System Location: National Security Agency... Information Act; 5 U.S.C. 552a, The Privacy Act of 1974 (as amended); E.O. 13526, Classified National Security...
Examining the Relationship between Organization Systems and Information Security Awareness
ERIC Educational Resources Information Center
Tintamusik, Yanarong
2010-01-01
The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...
Computer simulation of functioning of elements of security systems
NASA Astrophysics Data System (ADS)
Godovykh, A. V.; Stepanov, B. P.; Sheveleva, A. A.
2017-01-01
The article is devoted to issues of development of the informational complex for simulation of functioning of the security system elements. The complex is described from the point of view of main objectives, a design concept and an interrelation of main elements. The proposed conception of the computer simulation provides an opportunity to simulate processes of security system work for training security staff during normal and emergency operation.
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
5 CFR 9701.526 - Continuation of existing laws, recognitions, agreements, and procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations...
An exploratory risk perception study of attitudes toward homeland security systems.
Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic
2008-08-01
Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.
Development of a telediagnosis endoscopy system over secure internet.
Ohashi, K; Sakamoto, N; Watanabe, M; Mizushima, H; Tanaka, H
2008-01-01
We developed a new telediagnosis system to securely transmit high-quality endoscopic moving images over the Internet in real time. This system would enable collaboration between physicians seeking advice from endoscopists separated by long distances, to facilitate diagnosis. We adapted a new type of digital video streaming system (DVTS) to our teleendoscopic diagnosis system. To investigate its feasibility, we conducted a two-step experiment. A basic experiment was first conducted to transmit endoscopic video images between hospitals using a plain DVTS. After investigating the practical usability, we incorporated a secure and reliable communication function into the system, by equipping DVTS with "TCP2", a new security technology that establishes secure communication in the transport layer. The second experiment involved international transmission of teleendoscopic image between Hawaii and Japan using the improved system. In both the experiments, no serious transmission delay was observed to disturb physicians' communications and, after subjective evaluation by endoscopists, the diagnostic qualities of the images were found to be adequate. Moreover, the second experiment showed that "TCP2-equipped DVTS" successfully executed high-quality secure image transmission over a long distance network. We conclude that DVTS technology would be promising for teleendoscopic diagnosis. It was also shown that a high quality, secure teleendoscopic diagnosis system can be developed by equipping DVTS with TCP2.
The research of network database security technology based on web service
NASA Astrophysics Data System (ADS)
Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin
2013-03-01
Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Mangum, Kevin
2016-01-01
The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
75 FR 57740 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-22
... Committee on Oversight and Government Reform, the Senate Committee on Homeland Security and Governmental... OSD Federal Register Liaison Officer, Department of Defense. K890.13 System Name: Security Container... Security Officer, Headquarters, Defense Information Systems Agency-Europe, APO AE 09131-4103. Headquarters...
5 CFR 9701.313 - Homeland Security Compensation Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... to provide options and/or recommendations for consideration by the Secretary or designee on strategic...
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa
2018-03-01
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
33 CFR 104.405 - Format of the Vessel Security Plan (VSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of the...
Sustainable Food Security Measurement: A Systemic Methodology
NASA Astrophysics Data System (ADS)
Findiastuti, W.; Singgih, M. L.; Anityasari, M.
2017-04-01
Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.
Immune Inspired Security Approach for Manets: a Case Study
NASA Astrophysics Data System (ADS)
Mohamed, Yasir Abdelgadir
2011-06-01
This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.
A Security Architecture for Grid-enabling OGC Web Services
NASA Astrophysics Data System (ADS)
Angelini, Valerio; Petronzio, Luca
2010-05-01
In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.
1998-03-01
traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information
2008-03-01
executables. The current roadblock to detecting Type I Malware consistantly is the practice of legitimate software , such as antivirus programs, using this... Software Security Systems . . 31 3.2.2 Advantages of Hardware . . . . . . . . . . . . . 32 3.2.3 Trustworthiness of Information . . . . . . . . . 33...Towards a Hardware Security Backplane . . . . . . . . . 42 IV. Review of State of the Art Computer Security Solutions . . . . . 46 4.1 Software
Design and implementation of modular home security system with short messaging system
NASA Astrophysics Data System (ADS)
Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad
2014-03-01
Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.
Transit Security Procedures Guide
DOT National Transportation Integrated Search
1994-12-01
To protect passenger, employees, revenue, and property, transit systems are encouraged to take a proactive, prevention-oriented systems approach to transit security. This guide is a compilation of materials for planning and improving transit security...
5 CFR 9701.334 - Setting and adjusting locality and special rate supplements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Locality and...
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Digital security technology simplified.
Scaglione, Bernard J
2007-01-01
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald
2013-01-01
Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).
HOW TO SELECT THE PROPER SECURITY AND EQUIPMENT SURVEILLANCE SYSTEMS TO PROTECT YOUR FACILITIES.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
IN PRESENTING A SURVEY OF MODERN SECURITY SYSTEMS, THIS BOOKLET DISCUSSES THE REQUIREMENTS FOR SURVEILLANCE AND PROTECTION OF AREAS, PERIMETER, AND OBJECTS. A VARIETY OF EQUIPMENT IS DESCRIBED WITH DISCUSSION OF OPERATING PROCEDURES, COSTS, AND RECENT DEVELOPMENTS IN SECURITY SYSTEMS. (JT)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... 1974; Department of Homeland Security/ALL--017 General Legal Records System of Records AGENCY: Privacy... of records notice titled, ``Department of Homeland Security/ ALL--017 General Legal Records System of Records.'' This system will assist attorneys in providing legal advice to the Department of Homeland...
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
NASA Astrophysics Data System (ADS)
Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng
2016-06-01
Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.
COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES
2017-04-06
Today, one such weakness is the seams that exist in the system . Organizational criteria like geography , functions, and responsibilities often create...establishment by the National Security Act of 1947, the modern U.S. national security system has evolved as a result of legislation, presidential preference...and because of changes in the U.S. and international security environments. With each evolution, the system has found ways to function in dealing
2010-06-01
62 1. KPP 1: High Performing Workplace and Environment................65 a. Attribute 1. System...source for employee values and actions. The stereotypical value of the federal government employee, especially under the GS system, was job security...most directly met by this model is job security. This job security is often stereotyped by the saying; you cannot fire a government employee
NASA Astrophysics Data System (ADS)
Nair, Nirmal-Kumar
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
Security for IP Multimedia Services in the 3GPP Third Generation Mobile System.
ERIC Educational Resources Information Center
Horn, G.; Kroselberg, D.; Muller, K.
2003-01-01
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Code of Federal Regulations, 2010 CFR
2010-10-01
... disclosure or destruction of manual and automatic record systems. These security safeguards shall apply to... use of records contained in a system of records are adequately trained to protect the security and... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Recordkeeping and reporting requirements relating to broker-dealer trading systems. 240.17a-23 Section 240.17a-23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Recordkeeping and reporting requirements relating to broker-dealer trading systems. 240.17a-23 Section 240.17a-23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Recordkeeping and reporting requirements relating to broker-dealer trading systems. 240.17a-23 Section 240.17a-23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Recordkeeping and reporting requirements relating to broker-dealer trading systems. 240.17a-23 Section 240.17a-23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE...
Disaster at a University: A Case Study in Information Security
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Tyks, Jonathan
2012-01-01
Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…
A novel and lightweight system to secure wireless medical sensor networks.
He, Daojing; Chan, Sammy; Tang, Shaohua
2014-01-01
Wireless medical sensor networks (MSNs) are a key enabling technology in e-healthcare that allows the data of a patient's vital body parameters to be collected by the wearable or implantable biosensors. However, the security and privacy protection of the collected data is a major unsolved issue, with challenges coming from the stringent resource constraints of MSN devices, and the high demand for both security/privacy and practicality. In this paper, we propose a lightweight and secure system for MSNs. The system employs hash-chain based key updating mechanism and proxy-protected signature technique to achieve efficient secure transmission and fine-grained data access control. Furthermore, we extend the system to provide backward secrecy and privacy preservation. Our system only requires symmetric-key encryption/decryption and hash operations and is thus suitable for the low-power sensor nodes. This paper also reports the experimental results of the proposed system in a network of resource-limited motes and laptop PCs, which show its efficiency in practice. To the best of our knowledge, this is the first secure data transmission and access control system for MSNs until now.