Ramirez, Magaly; Wu, Shinyi; Jin, Haomiao; Ell, Kathleen; Gross-Schulman, Sandra; Myerchin Sklaroff, Laura; Guterman, Jeffrey
2016-01-25
Remote patient monitoring is increasingly integrated into health care delivery to expand access and increase effectiveness. Automation can add efficiency to remote monitoring, but patient acceptance of automated tools is critical for success. From 2010 to 2013, the Diabetes-Depression Care-management Adoption Trial (DCAT)-a quasi-experimental comparative effectiveness research trial aimed at accelerating the adoption of collaborative depression care in a safety-net health care system-tested a fully automated telephonic assessment (ATA) depression monitoring system serving low-income patients with diabetes. The aim of this study was to determine patient acceptance of ATA calls over time, and to identify factors predicting long-term patient acceptance of ATA calls. We conducted two analyses using data from the DCAT technology-facilitated care arm, in which for 12 months the ATA system periodically assessed depression symptoms, monitored treatment adherence, prompted self-care behaviors, and inquired about patients' needs for provider contact. Patients received assessments at 6, 12, and 18 months using Likert-scale measures of willingness to use ATA calls, preferred mode of reach, perceived ease of use, usefulness, nonintrusiveness, privacy/security, and long-term usefulness. For the first analysis (patient acceptance over time), we computed descriptive statistics of these measures. In the second analysis (predictive factors), we collapsed patients into two groups: those reporting "high" versus "low" willingness to use ATA calls. To compare them, we used independent t tests for continuous variables and Pearson chi-square tests for categorical variables. Next, we jointly entered independent factors found to be significantly associated with 18-month willingness to use ATA calls at the univariate level into a logistic regression model with backward selection to identify predictive factors. We performed a final logistic regression model with the identified significant predictive factors and reported the odds ratio estimates and 95% confidence intervals. At 6 and 12 months, respectively, 89.6% (69/77) and 63.7% (49/77) of patients "agreed" or "strongly agreed" that they would be willing to use ATA calls in the future. At 18 months, 51.0% (64/125) of patients perceived ATA calls as useful and 59.7% (46/77) were willing to use the technology. Moreover, in the first 6 months, most patients reported that ATA calls felt private/secure (75.9%, 82/108) and were easy to use (86.2%, 94/109), useful (65.1%, 71/109), and nonintrusive (87.2%, 95/109). Perceived usefulness, however, decreased to 54.1% (59/109) in the second 6 months of the trial. Factors predicting willingness to use ATA calls at the 18-month follow-up were perceived privacy/security and long-term perceived usefulness of ATA calls. No patient characteristics were significant predictors of long-term acceptance. In the short term, patients are generally accepting of ATA calls for depression monitoring, with ATA call design and the care management intervention being primary factors influencing patient acceptance. Acceptance over the long term requires that the system be perceived as private/secure, and that it be constantly useful for patients' needs of awareness of feelings, self-care reminders, and connectivity with health care providers. ClinicalTrials.gov NCT01781013; https://clinicaltrials.gov/ct2/show/NCT01781013 (Archived by WebCite at http://www.webcitation.org/6e7NGku56).
Ramirez, Magaly; Jin, Haomiao; Ell, Kathleen; Gross-Schulman, Sandra; Myerchin Sklaroff, Laura; Guterman, Jeffrey
2016-01-01
Background Remote patient monitoring is increasingly integrated into health care delivery to expand access and increase effectiveness. Automation can add efficiency to remote monitoring, but patient acceptance of automated tools is critical for success. From 2010 to 2013, the Diabetes-Depression Care-management Adoption Trial (DCAT)–a quasi-experimental comparative effectiveness research trial aimed at accelerating the adoption of collaborative depression care in a safety-net health care system–tested a fully automated telephonic assessment (ATA) depression monitoring system serving low-income patients with diabetes. Objective The aim of this study was to determine patient acceptance of ATA calls over time, and to identify factors predicting long-term patient acceptance of ATA calls. Methods We conducted two analyses using data from the DCAT technology-facilitated care arm, in which for 12 months the ATA system periodically assessed depression symptoms, monitored treatment adherence, prompted self-care behaviors, and inquired about patients’ needs for provider contact. Patients received assessments at 6, 12, and 18 months using Likert-scale measures of willingness to use ATA calls, preferred mode of reach, perceived ease of use, usefulness, nonintrusiveness, privacy/security, and long-term usefulness. For the first analysis (patient acceptance over time), we computed descriptive statistics of these measures. In the second analysis (predictive factors), we collapsed patients into two groups: those reporting “high” versus “low” willingness to use ATA calls. To compare them, we used independent t tests for continuous variables and Pearson chi-square tests for categorical variables. Next, we jointly entered independent factors found to be significantly associated with 18-month willingness to use ATA calls at the univariate level into a logistic regression model with backward selection to identify predictive factors. We performed a final logistic regression model with the identified significant predictive factors and reported the odds ratio estimates and 95% confidence intervals. Results At 6 and 12 months, respectively, 89.6% (69/77) and 63.7% (49/77) of patients “agreed” or “strongly agreed” that they would be willing to use ATA calls in the future. At 18 months, 51.0% (64/125) of patients perceived ATA calls as useful and 59.7% (46/77) were willing to use the technology. Moreover, in the first 6 months, most patients reported that ATA calls felt private/secure (75.9%, 82/108) and were easy to use (86.2%, 94/109), useful (65.1%, 71/109), and nonintrusive (87.2%, 95/109). Perceived usefulness, however, decreased to 54.1% (59/109) in the second 6 months of the trial. Factors predicting willingness to use ATA calls at the 18-month follow-up were perceived privacy/security and long-term perceived usefulness of ATA calls. No patient characteristics were significant predictors of long-term acceptance. Conclusions In the short term, patients are generally accepting of ATA calls for depression monitoring, with ATA call design and the care management intervention being primary factors influencing patient acceptance. Acceptance over the long term requires that the system be perceived as private/secure, and that it be constantly useful for patients’ needs of awareness of feelings, self-care reminders, and connectivity with health care providers. Trial Registration ClinicalTrials.gov NCT01781013; https://clinicaltrials.gov/ct2/show/NCT01781013 (Archived by WebCite at http://www.webcitation.org/6e7NGku56) PMID:26810139
19 CFR 114.23 - Maximum period.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Maximum period. 114.23 Section 114.23 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARNETS Processing of Carnets § 114.23 Maximum period. (a) A.T.A. carnet. No A.T.A. carnet with a period...
76 FR 72495 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
...-0318] Alabama Metal Coil Securement Act; Petition for Determination of Preemption AGENCY: Federal Motor... the American Trucking Associations (ATA) requesting a determination that the State of Alabama's Metal..., Alabama's metal coil load securement certification requirements may have on interstate commerce. DATES...
Security Strategy of the Bureau of Diplomatic Security.
2011-06-10
Williams, M.A. , Member John A. Dyson, MBA , Member Gregory Scott Hospodor, Ph.D Accepted this 10th day of June 2011 by...ACRONYMS AAR After Action Review ASOS Advance Security Overseas Seminar ATA Antiterrorism Assistance Program BRSO Regional Security Officer Course ...BSAC Basic Special Agent Course DS Bureau of Diplomatic Security FACT Foreign Affairs Counter Threat FAH Foreign Affairs Handbook FAM Foreign
Fujioka, Toru; Takiguchi, Shinichiro; Yatsuga, Chiho; Hiratani, Michio; Hong, Kang-E M; Shin, Min-Sup; Cho, Sungzoon; Kosaka, Hirotaka; Tomoda, Akemi
2016-01-01
Objective This study was conducted to validate the Advanced Test of Attention (ATA) of the visual attention version of Japanese children with attention deficit/hyperactivity disorder (ADHD) and to evaluate the efficacy of methylphenidate (OROS-MPH) and atomoxetine medications. Methods To assess pharmacotherapy efficacy, the visual version of ATA was administered to 42 children with ADHD. Results were assessed using discriminant analysis, ANOVA for indices of ATA before and after medication treatment, and correlation analysis between the improvement of indices of ATA and clinical symptoms during medication treatment. Results Discriminant analysis showed that 69.0% of ADHD children were assigned correctly. The T score of commission errors increased as the trial progressed on the medication-off condition. T scores of commission errors and standard deviation of response times on medication-on condition were low compared to the medication-off condition. A few significant correlations were found between the improvements of indices of ATA and ADHD-Rating Scale (RS) during treatment. Conclusion The performance of the visual version of ATA on medication-off condition reflected the features of ADHD. Furthermore, the medication treatment effects were confirmed sufficiently. In addition, results suggest that indices of ATA reflected aspects of ADHD symptoms that are difficult to elucidate for ADHD-RS. For assessing symptoms and effects of medical treatment in children with ADHD, ATA might be a useful assessment tool. PMID:26792044
Castagna, Maria Grazia; Maino, Fabio; Cipri, Claudia; Belardini, Valentina; Theodoropoulou, Alexandra; Cevenini, Gabriele; Pacini, Furio
2011-09-01
After initial treatment, differentiated thyroid cancer (DTC) patients are stratified as low and high risk based on clinical/pathological features. Recently, a risk stratification based on additional clinical data accumulated during follow-up has been proposed. To evaluate the predictive value of delayed risk stratification (DRS) obtained at the time of the first diagnostic control (8-12 months after initial treatment). We reviewed 512 patients with DTC whose risk assessment was initially defined according to the American (ATA) and European Thyroid Association (ETA) guidelines. At the time of the first control, 8-12 months after initial treatment, patients were re-stratified according to their clinical status: DRS. Using DRS, about 50% of ATA/ETA intermediate/high-risk patients moved to DRS low-risk category, while about 10% of ATA/ETA low-risk patients moved to DRS high-risk category. The ability of the DRS to predict the final outcome was superior to that of ATA and ETA. Positive and negative predictive values for both ATA (39.2 and 90.6% respectively) and ETA (38.4 and 91.3% respectively) were significantly lower than that observed with the DRS (72.8 and 96.3% respectively, P<0.05). The observed variance in predicting final outcome was 25.4% for ATA, 19.1% for ETA, and 62.1% for DRS. Delaying the risk stratification of DTC patients at a time when the response to surgery and radioiodine ablation is evident allows to better define individual risk and to better modulate the subsequent follow-up.
Thunes, James R.; Pal, Siladitya; Fortunato, Ronald N.; Phillippi, Julie A.; Gleason, Thomas G.; Vorp, David A.; Maiti, Spandan
2016-01-01
Incorporation of collagen structural information into the study of biomechanical behavior of ascending thoracic aortic (ATA) wall tissue should provide better insight into the pathophysiology of ATA. Structurally motivated constitutive models that include fiber dispersion and recruitment can successfully capture overall mechanical response of the arterial wall tissue. However, these models cannot examine local microarchitectural features of the collagen network, such as the effect of fiber disruptions and interaction between fibrous and non-fibrous components, which may influence emergent biomechanical properties of the tissue. Motivated by this need, we developed a finite element based three-dimensional structural model of the lamellar units of the ATA media that directly incorporates the collagen fiber microarchitecture. The fiber architecture was computer generated utilizing network features, namely fiber orientation distribution, intersection density and areal concentration, obtained from image analysis of multiphoton microscopy images taken from human aneurysmal ascending thoracic aortic media specimens with bicuspid aortic valve (BAV) phenotype. Our model reproduces the typical J-shaped constitutive response of the aortic wall tissue. We found that the stress state in the non-fibrous matrix was homogeneous until the collagen fibers were recruited, but became highly heterogeneous after that event. The degree of heterogeneity was dependent upon local network architecture with high stresses observed near disrupted fibers. The magnitude of non-fibrous matrix stress at higher stretch levels was negatively correlated with local fiber density. The localized stress concentrations, elucidated by this model, may be a factor in the degenerative changes in aneurysmal ATA tissue. PMID:27113538
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... effective through November 15, 2013. DATES: Submission of Nominations: We will consider nominations if they... (local) for additional information. News Media: Representatives should contact the CMS Press Office at...)(A) of the Social Security Act (the Act), and section 222 of the Public Health Service Act (PHS Act...
NASA Technical Reports Server (NTRS)
Ricks, Glen A.
1988-01-01
The assembly test article (ATA) consisted of two live loaded redesigned solid rocket motor (RSRM) segments which were assembled and disassembled to simulate the actual flight segment stacking process. The test assembly joint was flight RSRM design, which included the J-joint insulation design and metal capture feature. The ATA test was performed mid-November through 24 December 1987, at Kennedy Space Center (KSC), Florida. The purpose of the test was: certification that vertical RSRM segment mating and separation could be accomplished without any damage; verification and modification of the procedures in the segment stacking/destacking documents; and certification of various GSE to be used for flight assembly and inspection. The RSRM vertical segment assembly/disassembly is possible without any damage to the insulation, metal parts, or seals. The insulation J-joint contact area was very close to the predicted values. Numerous deviations and changes to the planning documents were made to ensure the flight segments are effectively and correctly stacked. Various GSE were also certified for use on flight segments, and are discussed in detail.
Iniesta Arandia, Nerea; Simeón-Aznar, Carmen Pilar; Guillén Del Castillo, Alfredo; Colunga Argüelles, Dolores; Rubio-Rivas, Manuel; Trapiella Martínez, Luis; García Hernández, Francisco José; Sáez Comet, Luis; Egurbide Arberas, María Victoria; Ortego-Centeno, Norberto; Freire, Mayka; Marí Alfonso, Begoña; Vargas Hitos, José Antonio; Ríos Blanco, Juan José; Todolí Parra, José Antonio; Rodríguez-Carballeira, Monica; Marín Ballvé, Adela; Chamorro Fernández, Antonio Javier; Pla Salas, Xavier; Madroñero Vuelta, Ana Belen; Ruiz Muñoz, Manuel; Fonollosa Pla, Vicent; Espinosa, Gerard
2017-01-01
To assess the clinical manifestations and prognosis of Spanish patients with systemic sclerosis (SSc) according to their immunological profile. From the Spanish Scleroderma Study Group or RESCLE (Registro de ESCLErodermia as Spanish nomenclature) Registry we selected those patients in which anti-centromere (ACA), anti-topoisomerase I (ATA), and anti-RNA polymerase III (ARA) antibodies had been determined, and a single positivity for each SSc specific antibody was detected. Demographic, clinical, laboratory, and survival data were compared according to the serologic status of these antibodies. Overall, 209 SSc patients were included. In 128 (61%) patients ACA was the only positive antibody, 46 (22%) were only positive for ATA, and 35 (17%) for ARA. Of note, the three groups were mutually exclusive. In univariate analysis, patients with ACA presented more frequently limited cutaneous SSc (lcSSc) (p<0.001), whereas diffuse cutaneous SSc (dcSSc) was the most frequent subtype in patients with ATA (54%) and ARA (62%) (both p<0.001). Positive patients for ARA showed the highest prevalence of joint involvement (p<0.001) and those from ATA group had a higher prevalence of interstitial lung disease (ILD) (p<0.001). Scleroderma renal crisis was more frequent in the ARA group (p<0.001). In multivariate analysis, ACA were associated with female gender and were protective for dcSSc and ILD. ATA were found to be protective for lcSSc and they were independently associated with interstitial reticular pattern. ARA positivity was independently associated with dcSSc. We did not find differences in mortality between the three groups. In Spanish SSc patients, the presence of SSc specific antibodies conferred a distinctive clinical profile.
Key features for ATA / ATR database design in missile systems
NASA Astrophysics Data System (ADS)
Özertem, Kemal Arda
2017-05-01
Automatic target acquisition (ATA) and automatic target recognition (ATR) are two vital tasks for missile systems, and having a robust detection and recognition algorithm is crucial for overall system performance. In order to have a robust target detection and recognition algorithm, an extensive image database is required. Automatic target recognition algorithms use the database of images in training and testing steps of algorithm. This directly affects the recognition performance, since the training accuracy is driven by the quality of the image database. In addition, the performance of an automatic target detection algorithm can be measured effectively by using an image database. There are two main ways for designing an ATA / ATR database. The first and easy way is by using a scene generator. A scene generator can model the objects by considering its material information, the atmospheric conditions, detector type and the territory. Designing image database by using a scene generator is inexpensive and it allows creating many different scenarios quickly and easily. However the major drawback of using a scene generator is its low fidelity, since the images are created virtually. The second and difficult way is designing it using real-world images. Designing image database with real-world images is a lot more costly and time consuming; however it offers high fidelity, which is critical for missile algorithms. In this paper, critical concepts in ATA / ATR database design with real-world images are discussed. Each concept is discussed in the perspective of ATA and ATR separately. For the implementation stage, some possible solutions and trade-offs for creating the database are proposed, and all proposed approaches are compared to each other with regards to their pros and cons.
... Home About the ATA Work of the ATA Leadership & Staff Governance Society Awards Society Committees Clark T. ... Home About the ATA Work of the ATA Leadership & Staff Governance Society Awards Society Committees Clark T. ...
... Home About the ATA Work of the ATA Leadership & Staff Governance Society Awards Society Committees Clark T. ... Home About the ATA Work of the ATA Leadership & Staff Governance Society Awards Society Committees Clark T. ...
Find an Endocrinology - Thyroid Specialist
... Home About the ATA Work of the ATA Leadership & Staff Governance Society Awards Society Committees Clark T. ... Home About the ATA Work of the ATA Leadership & Staff Governance Society Awards Society Committees Clark T. ...
Frangos, Savvas; Iakovou, Ioannis P; Marlowe, Robert J; Eftychiou, Nicolaos; Patsali, Loukia; Vanezi, Anna; Savva, Androulla; Mpalaris, Vassilis; Giannoula, Evanthia I
2017-02-01
Typically formulated by investigators from "world centres of excellence," differentiated thyroid carcinoma (DTC) management guidelines may have more limited applicability in settings of less expert care and fewer resources. Arguably the world's leading DTC guidelines are those of the American Thyroid Association, revised in 2009 ("ATA 2009") and 2015 ("ATA 2015"). To further explore the issue of "real-world applicability" of DTC guidelines, we retrospectively compared indications for ablation using ATA 2015 versus ATA 2009 in a two-centre cohort of ablated T1-2, M0 DTC patients (N = 336). Based on TNM status and histology, these patients were low-intermediate risk, but many ultimately had other characteristics suggesting elevated or uncertain risk. Working by consensus, two experienced nuclear medicine physicians considered patient and treatment characteristics to classify each case as having "no indication," a "possible indication," or a "clear indication" for ablation according to ATA 2009 or ATA 2015. The physicians also identified reasons for classification changes between ATA 2015 versus ATA 2009. Classification was unblinded, but the physicians had cared for only 138/336 patients, and the charts encompassed September 2010-October 2013, several years before the classification was performed. One hundred of 336 patients (29.8 %) changed classification regarding indication for ablation using ATA 2015 versus ATA 2009. Most reclassified patients (70/100) moved from "no indication" or "clear indication" to "possible indication." Reflecting this phenomenon, "possible indication" became the largest category according to the ATA 2015 classification (141/336, 42.0 %, versus 96/336, 28.6 %, according to ATA 2009). Many reclassifications were attributable to multiple clinicopathological characteristics, most commonly, stimulated thyroglobulin or anti-thyroglobulin antibody levels, multifocality, bilateral involvement, or capsular/nodal invasion. Regarding indications for ablation, ATA 2015 appears to better "acknowledge grey areas," i.e., patients with ambiguous or unavailable data requiring individualised, nuanced decision-making, than does ATA 2009.
The effects of respiratory muscle training on respiratory mechanics and energy cost.
Held, Heather E; Pendergast, David R
2014-08-15
Resistance respiratory muscle training (RRMT) increases respiratory muscle strength and can increase swimming endurance time by as much as 85%. The purpose of this study was to examine potential mechanisms by which RRMT improves exercise endurance. Eight healthy adult male scuba divers underwent experiments in a hyperbaric chamber at sea level (1 atmosphere absolute (ATA)), 2.7 ATA and 4.6 ATA, both dry and fully submersed. Subjects rested, exercised, and rested while mimicking their own exercise breathing (ISEV). Airway resistance (R(aw)), exhaled nitric oxide output (V˙(NO)), and respiratory duty cycle (T(I)/T(Tot)) were determined before and after four weeks of RRMT. RRMT decreased T(I)/T(Tot) (-10% at rest at 1 ATA), V˙(O2) (-17% at 2.7 ATA during submersed exercise), V˙(E) (-6% at 2.7 ATA during submersed exercise), and R(aw) (-34% inspiratory at 4.6 ATA submersed, -38% expiratory at 2.7 ATA dry), independent of changes in V˙(NO). Most importantly, respiratory muscle efficiency increased (+83% at 2.7 ATA submersed). Copyright © 2014 Elsevier B.V. All rights reserved.
Boehnke, Mitchell; Patel, Nayana; McKinney, Kristin; Clark, Toshimasa
The Society of Radiologists in Ultrasound (SRU 2005) and American Thyroid Association (ATA 2009 and ATA 2015) have published algorithms regarding thyroid nodule management. Kwak et al. and other groups have described models that estimate thyroid nodules' malignancy risk. The aim of our study is to use Kwak's model to evaluate the tradeoffs of both sensitivity and specificity of SRU 2005, ATA 2009 and ATA 2015 management algorithms. 1,000,000 thyroid nodules were modeled in MATLAB. Ultrasound characteristics were modeled after published data. Malignancy risk was estimated per Kwak's model and assigned as a binary variable. All nodules were then assessed using the published management algorithms. With the malignancy variable as condition positivity and algorithms' recommendation for FNA as test positivity, diagnostic performance was calculated. Modeled nodule characteristics mimic those of Kwak et al. 12.8% nodules were assigned as malignant (malignancy risk range of 2.0-98%). FNA was recommended for 41% of nodules by SRU 2005, 66% by ATA 2009, and 82% by ATA 2015. Sensitivity and specificity is significantly different (< 0.0001): 49% and 60% for SRU; 81% and 36% for ATA 2009; and 95% and 20% for ATA 2015. SRU 2005, ATA 2009 and ATA 2015 algorithms are used routinely in clinical practice to determine whether thyroid nodule biopsy is indicated. We demonstrate significant differences in these algorithms' diagnostic performance, which result in a compromise between sensitivity and specificity. Copyright © 2017 Elsevier Inc. All rights reserved.
Ambulance traffic accidents in Taiwan.
Chiu, Po-Wei; Lin, Chih-Hao; Wu, Chen-Long; Fang, Pin-Hui; Lu, Chien-Hsin; Hsu, Hsiang-Chin; Chi, Chih-Hsien
2018-04-01
Ambulance traffic accidents (ATAs) are the leading cause of occupation-related fatalities among emergency medical service (EMS) personnel. We aim to use the Taiwan national surveillance system to analyze the characteristics of ATAs and to assist EMS directors in developing policies governing ambulance operations. A retrospective, cross-sectional and largely descriptive study was conducted using Taiwan national traffic accidents surveillance data from January 1, 2011 to October 31, 2016. Among the 1,627,217 traffic accidents during the study period, 715 ATAs caused 8 deaths within 24 h and 1844 injured patients. On average, there was one ATA for every 8598 ambulance runs. Compared to overall traffic accidents, ATAs were 1.7 times more likely to result in death and 1.9 times more likely to have injured patients. Among the 715 ATAs, 8 (1.1%) ATAs were fatal and 707 (98.9%) were nonfatal. All 8 fatalities were associated with motorcycles. The urban areas were significantly higher than the rural areas in the annual number of ATAs (14.2 ± 7.3 [7.0-26.7] versus 3.1 ± 1.9 [0.5-8.4], p = 0.013), the number of ATA-associated fatalities per year (0.2 ± 0.2 [0.0-0.7] versus 0.1 ± 0.1 [0.0-0.2], p = 0.022), and the annual number of injured patients (who needed urgent hospital visits) in ATAs (19.4 ± 7.3 [10.5-30.9] versus 5.2 ± 3.8 [0.9-15.3], p < 0.001). The ATA-associated fatality rate in Taiwan was high, and all fatalities were associated with motorcycles. ATAs in a highly motorcycle-populated area may require further investigation. An ambulance traffic accident reporting system should be built to provide EMS policy guidance for ATA reduction and outcome improvements. Copyright © 2018. Published by Elsevier B.V.
Development of a Prototype Military Field Space Heater
1983-04-01
COMBUSTION HEATERS TENT HEATERS LIQUID FUELS LIQUID FUEL BURNERS 2&< ABSTRACT rCamrtbmum «o rarerem ataT» ft namteaamry mod Identity by block...M1941 heater. This prototype features a large triple stage burner obtained from Holland that uses staged combustion to achieve clean burning with...M1941. This Dutch burner features staged combustion , which results in complete and very clean burning of diesel fuel. This report covers fabrication and
Characterization of Plasmodium falciparum Choline Transporters
2005-04-01
ElO PfCTL v.1 transcript El IE2E31E41 E5 E6EE EJ PfCTL v.2 transcript B 1/1 31/11 61/21 91/31 ATG AAT TAC ATC GAG ATG GAA GA CGT GAA TAT AAA CCA CTT...ATA GA GAA GTGBGAT AAT GGA AC AT ATT ATA ATA MT MC MG GM TAT TAT AAC ATG TAT GA AAC AT MT ATA M N Y I E M4 E E R E Y K P L I EK E V D N G N N I B I N N...GGT ATA AAT TAC MT GGG AM ATA TGT GGA AAG GAT CTA CAT AA TAT CCA TAT TTA TAC TTC CCT CTT ACT CCT MA MT CCT MA CCT GA ATA TTA AGT ACC TAT GCT MA TGC YO G
Laufenberg, Lacee; Kazi, Abid A.; Lang, Charles H.
2014-01-01
Small molecule nonpeptidyl molecules are potentially attractive drug candidates as adjunct therapies in the treatment of sepsis-induced metabolic complications. As such, the current study investigates the use of aurintricarboxylic acid (ATA), which stimulates insulin-like growth factor (IGF)-I receptor and AKT signaling, for its ability to ameliorate the protein metabolic effects of endotoxin (LPS) + interferon (IFN)γ in C2C12 myotubes and sepsis in skeletal muscle. ATA dose- and time-dependently increases mTOR-dependent protein synthesis. Pretreatment with ATA prevents the LPS/IFNγ-induced decrease in protein synthesis at least in part by maintaining mTOR kinase activity, while post-treatment with ATA is able to increase protein synthesis when added up to 6 h after LPS/IFNγ. ATA also reverses the amino acid resistance which is detected in response to nutrient deprivation. Conversely, ATA decreases the basal rate of protein degradation and prevents the LPS/IFNγ-increase in proteolysis, and the latter change is associated reduced atrogin-1 and MuRF1 mRNA. The ability of ATA to antagonize LPS/IFNγ-induced changes in protein metabolism were associated with its ability to prevent the increases in IL-6 and NOS2 and decreases in IGF-I. In vivo studies indicate ATA acutely increases skeletal muscle, but not cardiac, protein synthesis, and attenuates the loss of lean body mass over 5 days. These data suggest ATA and other small molecule agonists of endogenous anabolic hormones may prove beneficial in treating sepsis by decreasing the inflammatory response and improving muscle protein balance. PMID:24430547
Tayebi Meybodi, Ali; Lawton, Michael T; Griswold, Dylan; Mokhtari, Pooneh; Payman, Andre; Tabani, Halima; Yousef, Sonia; Benet, Arnau
2017-09-22
OBJECTIVE In various disease processes, including unclippable aneurysms, a bypass to the upper posterior circulation (UPC) including the superior cerebellar artery (SCA) and posterior cerebral artery (PCA) may be needed. Various revascularization options exist, but the role of intracranial (IC) donors has not been scrutinized. The objective of this study was to evaluate the anatomical feasibility of utilizing the anterior temporal artery (ATA) for revascularization of the UPC. METHODS ATA-SCA and ATA-PCA bypasses were performed on 14 cadaver specimens. After performing an orbitozygomatic craniotomy and opening the basal cisterns, the ATA was divided at the M 3 -M 4 junction and mobilized to the crural cistern to complete an end-to-side bypass to the SCA and PCA. The length of the recipient artery between the anastomosis and origin was measured. RESULTS Seventeen ATAs were found. Successful anastomosis was performed in 14 (82%) of the ATAs. The anastomosis point on the PCA was 14.2 mm from its origin on the basilar artery. The SCA anastomosis point was 10.1 mm from its origin. Three ATAs did not reach the UPC region due to a common opercular origin with the middle temporal artery. The ATA-SCA bypass was also applied to the management of an incompletely coiled SCA aneurysm. CONCLUSIONS The ATA is a promising IC donor for UPC revascularization. The ATA is exposed en route to the proximal SCA and PCA through the pterional-orbitozygomatic approach. Also, the end-to-side anastomosis provides an efficient and straightforward bypass without the need to harvest a graft or perform multiple or difficult anastomoses.
NASA Technical Reports Server (NTRS)
Clark, J. M.; Gelfand, R.; Flores, N. D.; Lambertsen, C. J.; Pisarello, J. B.
1987-01-01
Oxygen effects on pulmonary function were measured in normal, resting men who breathed oxygen continuously at 3.0, 2.5, 2.0, and 1.5 ATA to predefined limits of CNS, cardiac, or pulmonary tolerance. Rates of pulmonary symptom intensification and decrease in vital capacity (VC) increased progressively with elevation of inspired oxygen pressure. Although VC decrements occurred concurrently with symptoms, the lung volume changes became prominent when symptoms were still mild. The observed effects were consistent with the interpretation that small airway function is impaired more selectively by oxygen exposure at 3.0 and 2.5 ATA than by exposure at 2.0 and 1.5 ATA. Despite similar VC changes after oxygen exposure at 2.0 ATA for nearly 10 hr and exposure at 1.5 ATA for almost 18 hr, the 2.0 ATA exposure caused greater impairment of pulmonary function and required a longer recovery period.
A simulator evaluation of an automatic terminal approach system
NASA Technical Reports Server (NTRS)
Hinton, D. A.
1983-01-01
The automatic terminal approach system (ATAS) is a concept for improving the pilot/machine interface with cockpit automation. The ATAS can automatically fly a published instrument approach by using stored instrument approach data to automatically tune airplane avionics, control the airplane's autopilot, and display status information to the pilot. A piloted simulation study was conducted to determine the feasibility of an ATAS, determine pilot acceptance, and examine pilot/ATAS interaction. Seven instrument-rated pilots each flew four instrument approaches with a base-line heading select autopilot mode. The ATAS runs resulted in lower flight technical error, lower pilot workload, and fewer blunders than with the baseline autopilot. The ATAS status display enabled the pilots to maintain situational awareness during the automatic approaches. The system was well accepted by the pilots.
Electrically switchable photonic liquid crystal devices for routing of a polarized light wave
NASA Astrophysics Data System (ADS)
Rushnova, Irina I.; Melnikova, Elena A.; Tolstik, Alexei L.; Muravsky, Alexander A.
2018-04-01
The new mode of LC alignment based on photoalignment AtA-2 azo dye where the refractive interface between orthogonal orientations of the LC director exists without voltage and disappeared or changed with critical voltage has been proposed. The technology to fabricate electrically controlled liquid crystal elements for spatial separation and switching of linearly polarized light beams on the basis of the total internal reflection effect has been significantly improved. Its distinctive feature is the application of a composite alignment material comprising two sublayers of Nylon-6 and AtA-2 photoalignment azo dye offering patterned liquid crystal director orientation with high alignment quality value q = 0 . 998. The fabricated electrically controlled spatially structured liquid crystal devices enable implementation of propagation directions separation for orthogonally polarized light beams and their switching with minimal crosstalk.
Tayebi Meybodi, Ali; Lawton, Michael T; Griswold, Dylan; Mokhtari, Pooneh; Payman, Andre; Benet, Arnau
2017-10-01
OBJECTIVE The anterior temporal artery (ATA) supplies an area of the brain that, if sacrificed, does not cause a noticeable loss of function. Therefore, the ATA may be used as a donor in intracranial-intracranial (IC-IC) bypass procedures. The capacities of the ATA as a donor have not been studied previously. In this study, the authors assessed the feasibility of using the ATA as a donor for revascularization of different segments of the distal middle cerebral artery (MCA). METHODS The ATA was studied in 15 cadaveric specimens (8 heads, excluding 1 side). First, the cisternal segment of the artery was untethered from arachnoid adhesions and small branches feeding the anterior temporal lobe and insular cortex, to evaluate its capacity for a side-to-side bypass to insular, opercular, and cortical segments of the MCA. Any branch entering the anterior perforated substance was preserved. Then, the ATA was cut at the opercular-cortical junction and the capacity for an end-to-side bypass was assessed. RESULTS From a total of 17 ATAs, 4 (23.5%) arose as an early MCA branch. The anterior insular zone and the frontal parasylvian cortical arteries were the best targets (in terms of mobility and caliber match) for a side-to-side bypass. Most of the insula was accessible for end-to-side bypass, but anterior zones of the insula were more accessible than posterior zones. End-to-side bypass was feasible for most recipient cortical arteries along the opercula, except for posterior temporal and parietal regions. Early ATAs reached significantly farther on the insular MCA recipients than non-early ATAs for both side-to-side and end-to-side bypasses. CONCLUSIONS The ATA is a robust arterial donor for IC-IC bypass procedures, including side-to-side and end-to-side techniques. The evidence provided in this work supports the use of the ATA as a donor for distal MCA revascularization in well-selected patients.
Lavoute, Cécile; Weiss, Michel; Risso, Jean-Jacques; Rostain, Jean-Claude
2014-02-01
The purpose of this study was to investigate the change in the striatal dopamine (DA) level in freely-moving rat exposed to different partial pressure of oxygen (from 1 to 5 ATA). Some works have suggested that DA release by the substantia nigra pars compacta (SNc) neurons in the striatum could be disturbed by hyperbaric oxygen (HBO) exposure, altering therefore the basal ganglia activity. Such changes could result in a change in glutamatergic and GABAergic control of the dopaminergic neurons into the SNc. Such alterations could provide more information about the oxygen-induced seizures observed at 5 ATA in rat. DA-sensitive electrodes were implanted into the striatum under general anesthesia. After 1 week rest, awaked rats were exposed to oxygen-nitrogen mixture at a partial pressure of oxygen of 1, 2, 3, 4 and 5 ATA. DA level was monitored continuously (every 3 min) by in vivo voltammetry before and during HBO exposure. HBO induced a decrease in DA level in relationship to the increase in partial pressure of oxygen from 1 ATA to 4 ATA (-15 % at 1 ATA, -30 % at 2 ATA, -40 % at 3 ATA, -45 % at 4 ATA), without signs of oxygen toxicity. At 5 ATA, DA level strongly decreases (-75 %) before seizure which occurred after 27 min ± 7 HBO exposure. After the epileptic seizure the decrease in DA level disappeared. These changes and the biphasic effect of HBO were discussed in function of HBO action on neurochemical regulations of the nigro striatal pathway.
Special Operations Forces Interagency Counterterrorism Reference Manual, Second Edition
2011-04-01
identify, interdict, and defeat terrorists. The Antiterrorism Assistance Program ( ATA ), implemented by the DS and discussed later (page 1-12), is...the Federal Bureau of Investigation. Antiterrorism Assistance Program ( ATA ) www.state.gov/m/ds/terrorism/c8583.htm The ATA is managed by the Office...scene investigation, airport and building secu- rity, maritime protection measures, and VIP protec- tion. More broadly, ATA seek to increase capacity to
Survey on Safety Incentive Plans
DOT National Transportation Integrated Search
1951-10-01
The Administrative Committee of the ATA Small Operations Division, with the assistance of the ATA Department of Personnel and Accident Prevention, is sponsoring a series of related compilations, based upon brief surveys among ATA member companies tha...
NASA Astrophysics Data System (ADS)
Ghosh, Utpal; Giri, Kalyan; Bhattacharyya, Nitai P.
2009-12-01
In the investigation of interaction of aurintricarboxylic acid (ATA) with four biologically important proteins we observed inhibition of enzymatic activity of DNase I, RNase A, M-MLV reverse transcriptase and Taq polymerase by ATA in vitro assay. As the telomerase reverse transcriptase (TERT) is the main catalytic subunit of telomerase holoenzyme, we also monitored effect of ATA on telomerase activity in vivo and observed dose-dependent inhibition of telomerase activity in Chinese hamster V79 cells treated with ATA. Direct association of ATA with DNase I ( Kd = 9.019 μM)), RNase A ( Kd = 2.33 μM) reverse transcriptase ( Kd = 0.255 μM) and Taq polymerase ( Kd = 81.97 μM) was further shown by tryptophan fluorescence quenching studies. Such association altered the three-dimensional conformation of DNase I, RNase A and Taq polymerase as detected by circular dichroism. We propose ATA inhibits enzymatic activity of the four proteins through interfering with DNA or RNA binding to the respective proteins either competitively or allosterically, i.e. by perturbing three-dimensional structure of enzymes.
A simulation evaluation of a pilot interface with an automatic terminal approach system
NASA Technical Reports Server (NTRS)
Hinton, David A.
1987-01-01
The pilot-machine interface with cockpit automation is a critical factor in achieving the benefits of automation and reducing pilot blunders. To improve this interface, an automatic terminal approach system (ATAS) was conceived that can automatically fly a published instrument approach by using stored instrument approach data to automatically tune airplane radios and control an airplane autopilot and autothrottle. The emphasis in the ATAS concept is a reduction in pilot blunders and work load by improving the pilot-automation interface. A research prototype of an ATAS was developed and installed in the Langley General Aviation Simulator. A piloted simulation study of the ATAS concept showed fewer pilot blunders, but no significant change in work load, when compared with a baseline heading-select autopilot mode. With the baseline autopilot, pilot blunders tended to involve loss of navigational situational awareness or instrument misinterpretation. With the ATAS, pilot blunders tended to involve a lack of awareness of the current ATAS mode state or deficiencies in the pilots' mental model of how the system operated. The ATAS display provided adequate approach status data to maintain situational awareness.
Kuban-Jankowska, Alicja; Sahu, Kamlesh K; Gorska-Ponikowska, Magdalena; Tuszynski, Jack A; Wozniak, Michal
2017-09-01
Rapidly-dividing cancer cells have higher requirement for iron compared to non-transformed cells, making iron chelating a potential anticancer strategy. In the present study we compared the anticancer activity of uncommon iron chelator aurintricarboxylic acid (ATA) with the known deferoxamine (DFO). We investigated the impact of ATA and DFO on the viability and proliferation of MCF-7 cancer cells. Moreover we performed enzymatic activity assays and computational analysis of the ATA and DFO effects on pro-oncogenic phosphatases PTP1B and SHP2. ATA and DFO decrease the viability and proliferation of breast cancer cells, but only ATA considerably reduces the activity of PTP1B and SHP2 phosphatases. Our studies indicated that ATA strongly inactivates and binds in the PTP1B and SHP2 active site, interacting with arginine residue essential for enzyme activity. We confirmed that iron chelating can be considered as a potential strategy for the adjunctive treatment of breast cancer. Copyright© 2017, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.
NASA Technical Reports Server (NTRS)
Gelfand, R.; Clark, J. M.; Lambertsen, C. J.; Pisarello, J. B.
1987-01-01
Prolonged exposures of men to continuous hyperoxia at 3.0, 2.5, 2.0, and 1.5 ATA were conducted to define CNS oxygen tolerance and to investigate the effects of prolonged hyperoxia on CNS and other organ functions. Altered respiratory homeostasis was evident during exposures of men to 2.5 and 3.0 ATA O2 as nonprogressive increment in ventilation and reciprocal decrement in PET(CO2). These changes were progressive during exposure at 1.5 ATA O2. Mean values of respiratory reactivity at CO2 were somewhat increased following prolonged hyperoxia at 1.5 and 2.5 ATA, compared to preexposure mean values. Hypoxic ventilatory response was unchanged or enhanced after oxygen exposures at 1.5 and 2.5 ATA. Observed respiratory and body temperature changes were not of sufficient magnitude to impair function.
Kuban-Jankowska, Alicja; Gorska, Magdalena; Tuszynski, Jack A; Ossowski, Tadeusz; Wozniak, Michal
2015-01-01
YopH is a bacterial protein tyrosine phosphatase, which is essential for the viability and pathogenic virulence of the plague-causing Yersinia sp. bacteria. Inactivation of YopH activity would lead to the loss of bacterial pathogenicity. We have studied the inhibitory properties of aurintricarboxylic acid (ATA) against YopH phosphatase and found that at nanomolar concentrations ATA reversibly decreases the activity of YopH. Computational docking studies indicated that in all binding poses ATA binds in the YopH active site. Molecular dynamics simulations showed that in the predicted binding pose, ATA binds to the essential Cys403 and Arg409 residues in the active site and has a stronger binding affinity than the natural substrate (pTyr). The cyclic voltammetry experiments suggest that ATA reacts remarkably strongly with molecular oxygen. Additionally, the electrochemical reduction of ATA in the presence of a negative potential from −2.0 to 2.5 V generates a current signal, which is observed for hydrogen peroxide. Here we showed that ATA indicates a unique mechanism of YopH inactivation due to a redox process. We proposed that the potent inhibitory properties of ATA are a result of its strong binding in the YopH active site and in situ generation of hydrogen peroxide near catalytic cysteine residue. PMID:26286963
Haugen, Bryan R; Sawka, Anna M; Alexander, Erik K; Bible, Keith C; Caturegli, Patrizio; Doherty, Gerard M; Mandel, Susan J; Morris, John C; Nassar, Aziza; Pacini, Furio; Schlumberger, Martin; Schuff, Kathryn; Sherman, Steven I; Somerset, Hilary; Sosa, Julie Ann; Steward, David L; Wartofsky, Leonard; Williams, Michelle D
2017-04-01
American Thyroid Association (ATA) leadership asked the ATA Thyroid Nodules and Differentiated Thyroid Cancer Guidelines Task Force to review, comment on, and make recommendations related to the suggested new classification of encapsulated follicular variant papillary thyroid carcinoma (eFVPTC) without capsular or vascular invasion to noninvasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP). The task force consists of members from the 2015 guidelines task force with the recusal of three members who were authors on the paper under review. Four pathologists and one endocrinologist were added for this specific review. The manuscript proposing the new classification and related literature were assessed. It is recommended that the histopathologic nomenclature for eFVPTC without invasion be reclassified as a NIFTP, given the excellent prognosis of this neoplastic variant. This is a weak recommendation based on moderate-quality evidence. It is also noted that prospective studies are needed to validate the observed patient outcomes (and test performance in predicting thyroid cancer outcomes), as well as implications on patients' psychosocial health and economics.
Bardhan, Munmun; Chowdhury, Joydeep; Ganguly, Tapan
2011-01-10
In this paper, the nature of the interactions between bovine serum albumin (BSA) and aurintricarboxylic acid (ATA) has been investigated by measuring steady state and time-resolved fluorescence, circular dichroism (CD), FT-IR and fluorescence anisotropy in protein environment under physiological conditions. From the analysis of the steady state and time-resolved fluorescence quenching of BSA in aqueous solution in presence of ATA it has been inferred that the nature of the quenching originates from the combined effect of static and dynamic modes. From the determination of the thermodynamic parameters obtained from temperature-dependent changes in K(b) (binding constant) it was apparent that the combined effect of hydrophobic association and electrostatic attraction is responsible for the interaction of ATA with BSA. The effect of ATA on the conformation of BSA has been examined by analyzing CD spectrum. Though the observed results demonstrate some conformational changes in BSA in presence of ATA but the secondary structure of BSA, predominantly of α-helix, is found to retain its identity. Molecular docking of ATA with BSA also indicates that ATA docks through hydrophobic interaction. Copyright © 2010 Elsevier B.V. All rights reserved.
Regulatory pathways to enable the licencing of alternatives to antibiotics.
Ioannou, Faye; Burnsteel, Cindy; Mackay, David K J; Gay, Cyril G
2018-05-01
Effective alternatives to antibiotics (ATA) such as vaccines, antibodies, phage therapies, prebiotics, probiotics and herbal medicines can be used in place of traditional antibiotics in a way that does not compromise animal health as means of tackling the growing threat to both animal and human health from antimicrobial resistance (AMR). This paper reflects the key points on the approaches that were discussed during the 2nd International Symposium on ATA between regulatory agencies, veterinary product companies representing largely the pharmaceutical and feed-additive sectors, academia and other stakeholders on regulatory pathways to enable the licensing of alternatives to antibiotics for food producing animals. The need to demonstrate compliance with generally accepted standards for quality, safety and efficacy is considered a pre-requisite for all veterinary medicinal products receiving an authorisation including ATA, irrespective of the region in which they are approved. ATA are often based on novel technologies, with complex mechanisms of action; therefore, early and close communication with regulators is encouraged. In addition, strategic use by ATA applicants of all regulatory tools available to support innovation is highly recommended. The veterinary product manufacturers consider that the regulation of veterinary medicines should evolve to accommodate innovative ATA technologies and incentives from regulatory agencies provided to stimulate further ATA development. Copyright © 2018.
A Binary Programming Approach to Automated Test Assembly for Cognitive Diagnosis Models
ERIC Educational Resources Information Center
Finkelman, Matthew D.; Kim, Wonsuk; Roussos, Louis; Verschoor, Angela
2010-01-01
Automated test assembly (ATA) has been an area of prolific psychometric research. Although ATA methodology is well developed for unidimensional models, its application alongside cognitive diagnosis models (CDMs) is a burgeoning topic. Two suggested procedures for combining ATA and CDMs are to maximize the cognitive diagnostic index and to use a…
Feasibility study of an attention training application for older adults.
Hill, Nikki L; Mogle, Jacqueline; Colancecco, Elise; Dick, Robert; Hannan, John; Lin, Feng Vankee
2015-09-01
Technology-based attention training has demonstrated promise in its potential to improve cognitive functioning in older people. Developing mobile applications, with older users specifically in mind, may support future dissemination of these interventions and integration into daily life. The purpose of this pilot study was to test the feasibility of an Attention Training Application (ATA) for community-dwelling older adults using mobile technology. A descriptive, mixed-methods design was used to capture older adults' feedback on the usability and acceptability of the ATA. A convenience sample of older adults (n = 9) from two independent living facilities participated in a 2-hour training and practice session with the ATA. Participants were given personally tailored instructions for using the mobile device and the ATA specifically. Following a practice session, participants provided ratings on multiple components of the ATA and completed an audio-recorded, semi-structured interview to provide detailed descriptions of their experience and perceptions. An iterative process of content analysis was used to characterise the open-ended responses. Participants rated the ATA favourably overall on several 0-10 scales including likeability [8.5 (1.6)], interest [8.8 (2.3)] and satisfaction [8.2 (1.9)]. The qualitative analyses revealed several issues relevant to the feasibility of the ATA among older people including the importance of the technological background of the user, limiting negative feedback, challenges with the touch screen interface, personal preferences for challenge, extending the practice period and the difficulty of the dual-task condition. The use of the ATA is feasible in the older adult population. Future development should specifically consider personal characteristics as well as preferences to maximise usability and acceptability among older people. Older adults enjoyed the ATA. This opens doors to user-friendly technological interventions that may be effective in assisting older adults maintain and possibly even improve their cognitive function. © 2015 John Wiley & Sons Ltd.
Utilization of the American Telemedicine Association's Clinical Practice Guidelines
Antoniotti, Nina; Bernard, Jordana
2013-01-01
Abstract Background: The American Telemedicine Association (ATA) Standards and Guidelines Committee develops practice standards and guidelines. Key to the Committee's mission is dissemination so the standards can be used in the practice of telemedicine. Over a 2-year period, when a standards document was accessed from the ATA Web site, a short survey was completed, but it did not assess how the documents were used once downloaded. A more formal survey was conducted to determine the impact ATA standards and guidelines are having on healthcare delivery via telemedicine. Materials and Methods: A survey was developed and distributed via SurveyMonkey to 13,177 ATA members and nonmembers in November 2011. Results were compiled and analyzed after a 90-day open period for responses to be submitted. Results: The majority of respondents (96%) believe the practice of telemedicine/telehealth should have standards and guidelines and that the ATA and other professional societies/associations should be responsible for developing them. The top uses of guidelines include guidance for clinical practice, training, gaining reimbursement, and research. Respondents indicating a need for standards and guidelines said the ATA (78.7%) and other professional societies/associations (74.5%) should be responsible for development. When asked to list specific practice guidelines or standards they are using for telehealth, the majority (21.5%) are using in-house (e.g., hospital, company)-developed guidelines, followed by those from professional associations/societies (20.4%) and those developed by the ATA (18.2%). Conclusions: Overall, the survey results indicate guidelines documents developed by the ATA and other professional societies and those developed in-house are being regularly accessed and used in both public and private sectors. Practitioners of telemedicine believe that standards and guidelines are needed for guidance for clinical practice, training, gaining reimbursement, and research, and they are to use those developed by professional organization such as the ATA as well as those developed by their own institutions. PMID:24050615
Prospective Validation of ATA and ETA Sonographic Pattern Risk of Thyroid Nodules Selected for FNAC.
Maino, Fabio; Forleo, Raffaella; Martinelli, Martina; Fralassi, Noemi; Barbato, Filomena; Pilli, Tania; Capezzone, Marco; Brilli, Lucia; Ciuoli, Cristina; Di Cairano, Giovanni; Nigi, Laura; Pacini, Furio; Castagna, Maria Grazia
2018-06-01
Recently, the American Thyroid Association (ATA) and the European Thyroid Association (ETA) have proposed that thyroid ultrasound (US) should be used to stratify the risk of malignancy in thyroid nodules and to aid decision-making about whether fine-needle aspiration cytology (FNAC) is indicated. To validate and to compare the ATA and ETA US risk stratification systems of thyroid nodules in a prospective series of thyroid nodules submitted to FNAC. We prospectively evaluated 432 thyroid nodules selected for FNAC from 340 patients. Cytology reports were based on the five categories according to the criteria of the British Thyroid Association. The proportion of Thy2 nodules decreased significantly, whereas the proportion of Thy4/Thy5 nodules significantly increased with increasing US risk class (P < 0.0001). The ability to identify benign and malignant nodules was similar between ATA and ETA systems. According to ATA and ETA US risk stratification systems, 23.7% and 56.0% nodules did not meet the criteria for FNAC, respectively. Considering only categories at lower risk of malignancy, the cumulative malignancy rate in these nodules was 1.2% for ATA and 1.7% for ETA US risk stratification systems. ETA and ATA US risk stratification systems provide effective malignancy risk stratification for thyroid nodules. In clinical practice, using this approach, we should be able to reduce the number of unnecessary FNAC without losing clinically relevant thyroid cancer.
Estimation of ligament strains and joint moments in the ankle during a supination sprain injury.
Wei, Feng; Fong, Daniel Tik-Pui; Chan, Kai-Ming; Haut, Roger C
2015-01-01
This study presents the ankle ligament strains and ankle joint moments during an accidental injury event diagnosed as a grade I anterior talofibular ligament (ATaFL) sprain. A male athlete accidentally sprained his ankle while performing a cutting motion in a laboratory setting. The kinematic data were input to a three-dimensional rigid-body foot model for simulation analyses. Maximum strains in 20 ligaments were evaluated in simulations that investigated various combinations of the reported ankle joint motions. Temporal strains in the ATaFL and the calcaneofibular ligament (CaFL) were then compared and the three-dimensional ankle joint moments were evaluated from the model. The ATaFL and CaFL were highly strained when the inversion motion was simulated (10% for ATaFL and 12% for CaFL). These ligament strains were increased significantly when either or both plantarflexion and internal rotation motions were added in a temporal fashion (up to 20% for ATaFL and 16% for CaFL). Interestingly, at the time strain peaked in the ATaFL, the plantarflexion angle was not large but apparently important. This computational simulation study suggested that an inversion moment of approximately 23 N m plus an internal rotation moment of approximately 11 N m and a small plantarflexion moment may have generated a strain of 15-20% in the ATaFL to produce a grade I ligament injury in the athlete's ankle. This injury simulation study exhibited the potentially important roles of plantarflexion and internal rotation, when combined with a large inversion motion, to produce a grade I ATaFL injury in the ankle of this athlete.
Hahn, Soo Yeon; Shin, Jung Hee; Oh, Young Lyun; Kim, Tae Hyuk; Lim, Yaeji; Choi, Ji Soo
2017-09-01
Follicular variant of papillary thyroid carcinoma (FVPTC) is traditionally divided into infiltrative and encapsulated types. Adding to this classification, noninvasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) represents a reclassification of a subset of cases (encapsulated tumors without lymphovascular or capsular invasion). The purpose of this study was to assess the role of ultrasound (US) in predicting tumor invasiveness in FVPTC. From January 2014 to May 2016, preoperative US examinations were performed on 151 patients with 152 FVPTCs who underwent surgery. Based on a pathologic analysis, the FVPTCs were categorized into three groups: NIFTP, invasive encapsulated FVPTC (iE-FVPTC), or infiltrative FVPTC (I-FVPTC). Each nodule was categorized based on the US pattern according to the Korean Thyroid Imaging Reporting and Data System (K-TIRADS) and the American Thyroid Association (ATA) guidelines. The correlation between tumor invasiveness and the K-TIRADS or ATA category was investigated using Spearman's rank correlation coefficient. Among the 152 FVPTCs, there were 48 (31.6%) NIFTPs, 60 (39.5%) iE-FVPTCs, and 44 (28.9%) I-FVPTCs. US characteristics of the FVPTCs differed significantly according to tumor invasiveness (p ≤ 0.030). Tumor invasiveness showed a significant positive correlation with K-TIRADS (tumors of all sizes: r = 0.591, p < 0.001; tumors ≥1.0 cm: r = 0.427, p < 0.001) and ATA categories (tumors of all sizes: r = 0.532, p < 0.001; tumors ≥1.0 cm: r = 0.466, p < 0.001). According to both K-TIRADS and ATA guidelines for all-sized tumors, the most common subtype was NIFTP in low-suspicion nodules (52.6% and 51.6%), iE-FVPTC in intermediate-suspicion nodules (52.7% and 54.2%), and I-FVPTC in high-suspicion nodules (82.5% and 69.4%). After surgery, lymph node metastases were confirmed in two (4.2%) NIFTP cases, three (5.0%) iE-FVPTC cases, and eight (18.2%) I-FVPTC cases (p = 0.001). The results of the BRAF mutation analysis were not significantly different between the groups (p = 0.507). Increasing tumor invasiveness from NIFTP to iE-FVPTC to I-FVPTC is positively correlated with the level of suspicion on US using both K-TIRADS and ATA guidelines.
Hayakawa, Kyoko; Formica, Anthony M; Nakao, Yuka; Ichikawa, Daiju; Shinton, Susan A; Brill-Dashoff, Joni; Smith, Mitchell R; Morse, Herbert C; Hardy, Richard R
2018-06-13
In mice, fetal/neonatal B-1 cell development generates murine CD5 + B cells (B1a) with autoreactivity. We analyzed B1a cells at the neonatal stage in a V H 11/D/J H knock-in mouse line (V H 11t) that generates an autoreactive antiphosphatidylcholine BCR. Our study revealed that antiphosphatidylcholine B1a cells develop in liver, mature in spleen, and distribute in intestine/colon, mesenteric lymph node (mLN), and body cavity as the outcome of B-1 cell development before B-2 cell development. Throughout life, self-renewing B-1 B1a cells circulate through intestine, mesenteric vessel, and blood. The body cavity-deposited B1a cells also remigrate. In old age, some B1a cells proceed to monoclonal B cell lymphocytosis. When neonatal B-1 B1a cells express an antithymocyte/Thy-1 autoreactivity (ATA) BCR transgene in the C.B17 mouse background, ATA B cells increase in PBL and strongly develop lymphomas in aging mice that feature splenomegaly and mLN hyperplasia with heightened expression of CD11b, IL-10, and activated Stat3. At the adult stage, ATA B cells were normally present in the mantle zone area, including in intestine. Furthermore, frequent association with mLN hyperplasia suggests the influence by intestinal microenvironment on lymphoma development. When cyclin D1 was overexpressed by the Eμ-cyclin D1 transgene, ATA B cells progressed to further diffused lymphoma in aged mice, including in various lymph nodes with accumulation of IgM hi IgD lo CD5 + CD23 - CD43 + cells, resembling aggressive human mantle cell lymphoma. Thus, our findings reveal that early generated B cells, as an outcome of B-1 cell development, can progress to become lymphocytosis, lymphoma, and mantle cell lymphoma-like neoplasia in aged mice. Copyright © 2018 by The American Association of Immunologists, Inc.
2011-09-01
Transport Association ( ATA ) Maintenance & Ramp Human Factors Task Force committee members—we are deeply grateful for their contributions in the...6 Air Transport Association ( ATA ) Human Factors Task Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Form Development...garnered many valuable les- sons, safety improvements, and significant returns on their investment. 1The FAA ATA Human Factors Taskforce has
ERIC Educational Resources Information Center
Blanas, Demetri A.
2008-01-01
In 1978, the World Health Organization (WHO) and the international health community convoked a conference in Alma-Ata, Kazakhstan, to address global inequalities in health. The conference resulted in the publication of the "Declaration of Alma-Ata," which made the ambitious call "for urgent action by all governments, all health and…
A Review of Fast L(1)-Minimization Algorithms for Robust Face Recognition
2010-07-01
14) can be rewritten in the standard QP form as min Q(z) . = cTz + 12z TBz subj. to z ≥ 0, (15) where z = [x+;x−], c = λ1 + [−AT b;AT b], and B = [ ATA ... ATA − ATA ATA ] . (16) We note that the gradient of Q(z) is defined as ∇zQ(z) = c +Bz. (17) 5 A MATLAB implementation of GPSR is available at http...necessarily smooth nor convex. For `1-min in particular, g is also separable, that is, g(x) = n∑ i=1 gi (xi). (36) Clearly, let f(x) = 12‖b − Ax‖ 2 2 and
Free radical generation in the brain precedes hyperbaric oxygen-induced convulsions.
Torbati, D; Church, D F; Keller, J M; Pryor, W A
1992-01-01
We tested the hypothesis that hyperbaric oxygenation (HBO) generates free radicals in the brain before the onset of neurological manifestations of central nervous system (CNS) oxygen poisoning. Chronically cannulated, conscious rats were individually placed in a transparent pressure chamber and exposed to (1) 5 atmospheres absolute (ATA) oxygen for 15 min (n = 4); (2) 5 ATA oxygen for 30 min (n = 5), during which no visible convulsions occurred; (3) 5 ATA oxygen for 30 min with recurrent convulsions (n = 6); (4) 5 ATA oxygen until the appearance of the first visible convulsions (n = 5); (5) 4 ATA oxygen for 60 min during which no convulsions occurred (n = 5); and (6) 5 ATA air for 30 min (n = 5, controls). Immediately before compression, 1 mL of 0.1 M of alpha-phenyl-N-tert-butyl nitrone (PBN) was administered intravenously (iv) for spin trapping. At the termination of each experiment, rats were euthanized by pentobarbital iv and decompressed within 1 min. Brains were rapidly removed for preparation of lipid extracts (Folch). The presence of PBN spin adducts in the lipid extracts was examined by electron spin resonance (ESR) spectroscopy. ESR spectra from unconvulsed rats exposed to 5 ATA oxygen for 30 min revealed both oxygen-centered and carbon-centered PBN spin adducts in three of the five brains. One of the five rats in this group showed an ascorbyl signal in the ESR spectrum.(ABSTRACT TRUNCATED AT 250 WORDS)
Hyperbaric nitrogen prolongs breath-holding time in humans.
Morooka, H; Wakasugi, Y; Shimamoto, H; Shibata, O; Sumikawa, K
2000-09-01
Either an increase in PaCO(2) or a decrease in PaO(2), can affect respiratory stimulation through respiratory centers, thus influencing breath-holding time (BHT). This study was designed to determine whether and how hyperbaric air could influence BHT in comparison with hyperbaric oxygen in humans. We studied 36 healthy volunteers in a multiplace hyperbaric chamber. BHT, pulse oximeter, and transcutaneous carbon dioxide tension were measured at 1 and 2.8 atmosphere absolute (ATA) in two groups. Group A (n = 20) breathed air. Group O (n = 16) breathed oxygen with a face mask (5 L/min). BHTs were 108 +/- 28 s at 1.0 ATA and 230 +/- 71 s at 2.8 ATA in Group A, and 137 +/- 48 s at 1.0 ATA and 180 +/- 52 s at 2.8 ATA in Group O. Transcutaneous carbon dioxide tension in Group A (59 +/- 2 mm Hg) was higher than that in Group O (54 +/- 2 mm Hg) at the end of maximal breath-holding at 2.8 ATA. The prolongation of BHT in hyperbaric air is significantly greater than that in hyperbaric oxygen. Breath-holding time is significantly prolonged in hyperbaric air than it is in hyperbaric oxygen. The mechanism involves the anesthetic effect of nitrogen suppressing the suffocating feeling during breath-holding.
Tang, Alice L; Falciglia, Mercedes; Yang, Huaitao; Mark, Jonathan R; Steward, David L
2017-08-01
The aim of this study was to validate the American Thyroid Association (ATA) sonographic risk assessment of thyroid nodules. The ATA sonographic risk assessment was prospectively applied to 206 thyroid nodules selected for ultrasound-guided fine-needle aspiration (US-FNA), and analyzed with The Bethesda System for Reporting Thyroid Cytopathology (TBSRTC), as well as surgical pathology for the subset undergoing surgical excision. The analysis included 206 thyroid nodules averaging 2.4 cm (range 1-7 cm; standard error of the mean 0.07). Using the ATA US pattern risk assessment, nodules were classified as high (4%), intermediate (31%), low (38%), and very low (26%) risk of malignancy. Nodule size was inversely correlated with sonographic risk assessment, as lower risk nodules were larger on average (p < 0.0001). Malignancy rates determined by cytology/surgical pathology were high 100%, intermediate 11%, low 8%, and very low 2%, which were closely aligned with ATA malignancy risk estimates (high 70-90%, intermediate 10-20%, low 5-10%, and very low 3%). ATA US pattern risk assessment also appropriately predicted the proportion of nodules classified as malignant or suspicious for malignancy through TBSRTC classification-high (77%), intermediate (6%), low (1%), and very low 0%-as well as benign TBSRTC classification-high (0%), intermediate (47%), low (61%), and very low (70%) (p < 0.0001). Malignancy rates of surgically excised, cytologically indeterminate nodules followed ATA sonographic risk stratification (high 100%, intermediate 21%, low 17%, and very low 12%; p = 0.003). This prospective study supports the new ATA sonographic pattern risk assessment for selection of thyroid nodules for US-FNA based upon TBSRTC and surgical pathology results. In the setting of indeterminate cytopathology, nodules categorized as atypia of undetermined significance/follicular lesion of undetermined significance with ATA high-risk sonographic patterns have a high likelihood of being malignant.
Human circulatory responses to prolonged hyperbaric hyperoxia in Predictive Studies V
NASA Technical Reports Server (NTRS)
Pisarello, J. B.; Clark, J. M.; Lambertsen, C. J.; Gelfand, R.
1987-01-01
Selected results of cardiocirculatory measurements in healthy volunteers who breathed 100 percent O2 continuously at 3.0 ATA for up to 3.5 hr, at 2.5 ATA for up to 6.0 hr, at 2.0 ATA for up to 11.9 hr, and at 1.5 ATA for up to 19.0 hr are reported. The results indicate that resting hemodynamic responses to prolonged hyperbaric oxygen breathing in man usually consist of small deviations from normal sea-level responses. Rapid onset of bradycardia occurred at all four oxygen pressures investigated. This effect was accompanied by a rate-dependent reduction in cardiac output and a degree of systematic vasoconstriction which were small in magnitude and appeared to be functionally unimportant.
Introducing English and German versions of the Adolescent Time Attitude Scale.
Worrell, Frank C; Mello, Zena R; Buhl, Monika
2013-08-01
In this study, the authors report on the development of English and German versions of the Adolescent Time Attitude Scale (ATAS). The ATAS consists of six subscales assessing Past Positive, Past Negative, Present Positive, Present Negative, Future Positive, and Future Negative time attitudes. The authors describe the development of the scales and present data on the reliability and structural validity of ATAS scores in samples of American (N = 300) and German (N = 316) adolescents. Internal consistency estimates for scores on the English and German versions of the ATAS were in the .70 to .80 range. Confirmatory factor analyses indicated that a six-factor structure yielded the best fit for scores and that the scores were invariant across samples.
2016-07-01
5’-aat tat ttt ata tgg aat gag caa gta tgt ttt atc ata att gac cag ttc att tca agg acc ttc aaa aat ata cct acg aat tcg agc tcg ttt aaa c-3’), or...oTsc13 (5’-tta aga gtt cag att tgc ttt atg tgg tta ttc tgc tga agg tcc taa ttt att gac gtt gaa aaa taa agg cca cat agc gga tcc ccg ggt taa tta a-3...and oTsc14 (5’-ata aaa aaa att aat taa tga tgg caa ggc aca atc gta atc aat ctt tta att tag gac ttt tta tat gcc ctt atg gcg aat tcg agc tcg ttt aaa c
NASA Astrophysics Data System (ADS)
Bartrand, J.; Abbott, R. E.
2017-12-01
We present data and analysis of a seismic data collect at the site of a historical underground nuclear explosion at Yucca Flat, a sedimentary basin on the Nevada National Security Site, USA. The data presented here consist of active-source, six degree-of-freedom seismic signals. The translational signals were collected with a Nanometrics Trillium Compact Posthole seismometer and the rotational signals were collected with an ATA Proto-SMHD, a prototype rotational ground motion sensor. The source for the experiment was the Seismic Hammer (a 13,000 kg weight-drop), deployed on two-kilometer, orthogonal arms centered on the site of the nuclear explosion. By leveraging the fact that compressional waves have no rotational component, we generated a map of subsurface scattering and compared the results to known subsurface features. To determine scattering intensity, signals were cut to include only the P-wave and its coda. The ratio of the time-domain signal magnitudes of angular velocity and translational acceleration were sectioned into three time windows within the coda and averaged within each window. Preliminary results indicate an increased rotation/translation ratio in the vicinity of the explosion-generated chimney, suggesting mode conversion of P-wave energy to S-wave energy at that location. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia LLC, a wholly owned subsidiary of Honeywell International Inc. for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525.
Rodríguez Véliz, A M
1982-01-01
This article presents the Mexican Institute for Social Security (IMSS) created in 1943 and describes its main features, its programmes and the role played by health education inside the programmes. It ends by explaining the present situation concerning health education and the changes which are presently envisaged. During its first twenty years, the IMSS promoted preventive medicine and trained health personnel. Since 1979 it has concerned itself mainly with some 10 million peasants and marginal groups. In the frame of a national development programme, a vaccination and detection campaign were implemented and the distribution system of potable water was extended. Mexico with a population of 73 million has the dual characteristics of a developed and a developing country (70 per cent of its population is urban, 30 per cent rural). The overcrowded cities contrast with the isolated rural areas where sanitary conditions are poor and life difficult. The main causes of mortality, in 1978, were: -in the towns: car accidents, cardiovascular diseases and suicide; -in rural areas, acute respiratory infections and intestinal infections. The 1978 Alma Ata international conference on primary health care and the meeting of Ministers of health convened in 1980 by the Pan American Health Organization endorsed the IMSS programmes which emphasize prevention, promote health education and community participation. The cost of preventive measures being cheaper than treatment, 203 million pesos were saved and allocated to the expansion of programmes. Systematic immunization has resulted in a sharp decline of diphteria, polio, rabies, typhoid, pertussis and measles. Early detection of tumours of cervix uteri has saved many lives.
AtaT blocks translation initiation by N-acetylation of the initiator tRNAfMet.
Jurėnas, Dukas; Chatterjee, Sneha; Konijnenberg, Albert; Sobott, Frank; Droogmans, Louis; Garcia-Pino, Abel; Van Melderen, Laurence
2017-06-01
Toxin-antitoxin (TA) loci are prevalent in bacterial genomes. They are suggested to play a central role in dormancy and persister states. Under normal growth conditions, TA toxins are neutralized by their cognate antitoxins, and under stress conditions, toxins are freed and inhibit essential cellular processes using a variety of mechanisms. Here we characterize ataR-ataT, a novel TA system, from enterohemorrhagic Escherichia coli. We show that the toxin AtaT is a GNAT family enzyme that transfers an acetyl group from acetyl coenzyme A to the amine group of the methionyl aminoacyl moiety of initiator tRNA. AtaT specifically modifies Met-tRNA fMet , but no other aminoacyl-tRNAs, including the elongator Met-tRNA Met . We demonstrate that once acetylated, AcMet-tRNA fMet fails to interact with initiation factor-2 (IF2), resulting in disruption of the translation initiation complex. This work reveals a new mechanism of translation inhibition and confirms Met-tRNA fMet as a prime target to efficiently block cell growth.
The ATA-67 Formula for Direct Operating Cost
NASA Technical Reports Server (NTRS)
Faulkner, H. B.
1972-01-01
The ATA formulas for direct operating cost were developed for the purpose of comparing different aircraft, existing or not, on the same route or the same aircraft on different routes. Such characteristics of the airline as crew pay, maintenance procedures, and depreciation schedules are kept constant. In air transportation systems analysis the 1967 ATA formula is usually used with appropriate exceptions or modifications, such as: different maintenance labor rate, total maintenance multiplied by a factor, maintenance burden deleted, different depreciation schedule, or different spares percentages.
NASA Astrophysics Data System (ADS)
Kuterbekov, Kairat; Sadykov, Nurllah; Zhumadilov, Kassym; Nurgaliyeva, Rano; Kabyshev, Aset; Abseitov, Erbolat; Kurmanzhanov, Askar
2017-11-01
EPR study of TE from teeth donors in KOSHKAR-ATA region. During the first year we received22 tooth samples from local people in KOSHKAR-ATA region; the teeth were removed by dentists in accordance with their medical prescriptions. Obtained data showed that radiation signal in the analyzed samples corresponds to doses not exceeding 0.3 Gy; only one sample carriers the signal of (0.35±0.15)Gy.
KSC technicians use propellant slump measurement tool on ATA SRM
NASA Technical Reports Server (NTRS)
1988-01-01
Kennedy Space Center (KSC) technicians use new propellant slump measurement tool on the Assembly Test Article (ATA) aft solid rocket motor (SRM). The tool measures any slumping of the top of the solid rocket booster (SRB) solid propellant. Data gathered by this tool and others during the ATA test will be analyzed by SRM engineers. Astronaut Stephen S. Oswald at far right (barely visible) and Morton Thiokol supervisor Howard Fichtl look on during the data gathering process. The month-long ATA test is designed to evaluate the performance of new tools required to put the tighter fitting redesigned SRM joints together. In addition, new procedures are being used and ground crews are receiving training in preparation for stacking the STS-26 flight set of motors. View provided by KSC with alternate number KSC-87PC-956.
Weaver, Lindell K; Deru, Kayla
2017-01-01
The carboxyhemoglobin half-life (COHb t1/2) during hyperbaric oxygen (HBO₂) is often quoted as 23 minutes, derived from the average of two adult male volunteers breathing HBO₂ at 3 atmospheres absolute (ATA). However, the mean COHb t1/2 of 12 male volunteer smokers was 26.3 minutes at 1.58 ATA and in 12 non-intubated carbon monoxide (CO) poisoned patients treated at 3 ATA, was 43 minutes. An 81-year old male, poisoned by an improperly ventilated natural gas heater, was intubated for coma, then treated with HBO₂. His PaO₂/FiO₂ = 283 from aspiration. His initial COHb was 34.4%, and 18 minutes before HBO₂, 5.9%. After a compression interval of 17 minutes, the COHb measured after 22 minutes at 3 ATA was 3.3%. By exponential decay, his COHb t1/2 before HBO₂ was 95 minutes. We estimate the range for COHb t1/2 during compression as 62-81 minutes and for the 3-ATA interval, 58 to 49 minutes, respectively. The mid-point estimate of COHb t1/2 at 3 ATA was 53 minutes. The COHb t1/2 we calculated is greater than previously reported, but longer in our patient possibly because of concomitant respiratory failure, lung dysfunction, and mechanical ventilation. The often-cited COHb t1/2 of 23 minutes, likely underestimates the actual COHb t1/2 in CO-poisoned patients, especially those with cardiopulmonary dysfunction.
Photoalignment of a Bisazodioxodibenzothiophene in a Polyvinylpyrrolidone Matrix
NASA Astrophysics Data System (ADS)
Chaplanova, J. D.; Larykava, S. N.; Agabekov, V. E.; Mikulich, V. S.; Gracheva, E. A.
2016-09-01
Photoalignment of thin films of dipotassium 3,7-bis[1-(4-hydroxy-3-carboxylate)phenylazo]-5,5'-dioxodibenzothiophene (AtA-2) that were prepared by spin-coating of dye solutions in H2O and DMF and aqueous solutions of polyvinylpyrrolidone (PVP) was studied. The UV absorption band of the dye cis-isomer, the position and intensity of which depended on the PVP concentration in the stock solutions, was recorded upon irradiation of films of AtA-2 in a PVP matrix [AtA-2(PVP)] with unfi ltered light from a DRT-1000 lamp in a vacuum or an Ar atmosphere. PVP facilitated trans-cis isomerization of AtA-2 and increased the stability of the cis-isomer with respect to thermal relaxation into the initial trans-isomer. The dichroic ratio (DR) of AtA-2(PVP) films irradiated with linearly polarized light (blue LED with λ = 450 nm, I = 15 mW/cm2) increased by 1.5 times as the PVP concentration in the stock solutions increased from 1.0 to 10.0 mass%. The morphology and roughness of the films depended on the nature of the solvents used to prepare them.
NASA Astrophysics Data System (ADS)
Rolland, Yann; Perincek, Dogan; Kaymakci, Nuretdin; Sosson, Marc; Barrier, Eric; Avagyan, Ara
2012-05-01
Orogens formed by a combination of subduction and accretion are featured by a short-lived collisional history. They preserve crustal geometries acquired prior to the collisional event. These geometries comprise obducted oceanic crust sequences that may propagate somewhat far away from the suture zone, preserved accretionary prism and subduction channel at the interplate boundary. The cessation of deformation is ascribed to rapid jump of the subduction zone at the passive margin rim of the opposite side of the accreted block. Geological investigation and 40Ar/39Ar dating on the main tectonic boundaries of the Anatolide-Tauride-Armenian (ATA) block in Eastern Turkey, Armenia and Georgia provide temporal constraints of subduction and accretion on both sides of this small continental block, and final collisional history of Eurasian and Arabian plates. On the northern side, 40Ar/39Ar ages give insights for the subduction and collage from the Middle to Upper Cretaceous (95-80 Ma). To the south, younger magmatic and metamorphic ages exhibit subduction of Neotethys and accretion of the Bitlis-Pütürge block during the Upper Cretaceous (74-71 Ma). These data are interpreted as a subduction jump from the northern to the southern boundary of the ATA continental block at 80-75 Ma. Similar back-arc type geochemistry of obducted ophiolites in the two subduction-accretion domains point to a similar intra-oceanic evolution prior to accretion, featured by slab steepening and roll-back as for the current Mediterranean domain. Final closure of Neotethys and initiation of collision with Arabian Plate occurred in the Middle-Upper Eocene as featured by the development of a Himalayan-type thrust sheet exhuming amphibolite facies rocks in its hanging-wall at c. 48 Ma.
Tatarewicz, Suzanna M; Juan, Gloria; Swanson, Steven J; Moxness, Michael S
2012-08-31
Allotypes of IgG1 molecules can influence the immunogenicity of therapeutic monoclonal antibodies and may account for the presence of some pre-existing antibodies. An electrochemiluminescent (ECL) bridging immunoassay was used to characterize the binding epitopes of anti-therapeutic antibodies (ATAs) in a Phase 1 single ascending dose clinical trial of a therapeutic aglycosylated IgG1monoclonal antibody (mAb). There was no evidence for ATAs specific for a possible neo-epitope created due to the lack of glycosylation. ATAs that developed post-treatment were specific for the F(ab')2, whereas, pre-existing ATAs were specific to the Fc region. Further characterization of the pre-existing ATAs identified the specific epitope to be the G1m1 allotype determinant in the Fc of the therapeutic. A novel competitive bridging assay was developed to verify that serum IgG1 from subjects with pre-existing anti-G1m1 antibodies was homozygous for the antithetical allotype (G1m3). The endogenous G1m allotype of all subjects was assessed and correlation to ATA incidence and adverse events was evaluated. Interestingly, the pre-existing anti-allotype antibody in subjects persisted but was not augmented after dosing, indicating the lack of a secondary immune response to this epitope. These studies indicate the relationship of the therapeutic allotype and the corresponding allotype of subjects is an important component to further understand the impact of immunogenicity on the safety and efficacy of therapeutic antibodies. Copyright © 2012 Elsevier B.V. All rights reserved.
Advanced Radar Reflector Studies
1975-12-01
1 »«P21«PZ2 "ATA HI,lP,LT«/3.l’H5n,6.26Sl»,3T6.727/ HATA C.ll/tO.O.-.’jJOIKlF-?!/ r«LL tSC(»919) WhllrC.T) T r(iRi> lAT (lXt...UNLIMITED, m^m ■jmwmsmi ,-Ul!l.M*J4J4». l-!l!ipiJ’ [ 1 1 u i 1 i. k pi I Ni, Ü L L u i D B*.-** 1 1 p | ! Ml |i M * H L... 1 f’’■’ ■ i ! 1 J 0 .^ mm vnwmm " II.IIIIIPW UNCLASSIFIED SECURITY CLASSIFICATION
Tsamis, Alkiviadis; Phillippi, Julie A.; Koch, Ryan G.; Pasta, Salvatore; D'Amore, Antonio; Watkins, Simon C.; Wagner, William R.; Gleason, Thomas G.; Vorp, David A.
2013-01-01
It was recently demonstrated by our group that the delamination strength of ascending thoracic aortic aneurysms (ATAA) was lower than that of control (CTRL, non-aneurysmal) ascending thoracic aorta (ATA), and the reduced strength was more pronounced among bicuspid (BAV) vs. tricuspid aortic valve (TAV) patients, suggesting a different risk of aortic dissection for BAV patients. We hypothesized that aortic valve morphologic phenotype predicts fiber micro-architectural anomalies in ATA. To test the hypothesis, we characterized the micro-architecture in the longitudinal-radial (Z-RAD) and circumferential-radial (Θ-RAD) planes of human ATA tissue that was artificially dissected medially. The outer and inner-media of CTRL-ATA, BAV-ATAA and TAV-ATAA were imaged using multi-photon microscopy in the Z-RAD and Θ-RAD planes to observe collagen and elastin. Micrographs were processed using an image-based tool to quantify several micro-architectural characteristics. In the outer-media of BAV-ATAA, elastin was more undulated and less aligned about the Θ-axis when compared with CTRL-ATA, which is consistent with increased tensile stretch at inflection point of Θ-strips of adventitial-medial half of BAV-ATAA (1.28) when compared with CTRL-ATA (1.13). With increasing age, collagen became more undulated about the Z-axis within the outer-media of TAV-ATAA, and elastin became more oriented in the Z-axis and collagen less radially-oriented within the inner-media of TAV-ATAA. This discrepancy in the micro-architecture with fibers in the inner layers being more stretched and with disrupted radially-oriented components than fibers in the outer layers may be associated with the development, progression and vascular remodeling in aneurysms arising in TAV patients. PMID:24075403
Tsamandouras, Nikolaos; Guo, Yingying; Wendling, Thierry; Hall, Stephen; Galetin, Aleksandra; Aarons, Leon
2017-01-01
Ethnicity plays a modulating role in atorvastatin pharmacokinetics (PK), with Asian patients reported to have higher exposure compared with Caucasians. Therefore, it is difficult to safely extrapolate atorvastatin PK data and models across ethnic groups. This work aims to develop a population PK model for atorvastatin and its pharmacologically active metabolites specifically for the Japanese population. Subsequently, it aimed to identify genetic polymorphisms affecting atorvastatin PK in this population. Atorvastatin acid (ATA) and ortho-hydroxy-atorvastatin acid (o-OH-ATA) plasma concentrations, clinical/demographic characteristics and genotypes for 18 (3, 3, 1, 1, 7, 2 and 1 in the ABCB1, ABCG2, CYP3A4, CYP3A5, SLCO1B1, SLCO2B1 and PPARA genes, respectively) genetic polymorphisms were collected from 27 Japanese individuals (taking 10 mg atorvastatin once daily) and analysed using a population PK modelling approach. The population PK model developed (one-compartment for ATA linked through metabolite formation to an additional compartment describing the disposition of o-OH-ATA) accurately described the observed data and the associated population variability. Our analysis suggested that patients carrying one variant allele for the rs2622604 polymorphism (ABCG2) show a 55% (95% confidence interval: 16-131%) increase in atorvastatin oral bioavailability relative to the value in individuals without the variant allele. The current work reports the identification in the Japanese population of a BCRP polymorphism, not previously associated with the PK of any statin, that markedly increases ATA and o-OH-ATA exposure. The model developed may be of clinical importance to guide dosing recommendations tailored specifically for the Japanese.
Tsamis, Alkiviadis; Phillippi, Julie A; Koch, Ryan G; Pasta, Salvatore; D'Amore, Antonio; Watkins, Simon C; Wagner, William R; Gleason, Thomas G; Vorp, David A
2013-11-15
It was recently demonstrated by our group that the delamination strength of ascending thoracic aortic aneurysms (ATAA) was lower than that of control (CTRL, non-aneurysmal) ascending thoracic aorta (ATA), and the reduced strength was more pronounced among bicuspid (BAV) vs. tricuspid aortic valve (TAV) patients, suggesting a different risk of aortic dissection for BAV patients. We hypothesized that aortic valve morphologic phenotype predicts fiber micro-architectural anomalies in ATA. To test the hypothesis, we characterized the micro-architecture in the longitudinal-radial (Z-RAD) and circumferential-radial (Θ-RAD) planes of human ATA tissue that was artificially dissected medially. The outer and inner-media of CTRL-ATA, BAV-ATAA and TAV-ATAA were imaged using multi-photon microscopy in the Z-RAD and Θ-RAD planes to observe collagen and elastin. Micrographs were processed using an image-based tool to quantify several micro-architectural characteristics. In the outer-media of BAV-ATAA, elastin was more undulated and less aligned about the Θ-axis when compared with CTRL-ATA, which is consistent with increased tensile stretch at inflection point of Θ-strips of adventitial-medial half of BAV-ATAA (1.28) when compared with CTRL-ATA (1.13). With increasing age, collagen became more undulated about the Z-axis within the outer-media of TAV-ATAA, and elastin became more oriented in the Z-axis and collagen less radially-oriented within the inner-media of TAV-ATAA. This discrepancy in the micro-architecture with fibers in the inner layers being more stretched and with disrupted radially-oriented components than fibers in the outer layers may be associated with the development, progression and vascular remodeling in aneurysms arising in TAV patients. © 2013 Elsevier Ltd. All rights reserved.
Patient-centered technological assessment and monitoring of depression for low-income patients.
Wu, Shinyi; Vidyanti, Irene; Liu, Pai; Hawkins, Caitlin; Ramirez, Magaly; Guterman, Jeffrey; Gross-Schulman, Sandra; Sklaroff, Laura Myerchin; Ell, Kathleen
2014-01-01
Depression is a significant challenge for ambulatory care because it worsens health status and outcomes, increases health care utilizations and costs, and elevates suicide risk. An automatic telephonic assessment (ATA) system that links with tasks and alerts to providers may improve quality of depression care and increase provider productivity. We used ATA system in a trial to assess and monitor depressive symptoms of 444 safety-net primary care patients with diabetes. We assessed system properties, evaluated preliminary clinical outcomes, and estimated cost savings. The ATA system is feasible, reliable, valid, safe, and likely cost-effective for depression screening and monitoring for low-income primary care population.
Patient-Centered Technological Assessment and Monitoring of Depression for Low-Income Patients
Wu, Shinyi; Vidyanti, Irene; Liu, Pai; Hawkins, Caitlin; Ramirez, Magaly; Guterman, Jeffrey; Gross-Schulman, Sandra; Sklaroff, Laura Myerchin; Ell, Kathleen
2014-01-01
Depression is a significant challenge for ambulatory care because it worsens health status and outcomes, increases health care utilizations and costs, and elevates suicide risk. An automatic telephonic assessment (ATA) system that links with tasks and alerts to providers may improve quality of depression care and increase provider productivity. We used ATA system in a trial to assess and monitor depressive symptoms of 444 safety-net primary care patients with diabetes. We assessed system properties, evaluated preliminary clinical outcomes, and estimated cost savings. The ATA system is feasible, reliable, valid, safe, and likely cost-effective for depression screening and monitoring for low-income primary care population. PMID:24525531
Electron momentum densities in disordered muffin-tin alloys
NASA Astrophysics Data System (ADS)
Bansil, A.; Rao, R. S.; Mijnarends, P. E.; Schwartz, L.
1981-04-01
The application of average t-matrix (ATA) and coherent potential (CPA) approximations to the calculation of average electron momentum density ρ(p-->) in random muffin-tin alloys AxB1-x is considered. The necessary equations for the general matrix elements of the operators describing scattering by the CPA atom and also by an A or B atom embedded in the effective medium are derived. Various versions of the ATA for ρ(p-->) are discussed. Several ρ(p-->) curves calculated on the basis of the CPA and ATA in CuxNi1-x are presented. These results are used to delineate the effects on ρ(p-->) of self-consistency in the treatment of disorder.
Ashford Teaching Alliance Research Champion: Evaluation Report and Executive Summary
ERIC Educational Resources Information Center
Griggs, Julia; Speight, Svetlana; Farias, Javiera Cartagena
2016-01-01
The Ashford Teaching Alliance (ATA) Research Champion project ("the programme") was a pilot intervention aimed at developing teaching expertise and practice by promoting the use of educational research in decision-making and teacher practice. The programme ran for one academic year (2014/2015) in five schools within the ATA. Delivery was…
Ata: An Indigenous Knowledge Based Pedagogical Approach to Teaching
ERIC Educational Resources Information Center
Forsyth, Huhana
2017-01-01
Western education theory and philosophy as the domain of the dominant pedagogy forms the basis of the New Zealand education system. Although the current form of education is reflective of the dominant cultures ideologies and philosophies it does not always serve the interests of all students. The philosophy of Ata offers an indigenous knowledge…
Rich, Mélanie K.
2015-01-01
Arbuscular mycorrhiza (AM) is a mutual symbiosis that involves a complex symbiotic interface over which nutrients are exchanged between the plant host and the AM fungus. Dozens of genes in the host are required for the establishment and functioning of the interaction, among them nutrient transporters that mediate the uptake of mineral nutrients delivered by the fungal arbuscules. We have isolated in a genetic mutant screen a petunia (Petunia hybrida) GIBBERELLIC ACID INSENSITIVE, REPRESSOR of GIBBERELLIC ACID INSENSITIVE, and SCARECROW (GRAS)-type transcription factor, ATYPICAL ARBUSCULE (ATA), that acts as the central regulator of AM-related genes and is required for the morphogenesis of arbuscules. Forced mycorrhizal inoculations from neighboring wild-type plants revealed an additional role of ATA in restricting mycorrhizal colonization of the root meristem. The lack of ATA, which represents the ortholog of REQUIRED FOR ARBUSCULAR MYCORRHIZA1 in Medicago truncatula, renders the interaction completely ineffective, hence demonstrating the central role of AM-related genes for arbuscule development and function. PMID:25971550
Rich, Mélanie K; Schorderet, Martine; Bapaume, Laure; Falquet, Laurent; Morel, Patrice; Vandenbussche, Michiel; Reinhardt, Didier
2015-07-01
Arbuscular mycorrhiza (AM) is a mutual symbiosis that involves a complex symbiotic interface over which nutrients are exchanged between the plant host and the AM fungus. Dozens of genes in the host are required for the establishment and functioning of the interaction, among them nutrient transporters that mediate the uptake of mineral nutrients delivered by the fungal arbuscules. We have isolated in a genetic mutant screen a petunia (Petunia hybrida) Gibberellic Acid Insensitive, Repressor of Gibberellic Acid Insensitive, and Scarecrow (GRAS)-type transcription factor, Atypical Arbuscule (ATA), that acts as the central regulator of AM-related genes and is required for the morphogenesis of arbuscules. Forced mycorrhizal inoculations from neighboring wild-type plants revealed an additional role of ATA in restricting mycorrhizal colonization of the root meristem. The lack of ATA, which represents the ortholog of Required For Arbuscular Mycorrhiza1 in Medicago truncatula, renders the interaction completely ineffective, hence demonstrating the central role of AM-related genes for arbuscule development and function. © 2015 American Society of Plant Biologists. All Rights Reserved.
EEG patterns associated with nitrogen narcosis (breathing air at 9 ATA).
Pastena, Lucio; Faralli, Fabio; Mainardi, Giovanni; Gagliardi, Riccardo
2005-11-01
The narcotic effect of nitrogen impairs diver performance and limits dive profiles, especially for deep dives using compressed air. It would be helpful to establish measurable correlates of nitrogen narcosis. The authors observed the electroencephalogram (EEG) of 10 subjects, ages 22-27 yr, who breathed air during a 3-min compression to a simulated depth of 80 msw (9 ATA). The EEG from a 19-electrode cap was recorded for 20 min while the subject reclined on a cot with eyes closed, first at 1 ATA before the dive and again at 9 ATA. Signals were analyzed using Fast Fourier Transform and brain mapping for frequency domains 0-4 Hz, 4-7 Hz, 7-12 Hz, and 12-15 Hz. Student's paired t-test and correlation tests were used to compare results for the two conditions. Two EEG patterns were observed. The first was an increase in delta and theta activity in all cortical regions that appeared in the first 2 min at depth and was related to exposure time. The second was an increase in delta and theta activity and shifting of alpha activity to the frontal regions at minute 6 of breathing air at 9 ATA and was related to the narcotic effects of nitrogen. If confirmed by studies with larger case series, this EEG pattern could be used to identify nitrogen narcosis for various gas mixtures and prevent the dangerous impact of nitrogen on diver performance.
The effects of pressure on arthritic knees in a rat model of CFA-induced arthritis.
Koo, Sung Tae; Lee, Chang-Hyung; Choi, Hyeunseok; Shin, Yong Il; Ha, Ki Tae; Ye, Hanna; Shim, Hyun Bo
2013-01-01
Pain is influenced by weather changes under certain circumstances, and inflammatory pain in animal models is ameliorated by pressure, but the underlying mechanism of atmospheric pressure has not been clearly elucidated. To examine the effect of pressure on pain in an arthritic animal model. Controlled animal study. Laboratory animal study. Following an injection of complete Freund's adjuvant (CFA) into one side of a knee joint, 32 rats were assigned randomly to 2 groups and either placed under 1 or 2.5 atmospheres absolute (ATA) in a hyperbaric chamber for 5 hours. The pain levels were assessed daily for up to 2 weeks post-injection to determine the changes in weight bearing (WB) of the affected limbs. In addition, the levels of gelatinase, MMP-2, and MMP-9 expression in the synovial fluids of the knees were analyzed. After arthritis induction, the rats in the 1 ATA group showed reduced WB of the affected limbs (< 10% of normal limbs). This reduction in WB peaked at 2 days after the injection and then decreased spontaneously. Nevertheless, the pain behavior lasted for more than 2 weeks. In the 2.5 ATA group, the WB was significantly better during the experiment. The MMP-9/MMP-2 ratio increased at 7 and 14 days after the CFA injection in the 1 ATA group. However, repetitive exposure to 2.5 ATA significantly reduced this ratio in the 2.5 ATA group. Although a sufficient number of samples were used to support the hypothesis that high atmospheric pressure improves a painful condition in this study, an additional larger-scale study will be needed to confirm these findings. Exposure to elevated pressures appears to relieve arthritic pain for extended periods by reducing the inflammatory process and should be considered as a possible alternative pain-reducing therapy.
ERIC Educational Resources Information Center
Osmond-Johnson, Pamela
2015-01-01
This paper explores understandings related to teacher professionalism amongst a sample of highly engaged members of the Alberta Teacher's Association (ATA). Highlighting the many ways in which the Association supported members in their bid to embody roles as leaders, learners, advocates, and policy actors, I argue that the ATA serves as a platform…
Bajrović, Fajko F; Sketelj, Janez; Jug, Marko; Gril, Iztok; Mekjavić, Igor B
2002-09-01
Abstract The effect of hyperbaric oxygen treatment (HBO) on sensory axon regeneration was examined in the rat. The sciatic nerve was crushed in both legs. In addition, the distal stump of the sural nerve on one side was made acellular and its blood perfusion was compromised by freezing and thawing. Two experimental groups received hyperbaric exposures (2.5 ATA) to either compressed air (pO2 = 0.5 ATA) or 100% oxygen (pO2 = 2.5 ATA) 90 minutes per day for 6 days. Sensory axon regeneration in the sural nerve was thereafter assessed by the nerve pinch test and immunohistochemical reaction to neurofilament. HBO treatment increased the distances reached by the fastest regenerating sensory axons by about 15% in the distal nerve segments with preserved and with compromised blood perfusion. There was no significant difference between the rats treated with different oxygen tensions. The total number of regenerated axons in the distal sural nerve segments after a simple crush injury was not affected, whereas in the nerve segments with compromised blood perfusion treated by the higher pO2, the axon number was about 30% lower than that in the control group. It is concluded that the beneficial effect of HBO on sensory axon regeneration is not dose-dependent between 0.5 and 2.5 ATA pO2. Although the exposure to 2.5 ATA of pO2 moderately enhanced early regeneration of the fastest sensory axons, it decreased the number of regenerating axons in the injured nerves with compromised blood perfusion of the distal nerve stump.
19 CFR 114.34 - Cancellation of erroneous charges.
Code of Federal Regulations, 2011 CFR
2011-04-01
... in force a ruling by the Commissioner of Customs decisive of the issue. [T.D. 74-227, 39 FR 32023... cancelled by the port director and, if paid, refunded, as provided by § 18.8 of this chapter. (b) A.T.A. or... reexport or destroy merchandise temporarily imported under cover of an A.T.A. or TECRO/AIT carnet did not...
19 CFR 114.34 - Cancellation of erroneous charges.
Code of Federal Regulations, 2010 CFR
2010-04-01
... in force a ruling by the Commissioner of Customs decisive of the issue. [T.D. 74-227, 39 FR 32023... cancelled by the port director and, if paid, refunded, as provided by § 18.8 of this chapter. (b) A.T.A. or... reexport or destroy merchandise temporarily imported under cover of an A.T.A. or TECRO/AIT carnet did not...
Advanced drug delivery systems for antithrombotic agents
Greineder, Colin F.; Howard, Melissa D.; Carnemolla, Ronald; Cines, Douglas B.
2013-01-01
Despite continued achievements in antithrombotic pharmacotherapy, difficulties remain in managing patients at high risk for both thrombosis and hemorrhage. Utility of antithrombotic agents (ATAs) in these settings is restricted by inadequate pharmacokinetics and narrow therapeutic indices. Use of advanced drug delivery systems (ADDSs) may help to circumvent these problems. Various nanocarriers, affinity ligands, and polymer coatings provide ADDSs that have the potential to help optimize ATA pharmacokinetics, target drug delivery to sites of thrombosis, and sense pathologic changes in the vascular microenvironment, such as altered hemodynamic forces, expression of inflammatory markers, and structural differences between mature hemostatic and growing pathological clots. Delivery of ATAs using biomimetic synthetic carriers, host blood cells, and recombinant fusion proteins that are activated preferentially at sites of thrombus development has shown promising outcomes in preclinical models. Further development and translation of ADDSs that spare hemostatic fibrin clots hold promise for extending the utility of ATAs in the management of acute thrombotic disorders through rapid, transient, and targeted thromboprophylaxis. If the potential benefit of this technology is to be realized, a systematic and concerted effort is required to develop clinical trials and translate the use of ADDSs to the clinical arena. PMID:23798715
Aurintricarboxylic acid is a potent inhibitor of phosphofructokinase.
McCune, S A; Foe, L G; Kemp, R G; Jurin, R R
1989-01-01
Aurintricarboxylic acid (ATA) was found to be a very potent inhibitor of purified rabbit liver phosphofructokinase (PFK), giving 50% inhibition at 0.2 microM. The inhibition was in a manner consistent with interaction at the citrate-inhibitory site of the enzyme. The data suggest that inhibition of PFK by ATA was not due to denaturation of the enzyme or the irreversible binding of inhibitor, since the inhibition could be reversed by addition of allosteric activators of PFK, i.e. fructose 2,6-bisphosphate or AMP. Two other tricarboxylic acids, agaric acid and (-)-hydroxycitrate, were found to inhibit PFK. ATA at much higher concentrations (500 microM) was shown to inhibit fatty acid synthesis from endogenous glycogen in rat hepatocytes; however, protein synthesis was not altered. PMID:2525029
Hyperbaric pressure does not affect the analgesia produced by nitrous oxide in the mouse.
Cohen, P J
1989-01-01
Hydrostatic pressure antagonizes some, but not all, of the phenomena associated with general anaesthesia. For example, while unconsciousness produced by general anaesthesia in a wide variety of species is reversed by compression, anaesthetic-induced inhibition of synaptic transmission is potentiated by application of pressure. To date, the effect of pressure on analgesia has not been evaluated. In this study, hyperbaric pressure of 75 ata did not antagonize analgesia which had been produced by exposure of mice to 1.2 ata of nitrous oxide. However, the same hyperbaric pressure restored righting in animals which had been anesthetized with 1.5 ata of nitrous oxide. These data add to the suggestion that the multiple effects of general anaesthetics may be mediated at different loci.
Employer Partnership Program Analysis of Alternatives
2012-01-01
downloaded many more job listings. These results suggest that there is room for improvement in outreach to RC service members and attracting return visits to...Area of Concentration ARNG Army National Guard ATA American Trucking Association CBRN Chemical, Biological, Radiological, and Nuclear CMF Career...Association ( ATA ) and Inova Health Systems, a nonprofit health care provider in Northern Virginia. In July 2008, the program signed its first agreement
ERIC Educational Resources Information Center
Donoghue, John R.
2015-01-01
At the heart of van der Linden's approach to automated test assembly (ATA) is a linear programming/integer programming (LP/IP) problem. A variety of IP solvers are available, ranging in cost from free to hundreds of thousands of dollars. In this paper, I compare several approaches to solving the underlying IP problem. These approaches range from…
Chen, Mengbin; Chou, Wayne K W; Al-Lami, Naeemah; Faraldos, Juan A; Allemann, Rudolf K; Cane, David E; Christianson, David W
2016-05-24
Aristolochene synthase (ATAS) is a high-fidelity terpenoid cyclase that converts farnesyl diphosphate exclusively into the bicyclic hydrocarbon aristolochene. Previously determined crystal structures of ATAS complexes revealed trapped active site water molecules that could potentially interact with catalytic intermediates: water "w" hydrogen bonds with S303 and N299, water molecules "w1" and "w2" hydrogen bond with Q151, and a fourth water molecule coordinates to the Mg(2+)C ion. There is no obvious role for water in the ATAS mechanism because the enzyme exclusively generates a hydrocarbon product. Thus, these water molecules are tightly controlled so that they cannot react with carbocation intermediates. Steady-state kinetics and product distribution analyses of eight ATAS mutants designed to perturb interactions with active site water molecules (S303A, S303H, S303D, N299A, N299L, N299A/S303A, Q151H, and Q151E) indicate relatively modest effects on catalysis but significant effects on sesquiterpene product distributions. X-ray crystal structures of S303A, N299A, N299A/S303A, and Q151H mutants reveal minimal perturbation of active site solvent structure. Seven of the eight mutants generate farnesol and nerolidol, possibly resulting from addition of the Mg(2+)C-bound water molecule to the initially formed farnesyl cation, but no products are generated that would suggest enhanced reactivity of other active site water molecules. However, intermediate germacrene A tends to accumulate in these mutants. Thus, apart from the possible reactivity of Mg(2+)C-bound water, active site water molecules in ATAS are not directly involved in the chemistry of catalysis but instead contribute to the template that governs the conformation of the flexible substrate and carbocation intermediates.
Hong, Chae Moon; Lee, Won Kee; Jeong, Shin Young; Lee, Sang-Woo; Ahn, Byeong-Cheol; Lee, Jaetae
2014-11-01
The aim of this study was to validate the effectiveness of delayed risk stratification (DRS) in predicting structural progression and compare the predictive value of American Thyroid Association (ATA) risk stratification with that of DRS in patients with differentiated thyroid cancer (DTC). A total of 398 patients with DTC who underwent surgery followed by radioactive iodine ablation were enrolled. Patients were categorized as having excellent response, acceptable response, biochemical incomplete response, or structural incomplete response at 8-15 months' evaluation after radioactive iodine ablation for DRS. Effectiveness of DRS was evaluated according to structural progression-free survival (PFS; median follow-up, 10.7 years). A total of 229 patients (57.5%) were classified as having excellent response, 78 (19.6%) as having acceptable response, 62 (15.6%) as having biochemical incomplete response, and 29 patients (7.3%) as having structural incomplete response. After DRS, 60.2% of intermediate-risk patients and 20.5% of high-risk patients were shifted to the excellent response category. Sixty-nine patients (17.3%) showed structural progression. DRS showed statistical difference in PFS (hazard ratio, 4.268; 95% confidence interval, 3.258-5.477; P<0.001). In multivariate analysis of ATA risk stratification and DRS, DRS was significantly associated with PFS (hazard ratio, 4.383; 95% confidence interval, 3.250-5.912; P<0.001), but ATA risk stratification was not. There was no significant difference in deviances between the use of DRS alone and the use of both DRS and ATA risk stratification (χ=0.103, d.f.=1, P=0.748). DRS is superior to ATA risk stratification in predicting structural disease progression for DTC patients.
Can quaternary ammonium methacrylates inhibit matrix MMPs and cathepsins?
Tezvergil-Mutluay, Arzu; Agee, Kelli A.; Mazzoni, Annalisa; Carvalho, Ricardo M.; Carrilho, Marcela; Tersariol, Ivarne L.; Nascimento, Fabio D.; Imazato, Satoshi; Tjäderhane, Leo; Breschi, Lorenzo; Tay, Franklin R; Pashley, David H.
2014-01-01
Objective Dentin matrices release ICTP and CTX fragments during collagen degradation. ICTP fragments are known to be produced by MMPs. CTX fragments are thought to come from cathepsin K activity. The purpose of this study was to determine if quaternary methacrylates (QAMs) can inhibit matrix MMPs and cathepsins. Methods Dentin beams were demineralizated, and dried to constant weight. Beams were incubated with rh-cathepsin B, K, L or S for 24 h at pH 7.4 to identify which cathepsins release CTX at neutral pH. Beams were dipped in ATA, an antimicrobial QAM to determine if it can inhibit dentin matrix proteases. Other beams were dipped in another QAM (MDPB) to determine if it produced similar inhibition of dentin proteases. Results Only beams incubated with cathepsin K lost more dry mass than the controls and released CTX. Dentin beams dipped in ATA and incubated for 1 week at pH 7.4, showed a concentration-dependent reduction in weight-loss. There was no change in ICTP release from control values, meaning that ATA did not inhibit MMPs. Media concentrations of CTX fell significantly at 15 wt% ATA indicating that ATA inhibits capthesins. Beams dipped in increasing concentrations of MDPB lost progressively less mass, showing that MDPB is a protease-inhibitor. ICTP released from controls or beams exposed to low concentrations were the same, while 5 or 10% MDPB significantly lowered ICTP production. CTX levels were strongly inhibited by 2.5–10% MDPB, indicating that MDPB is a potent inhibitor of both MMPs and cathepsin K. Significance CTX seems to be released from dentin matrix only by cathepsin K. MMPs and cathepsin K and B may all contribute to matrix degradation. PMID:25467953
Increasing Fleet Readiness Through Improved Distance Support
2013-03-01
gis tic s D ata Pro ce ss Tra ini ng Da ta An aly ze Da ta An...Format Fleet Maintenance Formatted Data /sData F.2.2 • ... Fleet Support Infrastructure Data ~ Formatted Trainin~ ata l Obtain and Format Fleet...system either by using a form or a spreadsheet F.2.2 Obtain Data from Fleet Recorded System Performance Data is downloaded from ship either manually
USSR Report, Life Sciences Biomedical and Behavioral Sciences.
1983-09-13
created by the lengthy pro- cesses of evolution and selection, as well as methods for selecting and evaluating plants at the first stages of the...27 May 83) 17 Soviets-American Symposium in Alma-Ata on Plant Proteins and Nutrition (N. Idrisov? KAZAKHSTANSKAYA PRAVDA, 26 Feb 83).., 19...MIKROBIOLOGIYA, Nov-Dec 82),.,,. 38 MOLECULAR BIOLOGY New Research Institute of Plant Molecular Biology and Biochemistry in Alma-Ata (Murat
1984-04-01
wavelengths. A direct application of such a laser is isotope separation. 2. For a brief status report of the Laboratory’s high- explosive flash...operation in the fall of 1982. in a 50-MeV Advanced Test Accelerator Facility (the ATA)1 that we are con- structing at our high- explosives test loca...chemical explosives in target-damage studies. Potential hazards associated with the ATA experiments were considered in choosing our site. LLNL’s
ERIC Educational Resources Information Center
Al-Khafaji, Ammar Shamil Kadhim
2018-01-01
The research investigates in details about the influence of cultural differences in Postcolonial Ghana as presented in Ama Ata Aidoo's "Dilemma of a Ghost". The play centers on the cross cultural marriage of young couple; Ato Yawson, a Ghanaian who recently completed his studies in the United States and returns home, and Eulali, his…
Wide Field Radio Transient Surveys
NASA Astrophysics Data System (ADS)
Bower, Geoffrey
2011-04-01
The time domain of the radio wavelength sky has been only sparsely explored. Nevertheless, serendipitous discovery and results from limited surveys indicate that there is much to be found on timescales from nanoseconds to years and at wavelengths from meters to millimeters. These observations have revealed unexpected phenomena such as rotating radio transients and coherent pulses from brown dwarfs. Additionally, archival studies have revealed an unknown class of radio transients without radio, optical, or high-energy hosts. The new generation of centimeter-wave radio telescopes such as the Allen Telescope Array (ATA) will exploit wide fields of view and flexible digital signal processing to systematically explore radio transient parameter space, as well as lay the scientific and technical foundation for the Square Kilometer Array. Known unknowns that will be the target of future transient surveys include orphan gamma-ray burst afterglows, radio supernovae, tidally-disrupted stars, flare stars, and magnetars. While probing the variable sky, these surveys will also provide unprecedented information on the static radio sky. I will present results from three large ATA surveys (the Fly's Eye survey, the ATA Twenty CM Survey (ATATS), and the Pi GHz Survey (PiGSS)) and several small ATA transient searches. Finally, I will discuss the landscape and opportunities for future instruments at centimeter wavelengths.
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Physical security features for the driver's license or identification card. 37.15 Section 37.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY..., Verification, and Card Issuance Requirements § 37.15 Physical security features for the driver's license or...
Il progetto Sole, cielo, ambiente
NASA Astrophysics Data System (ADS)
Guerrieri, Maria Antonietta
2006-04-01
A.T.A. (Tusculan Astronomy Association), with the financial support of the District of Rome, carried out an educational project in five high schools. After a theoretic introduction about the Sun, its physics and its interaction with the Earth, some A.T.A. members instructed the students in using the telescope to observe and photograph sunspots. All the schools collaborated in shooting the images of sunspots and in the final analysis and elaboration of data.
Dos Reis, Laura L; Tuttle, R Michael; Alon, Eran; Bergman, Donald A; Bernet, Victor; Brett, Elise M; Cobin, Rhoda; Doherty, Gerard; Harris, Jeffrey R; Klopper, Joshua; Lee, Stephanie L; Lupo, Mark; Milas, Mira; Machac, Josef; Mechanick, Jeffrey I; Orloff, Lisa; Randolph, Gregory; Ross, Douglas S; Smallridge, Robert C; Terris, David James; Tufano, Ralph P; Mehra, Saral; Scherl, Sophie; Clain, Jason B; Urken, Mark L
2014-10-01
Appropriate management of well-differentiated thyroid cancer requires treating clinicians to have access to critical elements of the patient's presentation, surgical management, postoperative course, and pathologic assessment. Electronic health records (EHRs) provide an effective method for the storage and transmission of patient information, although most commercially available EHRs are not intended to be disease-specific. In addition, there are significant challenges for the sharing of relevant clinical information when providers involved in the care of a patient with thyroid cancer are not connected by a common EHR. In 2012, the American Thyroid Association (ATA) defined the critical elements for optimal interclinician communication in a position paper entitled, "The Essential Elements of Interdisciplinary Communication of Perioperative Information for Patients Undergoing Thyroid Cancer Surgery." We present a field-by-field comparison of the ATA's essential elements as applied to three contemporary electronic reporting systems: the Thyroid Surgery e-Form from Memorial Sloan-Kettering Cancer Center (MSKCC), the Alberta WebSMR from the University of Calgary, and the Thyroid Cancer Care Collaborative (TCCC). The MSKCC e-form fulfills 21 of 32 intraoperative fields and includes an additional 14 fields not specifically mentioned in the ATA's report. The Alberta WebSMR fulfills 45 of 82 preoperative and intraoperative fields outlined by the ATA and includes 13 additional fields. The TCCC fulfills 117 of 120 fields outlined by the ATA and includes 23 additional fields. Effective management of thyroid cancer is a highly collaborative, multidisciplinary effort. The patient information that factors into clinical decisions about thyroid cancer is complex. For these reasons, EHRs are particularly favorable for the management of patients with thyroid cancer. The MSKCC Thyroid Surgery e-Form, the Alberta WebSMR, and the TCCC each meet all of the general recommendations for effective reporting of the specific domains that they cover in the management of thyroid cancer, as recommended by the ATA. However, the TCCC format is the most comprehensive. The TCCC is a new Web-based disease-specific database to enhance communication of patient information between clinicians in a Health Insurance Portability and Accountability Act (HIPAA)-compliant manner. We believe the easy-to-use TCCC format will enhance clinician communication while providing portability of thyroid cancer information for patients.
Hassan, Aamna; Razi, Mairah; Riaz, Saima; Khalid, Madeeha; Nawaz, M Khalid; Syed, Aamir Ali; Bashir, Humayun
2016-08-01
The aim of this study was to evaluate the overall and progression-free survival of papillary thyroid carcinoma (PTC), comparing the American Thyroid Association (ATA) guideline for risk of recurrence with the TNM staging system with dynamic assessment at 2 years. This study is a retrospective analysis of 689 PTC patients over a 20-year period at a single center. Disease-free survival based on the TNM staging and ATA recurrence risk was calculated using Kaplan-Meier curves. Dynamic response assessment during the first 2 years was compared for both systems. Survival was calculated based on age, baseline resectability, and postthyroidectomy serum tumor marker levels. Six hundred eighty-nine (72.2%) of the total thyroid cancer patients had PTC. Four hundred sixty-nine patients were females, and 220 patients were males. The age range was 6 to 87 years. Five hundred thirty-five patients were resectable, and 56 patients were unresectable. One hundred fifty-one patients were excluded due to insufficient information on recurrence risk. By ATA categorization, 39% had low risk, no disease-related mortality; 44% had intermediate risk, 3 died; and 17% had high risk, 32 died. The 5-year disease-free survival was 54%, 26%, and 5% in low-, intermediate-, and high-risk groups, respectively. The log-rank test showed a significant difference in the percent survival (P < 0.01). TNM stage wise, in terms of survival, 1.3% in stage I, 2.2% in stage II, 0% in stage III, and 37.5% in stage IV died. The 20-year disease-free survival showed the following: stage I, 43%; stage II, 28%; stage III, 18%; and stage IV, 2%. There is significant difference in survival rate (P < 0.01). Both ATA risk classification and TNM staging were significant predictors of disease-free survival. On bivariate analysis, ATA classification (hazards ratio, 2.1; 95% confidence interval, 1.64-2.67; P = 0.001) was better predictive of overall survival versus TNM classification (hazards ratio, 1.3; 95% confidence interval, 1.11-1.43; P = 0.063). The ATA risk stratification and continuous reassessment during the first 2 years predicts disease-free survival better than the TNM staging. Age older than 45 years, unresectable disease, and elevated postthyroidectomy thyroglobulin levels dictate a poorer prognosis.
NASA Technical Reports Server (NTRS)
2014-01-01
On approach, next-generation aircraft are likely to have airframe noise levels that are comparable to or in excess of engine noise. ATA Engineering, Inc. (ATA) is developing a novel quiet engine air brake (EAB), a device that generates "equivalent drag" within the engine through stream thrust reduction by creating a swirling outflow in the turbofan exhaust nozzle. Two Phase II projects were conducted to mature this technology: (1) a concept development program (CDP) and (2) a system development program (SDP).
Hyperbaric oxygen: B-level evidence in mild traumatic brain injury clinical trials.
Figueroa, Xavier A; Wright, James K
2016-09-27
First, to demonstrate that B-level evidence exists for the use of hyperbaric oxygen therapy (HBOT) as an effective treatment in mild to moderate traumatic brain injury/persistent postconcussion syndrome (mTBI/PPCS). Second, to alert readers and researchers that currently used pressurized air controls (≥21% O2, >1.0 ATA) are therapeutically active and cannot be utilized as sham controls without further validation. Review of published, peer-reviewed articles of HBOT prospective and controlled clinical trials of mTBI/PPCS symptoms. Published results demonstrate that HBOT is effective in the treatment of mTBI/PPCS symptoms. Doses of oxygen that are applied at ≥21% O2 and at pressures of >1.0 ATA produce improvements from baseline measures. Some of the recently published clinical trials are mischaracterized as sham-controlled clinical trials (i.e., sham = 21% O2/1.2-1.3 ATA), but are best characterized as dose-varying (variation in oxygen concentration, pressure applied, or both) clinical trials. Hyperbaric oxygen and hyperbaric air have demonstrated therapeutic effects on mTBI/PPCS symptoms and can alleviate posttraumatic stress disorder symptoms secondary to a brain injury in 5 out of 5 peer-reviewed clinical trials. The current use of pressurized air (1.2-1.3 ATA) as a placebo or sham in clinical trials biases the results due to biological activity that favors healing. © 2016 American Academy of Neurology.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Bob; Laughlin, Darren
Under this Department of Energy (DOE) grant, A-Tech Corporation d.b.a. Applied Technology Associates (ATA), seeks to develop a seven-degree-of-freedom (7-DOF) seismic measurement tool for high-temperature geothermal applications. The Rotational-Enabled 7-DOF Seismometer includes a conventional tri-axial accelerometer, a conventional pressure sensor or hydrophone, and a tri-axial rotational sensor. The rotational sensing capability is novel, based upon ATA's innovative research in rotational sensing technologies. The geothermal industry requires tools for high-precision seismic monitoring of crack formation associated with Enhanced Geothermal System (EGS) stimulation activity. Currently, microseismic monitoring is conducted by deploying many seismic tools at different depth levels along a 'string' withinmore » drilled observation wells. Costs per string can be hundreds of thousands of dollars. Processing data from the spatial arrays of linear seismometers allows back-projection of seismic wave states. In contrast, a Rotational-Enabled 7-DOF Seismometer would simultaneously measure p-wave velocity, s-wave velocity, and incident seismic wave direction all from a single point measurement. In addition, the Rotational-Enabled 7-DOF Seismometer will, by its nature, separate p- and s-waves into different data streams, simplifying signal processing and facilitating analysis of seismic source signatures and geological characterization. By adding measurements of three additional degrees-of-freedom at each level and leveraging the information from this new seismic observable, it is likely that an equally accurate picture of subsurface seismic activity could be garnered with fewer levels per hole. The key cost savings would come from better siting of the well due to increased information content and a decrease in the number of confirmation wells drilled, also due to the increase in information per well. Improved seismic tools may also increase knowledge, understanding, and confidence, thus removing some current blocks to feasibility and significantly increasing access to potential geothermal sites. During the Phase 1 effort summarized in this final report, the ATA Team modeled and built two TRL 3 proof-of-concept test units for two competing rotational sensor technologies. The two competing technologies were based on ATA's angular rate and angular displacement measurement technologies; Angular rate: ATA's Magnetohydrodynamic Angular Rate Sensor (Seismic MHD); and Angular displacement: ATA's Low Frequency Improved Torsional Seismometer (LFITS). In order to down-select between these two technologies and formulate a go / no go decision, the ATA Team analyzed and traded scientific performance requirements and market constraints against sensor characteristics and components, acquiring field data where possible to validate the approach and publishing results from these studies of rotational technology capability. Based on the results of Phase 1, the ATA Team finds that the Seismic MHD (SMHD) technology is the best choice for enabling rotational seismometry and significant technical potential exists for micro-seismic monitoring using a downhole 7-DOF device based on the SMHD. Recent technical papers and field data confirm the potential of rotational sensing for seismic mapping, increasing confidence that cost-reduction benefits are achievable for EGS. However, the market for geothermal rotational sensing is small and undeveloped. As a result, this report recommends modifying the Phase 2 plan to focus on prototype development aimed at partnering with early adopters within the geothermal industry and the scientific research community. The highest public benefit will come from development and deployment of a science-grade SMHD rotational seismometer engineered for geothermal downhole conditions and an integrated test tool for downhole measurements at active geothermal test sites.« less
French, Judith C; Colbert, Colleen Y; Pien, Lily C; Dannefer, Elaine F; Taylor, Christine A
2015-01-01
The Accreditation Council for Graduate Medical Education's Milestones Project focuses trainee education on the formation of valued behaviors and skills believed to be necessary for trainees to become independent practitioners. The development and refinement of behaviors and skills outlined within the milestones will require learners to monitor, reflect, and assess their own performance over time. External feedback provides an opportunity for learners to recalibrate their self-assessments, thereby enabling them to develop better self-monitoring and self-assessment skills. Yet, feedback to trainees is frequently generic, such as "great job," "nice work," or "you need to read more." In this article, we describe a feedback model that faculty can use to provide specific feedback, while increasing accountability for learners. We offer practical examples of its use in a variety of settings in the milestone era. The Ask-Tell-Ask (ATA) patient communication skills strategy, which was adapted for use as a trainee feedback model 10 years ago at our institution, is a learner-centered approach for reinforcing and modifying behaviors. The model is efficient, promotes learner accountability, and helps trainees develop reflection and self-assessment skills. A feedback agreement further enhances ATA by establishing a shared understanding of goals for the educational encounter. The ATA feedback model, combined with a feedback agreement, encourages learners to self-identify strengths and areas for improvement, before receiving feedback. Personal monitoring, reflection, self-assessment, and increased accountability make ATA an ideal learner-centered feedback model for the milestones era, which focuses on performance improvement over time. We believe the introduction of the ATA feedback model in surgical training programs is a step in the right direction towards meaningful programmatic culture change. Copyright © 2015 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.
King Ata Tag Mountain Range, western China as seen by STS-66 Atlantis
1994-11-14
The northwest-southeast trending, snow-covered, linear mountain range is the King Ata Tag Mountain, located in extreme western most China. Highest peaks are just over 20,100 feet above sea level. The town or village of Muji is located in the largest river valley that is south of this range of mountains. This area includes part of the country of Tajikistan. The center point of the photo is approximately 39.30 degrees north and 74.30 degrees easth.
Use of the Maximum Likelihood Method in the Analysis of Chamber Air Dives
1988-01-01
the total gas pressure in compartment i, P0 is the current ambient pressure, 0 [ and A and B are constants (0.0026 min-’ -ATA- and 8.31 ATA...computer model (4), the Kidd- Stubbs 1971 decompression tables (11), and the current Defence and Civil Institute 20 of Environmental Medicine (DCIEM...it could be applied. Since the models are not suitable for this test, then within T ese no-deco current limits of statistical theory, the results can
Prevalence of hypothyroidism during pregnancy in a highly specialised referral centre in Mexico.
López-Muñoz, Eunice; Ibarra-Avalos, Jorge Antonio; Chan-Verdugo, Rosario Guadalupe; Mateos-Sánchez, Leovigildo; Sánchez-Rodríguez, Olivia
2016-11-01
In order to determine the prevalence of overt and subclinical hypothyroidism, and isolated hypothyroxinemia during pregnancy, thyroid hormone reference values established by UMAE HGO4, IMSS in Mexico City and those suggested by the American Thyroid Association (ATA) were used. All pregnant patients, whose thyroid function was measured and whose pregnancy was monitored and resolved in UMAE HGO4, IMSS from 1 January to 31 December 2013, were included. Significant differences (p = .00419) were observed in the frequency of subclinical hypothyroidism, being higher when using ATA criteria (18.21% vs. 9.66%). The prevalence rate (UMAE HGO4 vs. ATA) for overt hypothyroidism was 1.11 vs. 1.63, for subclinical hypothyroidism 0.84 vs. 1.41 and for isolated hypothyroxinemia 3.17 vs. 2.79 per 1000 consults during the study period. Independently of prevalence rate, it is essential to provide information on the possible risks involved in pregnancy to all women of childbearing age at the time of hypothyroidism diagnosis.
Cordoni, Giada; Palagi, Elisabetta
2015-01-01
Animals adopt different behavioral strategies to cope with the conflict of interests coming from the competition over limited resources. Starting from the study on chimpanzees, post-conflict third-party affiliation (the affiliative contact provided by a third-party toward the victim--VTA--or the aggressor--ATA) was investigated mainly in primates. Later, this post-conflict mechanism has been demonstrated also in other mammals, such as wallabies, horses, dolphins, domestic dogs, and wolves. Here, we present data on triadic post-conflict affiliation in wolves (Canis lupus lupus) by exploring some of the hypotheses already proposed for primates and never tested before in other social mammals. In this carnivore species, the study of VTA and ATA revealed that these strategies cannot be considered as a unique behavioral category since they differ in many functional aspects. VTA serves to protect the victim by reducing the likelihood of reiterated attacks from the previous aggressor and to reinforce the relationship shared by the third-party and the victim. On the other hand, ATA has a role in bystander protection by limiting the renewed attacks of the previous aggressor toward uninvolved group-members (potential third-parties). In conclusion, exploring VTA and ATA gives the opportunity to concurrently demonstrate some functional differences in triadic post-conflict affiliation according to the different targets of bystanders (victims or aggressors). The data comparison between primates and other social mammals should permit to open new lines of research. © 2015 Wiley Periodicals, Inc.
Whole-genome sequencing of Atacama skeleton shows novel mutations linked with dysplasia
Bhattacharya, Sanchita; Li, Jian; Sockell, Alexandra; Kan, Matthew J.; Bava, Felice A.; Chen, Shann-Ching; Ávila-Arcos, María C.; Ji, Xuhuai; Smith, Emery; Asadi, Narges B.; Lachman, Ralph S.; Lam, Hugo Y.K.; Bustamante, Carlos D.; Butte, Atul J.; Nolan, Garry P.
2018-01-01
Over a decade ago, the Atacama humanoid skeleton (Ata) was discovered in the Atacama region of Chile. The Ata specimen carried a strange phenotype—6-in stature, fewer than expected ribs, elongated cranium, and accelerated bone age—leading to speculation that this was a preserved nonhuman primate, human fetus harboring genetic mutations, or even an extraterrestrial. We previously reported that it was human by DNA analysis with an estimated bone age of about 6–8 yr at the time of demise. To determine the possible genetic drivers of the observed morphology, DNA from the specimen was subjected to whole-genome sequencing using the Illumina HiSeq platform with an average 11.5× coverage of 101-bp, paired-end reads. In total, 3,356,569 single nucleotide variations (SNVs) were found as compared to the human reference genome, 518,365 insertions and deletions (indels), and 1047 structural variations (SVs) were detected. Here, we present the detailed whole-genome analysis showing that Ata is a female of human origin, likely of Chilean descent, and its genome harbors mutations in genes (COL1A1, COL2A1, KMT2D, FLNB, ATR, TRIP11, PCNT) previously linked with diseases of small stature, rib anomalies, cranial malformations, premature joint fusion, and osteochondrodysplasia (also known as skeletal dysplasia). Together, these findings provide a molecular characterization of Ata's peculiar phenotype, which likely results from multiple known and novel putative gene mutations affecting bone development and ossification. PMID:29567674
Tracking Jupiter at microwave frequencies after the 2009 impact
NASA Astrophysics Data System (ADS)
Horiuchi, Shinji; García-Miró, Cristina; Rizzo, Ricardo; Forster, James; Hofstadter, Mark; Dorcey, Ryan; Jauncey, David; de Pater, Imke; Baines, Graham; Sotuela, Ioanna
2010-05-01
On 19 July 2009, amateur astronomer Anthony Wesley located near Canberra, Australia, discovered an anomalous dark feature near Jupiter's south pole. It was soon confirmed with additional observations that the new feature was an impact site created by an unknown object. The only other observed collision with Jupiter occurred 15 years earlier with the catastrophic impact of the Shoemaker-Levy 9 Comet (SL9). Unlike the well-predicted SL9 event, the biggest question to answer this time is whether the impact body was a comet or an asteroid. We started a campaign to track Jupiter at microwave frequencies with NASA's Deep Space Network (DSN), in Canberra, Goldstone (California), and Madrid, and the Allen Telescope Array (ATA) in California. A 34m DSN radio telescope at Goldstone was operated by students through GAVRT program. Our primary goal was first to detect molecular radio emissions possibly originating from cometary core components, such as OH, H2O, and NH3, and second to detect radio burst in non-thermal continuum emissions, as observed after the SL-9 impact 15 years ago. We used a 70m radio telescope in Canberra and another 70m in Madrid to search for molecular emissions at 1.6 GHz for OH, 22 GHz for water vapors, 23 GHz for ammonia. Several radio spectroscopy observing sessions have been successfully conducted from 23 July to 1 August. We also started continuum emission monitoring, mainly at 2.3 GHz and 8.4 GHz using 34m and 70m DSN telescopes and the ATA. At early stage of this still on-going monitoring, joint observations were conducted with two 34m telescopes in Canberra and the ATA on 30 July and 9 August in order to have long continuous time coverage and to check flux density scales using a common calibrator source. To highlight this campaign, on 22 November we undertook the Jupiter: Project 24 for the International Year of Astronomy. This campaign was over 24 hours of continuous observation of Jupiter using all three DSN complexes around the world. A couple of DSN 34m telescopes were operated by students organized by two educational programs: GAVRT in California and PARTNeR in Madrid. The Jupiter: Project 24 observations were broadcasted to the world in real time via the Internet. In this talk, we will present a summary of results from the molecular emission search and the continuum flux density monitoring. The evolution of the non-thermal Jupiter radio emission after the July 2009 impact will be discussed, along with a comparison to the increase in the synchrotron radiation caused by the SL9 impact in 1994.
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
NASA Astrophysics Data System (ADS)
Susilo, Imam; Devi, Anita; Purwandhono, Azham; Hadi Warsito, Sunaryo
2017-05-01
Wound healing is a physiological process that occurs progressively through overlapping phases. Tissue oxygenation is an important part of the complex regulation for wound healing. Hyperbaric Oxygen (HBO) therapy is a method of increasing oxygen delivery to tissues. The therapy improves tissue oxygenation and stimulates the formation of H2O2 as a secondary messenger for Tumour Necrosis Factor alpha (TNF α), e-NOS, VEGF and Nuclear Factor Kappa Beta phosphorylation (NF-Kb) which play an important role in the rapid transcription of a wide variety of genes in response to extracellular stimuli. This study aims to determine the effects of Hyperbaric Oxygen therapy in enhancing the expressions of e-NOS, TNF-α, VEGF and wound healing. This study is an animal study with a ‘randomized control group of pre-test and post test design’ on 28 Wistar rats. Randomly, the rats were divided into 4 groups with 7 rats in each group. The HBO treatment group 1 received 5 sessions of HBO 2.4 ATA in 3 × 30 minutes; the HBO treatment group 2 received 10 sessions of HBO 2.4 ATA in 3 × 30 minutes; and each of the control groups were without HBO. Each of the 28 male rats were given a full thickness excisional wound of 1 × 1cm. Examinations of e-NOS, TNF-α, VEGF expressions and wound healing were performed on day-0 (pre-HBO) and day-5 HBO or on day-0 (pre-HBO) and day-10 HBO. The resultsshowthat the Hyperbaric Oxygen therapy can improve e-NOS (p=0.02), TNF-α (p= 0.02), VEGF expression (p=0.02) and wound healing (p=0.002) significantly in the provision of HBO 2.4 ATA for 3 × 30 minutes in 5 sessions over 5 consecutive days. While the 10 sessions of HBO 2.4 ATA for 3 × 30 minutes over 10 consecutive days only increase e-NOS (p=0.02), TNF-α (p=0.04), VEGF expression significantly (p=0.03) but do not improve wound healing significantly (p=0.3) compared with no HBO. The study concludes that HBO can improve the expressions of e-NOS, TNF-α, VEGF and wound healing in the provision of HBO 2.4 ATA for 3 × 30 minutes in 5 sessions, while the 10 sessions of HBO 2.4 ATA for 3 × 30 minutes only increase e-NOS, TNF-α, VEGF expression but do not improve wound healing.
2014-09-30
fingerprint sensor etc. Secure application execution Trust established outwards With normal world apps With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User
2013-03-01
DOWNLOAD .........................76 D. TEST 3 – SAME NETWORK TRACE, DIFFERENT TCP FLOW ...86 E. TEST 4 – LARGE FILE DOWNLOAD FROM WEB .............96 V...AC1( Data 1 .. 8 ~ !!. :: ~ ACK Data 3 ~ • ~~ n ata 2·Data 3 ~ >·5 I~ n , " ~ ~ -o,,.’ ~ ACKOata 3 • "~ .. ~ < . ~ ~· ’ ~ .... ~ )II...8217---: ACK Oata 61 ;£.Y.. Oat a 31 ...,. .:<: ["" D~ta 63 Da ta 32~ ata 6l .CK ... , ACK Oata 62 -’-- - I"’ < ’ o.,. 64 Data 63 ACK Data63
Pilla, R; Held, H E; Landon, C S; Dean, J B
2013-08-29
Pseudoephedrine (PSE) salts (hydrochloride and sulfate) are commonly used as nasal and paranasal decongestants by scuba divers. Anecdotal reports from the Divers Alert Network suggest that taking PSE prior to diving while breathing pure O₂ increases the risk for CNS oxygen toxicity (CNS-OT), which manifests as seizures. We hypothesized that high doses of PSE reduce the latency time to seizure (LS) in unanesthetized rats breathing 5 atmospheres absolute (ATA) of hyperbaric oxygen. Sixty-three male rats were implanted with radio-transmitters that recorded electroencephalogram activity and body temperature. After ≥7-day recovery, and 2 h before "diving", each rat was administered either saline solution (control) or PSE hydrochloride intragastrically at the following doses (mg PSE/kg): 0, 40, 80, 100, 120, 160, and 320. Rats breathed pure O₂ and were dived to 5ATA until the onset of behavioral seizures coincident with neurological seizures. LS was the time elapsed between reaching 5ATA and exhibiting seizures. We observed a significant dose-dependent decrease in the LS at doses of 100-320 mg/kg, whereas no significant differences in LS from control value were observed at doses ≤80 mg/kg. Our findings showed that high doses of PSE accelerate the onset of CNS-OT seizures in unanesthetized rats breathing 5ATA of poikilocapnic hyperoxia. Extrapolating our findings to humans, we conclude that the recommended daily dose of PSE should not be abused prior to diving with oxygen-enriched gas mixes or pure O₂. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.
Piñero, David P; Plaza, Ana Belén; Alió, Jorge L
2008-01-01
To determine the interchangeability of 2 anterior segment imaging systems: a very-high-frequency (VHF) ultrasound scanning system (Artemis 2, Ultralink LLC) and an optical coherence tomography (OCT) system (Visante, Zeiss). Vissum Instituto Oftalmologico de Alicante, Alicante, Spain. This study comprised 20 eyes without pathology or previous surgery. The anterior chamber depth (ACD), central corneal thickness (CCT), angle-to-angle distance (ATA), and the iridocorneal angle size (IAS) at the 0-degree and 180-degree positions were measured with 2 imaging techniques: VHF ultrasound scanning and OCT. Analysis of agreement and interchangeability was performed by the Bland and Altman method. In addition, each measurement was performed 3 times consecutively to determine intrasession repeatability by means of the coefficient of variation (CV) and the intraclass correlation coefficient (ICC). No statistically significant differences were found between imaging techniques in ACD, CCT, or ATA (P>.40). The ranges of agreement were 0.20 mm, 16.11 mum, and 0.80 mm for ACD, CCT, and ATA, respectively. Regarding IAS, no statistically significant differences were found in the nasal (P = .78) or temporal (P = .63) measurements between devices. However, the range of agreement for nasal (14.3 degrees) and temporal (14.90 degrees) values was relevant, indicating the 2 techniques cannot be used interchangeably for IAS measurement. Excellent intrasession repeatability scores were obtained (CV and ICC). The Artemis 2 and the Visante OCT systems provide equivalent and repeatable measurements of the ACD, CCT, and ATA and can be used interchangeably for these purposes.
Whole-genome sequencing of Atacama skeleton shows novel mutations linked with dysplasia.
Bhattacharya, Sanchita; Li, Jian; Sockell, Alexandra; Kan, Matthew J; Bava, Felice A; Chen, Shann-Ching; Ávila-Arcos, María C; Ji, Xuhuai; Smith, Emery; Asadi, Narges B; Lachman, Ralph S; Lam, Hugo Y K; Bustamante, Carlos D; Butte, Atul J; Nolan, Garry P
2018-04-01
Over a decade ago, the Atacama humanoid skeleton (Ata) was discovered in the Atacama region of Chile. The Ata specimen carried a strange phenotype-6-in stature, fewer than expected ribs, elongated cranium, and accelerated bone age-leading to speculation that this was a preserved nonhuman primate, human fetus harboring genetic mutations, or even an extraterrestrial. We previously reported that it was human by DNA analysis with an estimated bone age of about 6-8 yr at the time of demise. To determine the possible genetic drivers of the observed morphology, DNA from the specimen was subjected to whole-genome sequencing using the Illumina HiSeq platform with an average 11.5× coverage of 101-bp, paired-end reads. In total, 3,356,569 single nucleotide variations (SNVs) were found as compared to the human reference genome, 518,365 insertions and deletions (indels), and 1047 structural variations (SVs) were detected. Here, we present the detailed whole-genome analysis showing that Ata is a female of human origin, likely of Chilean descent, and its genome harbors mutations in genes ( COL1A1 , COL2A1 , KMT2D , FLNB , ATR , TRIP11 , PCNT ) previously linked with diseases of small stature, rib anomalies, cranial malformations, premature joint fusion, and osteochondrodysplasia (also known as skeletal dysplasia). Together, these findings provide a molecular characterization of Ata's peculiar phenotype, which likely results from multiple known and novel putative gene mutations affecting bone development and ossification. © 2018 Bhattacharya et al.; Published by Cold Spring Harbor Laboratory Press.
Lee, Ji Hye; Han, Kyunghwa; Kim, Eun-Kyung; Moon, Hee Jung; Yoon, Jung Hyun; Park, Vivian Y; Kwak, Jin Young
2017-11-01
The purpose of this study was to validate the modified 4-tiered categorization system and to compare stratification of malignancy risk in small thyroid nodules with the 2015 American Thyroid Association (ATA) management guidelines. From January 2015 to December 2015, 737 thyroid nodules measured ≥ 1 cm and <2 cm were included in this study. Each nodule was assigned a category with the ultrasonographic patterns described by the 2015 ATA guidelines. On univariate analysis, there was no difference of malignancy risk between low suspicion and very low suspicion nodules (P = .584). Therefore, we suggested a modified 4-tiered categorization, which combines very low suspicion and low suspicion nodules into the "revised low suspicion" category. Specificity, positive predictive value (PPV) and accuracy were higher with the modified 4-tiered categorization system (P < .001 for all). The modified 4-tiered categorization system allows more efficient management with better diagnostic performance than the 2015 ATA categorization system in small thyroid nodules. © 2017 Wiley Periodicals, Inc.
Han, Yin-Lung; Wu, Jen-Hao; Cheng, Chieh-Lun; Nagarajan, Dillirani; Lee, Ching-Ray; Li, Yi-Heng; Lo, Yung-Chung; Chang, Jo-Shu
2017-09-01
Biosorption has emerged as a promising alternative approach for treating wastewater with dilute metal contents in a green and cost effective way. In this study, extracellular proteins of an isolated thermophilic bacterium (Tepidimonas fonticaldi AT-A2) were used as biosorbent to recover precious metal (i.e., Au) from wastewater. The Au (III) adsorption capacity on the T. fonticaldi AT-A2 proteins was the highest when the pH was set at about 4.0-5.0. The adsorption capacity increased with increasing temperature from 15 to 70°C. Adsorption isotherm studies show that both Langmuir and Freundrich models could describe the adsorption equilibrium. The maximum adsorption capacity of Au (III) at 50°C and pH 5 could reach 9.7mg Au/mg protein. The protein-based biosorbent was also used for the recovery of Au from a wastewater containing 15mg/L of Au, achieving a high adsorption capacity of 1.45mg Au/mg protein and a removal efficiency of 71%. Copyright © 2017 Elsevier Ltd. All rights reserved.
2010-12-01
l layout, a t racer test was conducted t o ve rify the gr oundwater hydraulic c onditions i n t he t reatment c ells. D ata c ollected i n s upport...no t expe cted to affect d ata interpretation for the E R-0513 demonstration be cause future bi odegradation would cause further f ractionation of...DHC bacteria (as m easured by qPCR analysis) a t a gi ving m onitoring l ocation f ollowing i noculation. T his travel t ime was then compared to the
Siekiera, Urszula; Jarosz-Chobot, P; Janusz, J; Koehler, Brygida
2002-01-01
Type 1 diabetes is a genetically conditioned autoimmune disease. Genes that account for strong clustering of the disease susceptibility are located within the HLA region. There is also considerable individual variation in the immune response and role of cytokine genes in the disease predisposition. The aim of our research was identification of the genetically controlled TNF-alpha, IL-10, IL-6, IFN-gamma secretion profile in children with diabetes type 1. We have examined 36 children with diabetes type 1 and 36 healthy individuals. DNA was extracted from mononuclear peripheral blood cells. For identification of the cytokine polymorphism PCR-SSP method was used. Patients with diabetes type 1 differ from the group of healthy persons in the cytokine synthesis level and in the cytokine genotypes distribution. Genotype TNF-alpha (A/G) as well as IL-10 (ATA/ATA) was found only in group of children with diabetes but not in the control group. Genotypes IL-10 (GCC/GCC), IL-6 (C/C), IFN-gamma (T/T) were observed with decreased frequency in children with diabetes type 1. No differences between patients and control group in the frequency of IL-10 (GCC/ACC) (GCC/ATA), (ACC/ACC) (ACC/ATA) IL-6 (G/G), (G/C) and IFN-gamma (T/A), (A/A) genotypes were observed. Children with diabetes type 1 were more frequent "high producers" of TNF-alpha and IL-6. It is possible to us molecular method to estimate the genetically controlled immune reactivity. It is a very important immunogenetic factor of the disease predisposition.
Alignment and bit extraction for secure fingerprint biometrics
NASA Astrophysics Data System (ADS)
Nagar, A.; Rane, S.; Vetro, A.
2010-01-01
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
Optical security features for plastic card documents
NASA Astrophysics Data System (ADS)
Hossick Schott, Joachim
1998-04-01
Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.
Secure image retrieval with multiple keys
NASA Astrophysics Data System (ADS)
Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang
2018-03-01
This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.
Estimating airline operating costs
NASA Technical Reports Server (NTRS)
Maddalon, D. V.
1978-01-01
A review was made of the factors affecting commercial aircraft operating and delay costs. From this work, an airline operating cost model was developed which includes a method for estimating the labor and material costs of individual airframe maintenance systems. The model, similar in some respects to the standard Air Transport Association of America (ATA) Direct Operating Cost Model, permits estimates of aircraft-related costs not now included in the standard ATA model (e.g., aircraft service, landing fees, flight attendants, and control fees). A study of the cost of aircraft delay was also made and a method for estimating the cost of certain types of airline delay is described.
View of STS-129 MS2 Bresnik during EVA3
2009-11-23
ISS021-E-031628 (23 Nov. 2009) --- Astronaut Randy Bresnik, STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Bresnik and Robert L. Satcher Jr. (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS2 Bresnik during EVA3
2009-11-23
ISS021-E-031645 (23 Nov. 2009) --- Astronaut Randy Bresnik, STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Bresnik and Robert L. Satcher Jr. (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS2 Bresnik during EVA3
2009-11-23
ISS021-E-031673 (23 Nov. 2009) --- Astronaut Randy Bresnik, STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Bresnik and Robert L. Satcher Jr. (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
The impact of the UGT1A1*60 allele on bilirubin serum concentrations.
Pasternak, Amy L; Crews, Kristine R; Caudle, Kelly E; Smith, Colton; Pei, Deqing; Cheng, Cheng; Broeckel, Ulrich; Gaur, Aditya H; Hankins, Jane; Relling, Mary V; Haidar, Cyrine E
2017-01-01
Identify the functional status of the uridine-diphosphate glucuronyl transferase 1A1 (UGT1A1) -3279T>G (*60) variant. Retrospective review of clinically obtained serum bilirubin concentrations in pediatric patients to evaluate the association of the UGT1A1 -3279T>G (*60) variant with bilirubin concentrations and assessed linkage disequilibrium of the UGT1A1 -3279T>G (*60) and A(TA)7TAA (*28) variants. Total bilirubin concentration did not differ between patients who had a UGT1A1*1/*1 diplotype and patients homozygous for the UGT1A1 -3279T>G (*60/*60) variant. Total bilirubin concentration was lower in patients homozygous for the UGT1A1 -3279T>G (*60/*60) variant than in patients homozygous for the UGT1A1 A(TA)7TAA (*28/*28) variant (p < 0.01). The -3279T>G (*60) and A(TA)7TAA (*28) variants were in strong incomplete linkage disequilibrium in both black and white patients. The presence of the UGT1A1 -3279T>G (*60) variant is not associated with increased bilirubin concentrations.
Zhang, Jingyi; Wang, Xiaoping; Gong, Ping; Wang, Chuanfei; Sun, Dianchao
2018-06-08
Over the past few decades, the Tibetan Plateau (TP) region has become gradually contaminated by persistent organic pollutants (POPs). The picture regarding POPs is clear in the central and southern parts of the TP; however, few observational campaigns have focused on the western TP. To clarify the concentrations, seasonal trends and source regions of POPs in the western TP, a first study of POPs in Muztagh Ata (westerly region) and a long-term (5 years) monitoring program in Ngari (transect region influenced by both the Indian monsoon and westerly climate) were conducted. Except for hexachlorobenzene (HCB) and polychlorinated biphenyls (PCBs), relatively low POP levels were observed in the western TP. In Muztagh Ata, dichlorodiphenyltrichloroethanes (DDTs) showed higher concentrations in winter and lower ones in summer, whereas at Ngari, higher DDTs and hexachlorocyclohexanes (HCHs) concentrations were observed in summer as compared with winter. Source diagnosis indicated that Xinjiang and central Asia were the main source regions for POPs in Muztagh Ata and that westerly winds play a key role in transporting POPs from central Asia. No correlation was found between the height of the atmospheric boundary layer and the concentrations of POPs over the TP.
5 CFR 9701.311 - Major features.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Major features. 9701.311 Section 9701.311 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
View of STS-129 MS4 Satcher during EVA3
2009-11-23
ISS021-E-032068 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
ISS021-E-031706 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
ISS021-E-032066 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS2 Bresnik during EVA3
2009-11-23
S129-E-008006 (23 Nov. 2009) --- Astronaut Randy Bresnik, STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Bresnik and astronaut Robert L. Satcher Jr. (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
S129-E-008120 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
ISS021-E-031703 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
ISS021-E-031717 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS2 Bresnik and MS4 Satcher during EVA3
2009-11-23
S129-E-008248 (23 Nov. 2009) --- Astronauts Randy Bresnik (right) and Robert L. Satcher Jr. (top left), both STS-129 mission specialists, participate in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Bresnik and Satcher removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS2 Bresnik during EVA3
2009-11-23
S129-E-008010 (23 Nov. 2009) --- Astronaut Randy Bresnik, STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Bresnik and astronaut Robert L. Satcher Jr. (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
S129-E-008103 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
ISS021-E-031705 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
View of STS-129 MS4 Satcher during EVA3
2009-11-23
S129-E-008115 (23 Nov. 2009) --- Astronaut Robert L. Satcher Jr., STS-129 mission specialist, participates in the mission's third and final session of extravehicular activity (EVA) as construction and maintenance continue on the International Space Station. During the five-hour, 42-minute spacewalk, Satcher and astronaut Randy Bresnik (out of frame), mission specialist, removed a pair of micrometeoroid and orbital debris shields from the Quest airlock and strapped them to the External Stowage Platform #2, then moved an articulating foot restraint to the airlock, and released a bolt on a starboard truss ammonia tank assembly (ATA) in preparation for an STS-131 spacewalk that will replace the ATA.
2010-05-01
shown. (E) Cap-dependent ( gray bars) and IRES-dependent (black bars) translation in MEFs as measured by Renilla and Firefly luciferase activities...AGC ATC AAC C; EPHA2-R, GTG ACC TCG TAC TTC CAC ACT C. HER3-F, CGA TGC TGA GAA CCA ATA CCA G; HER3-R, ATA GCC TGT CAC TTC TCG AAT C. INSR-F, GGA AGT...TAC GTC TGA TTC GAG G; INSR-R, TGA GTG ATG GTG AGG TTG TG. IGF1R-F, CCT GCA CAA CTC CAT CTT CGT G; IGF1R-R, CGG TGA TGT TGT AGG TGT CTG C. EGFR-F
2008-04-01
designed in this study: Mg4718-F: 5’-GCA TTT TGA TCC CTT ATA ATA CA-3’ Mg4718-R: 5’- GTG GAA GAC CCT TGA ATG G-3’ Mg4723-F: 5’-GCA TAG CCA ACA AAA...GAA ATC TAA TG-3’ Mg4723-R: 5’-GCA GTG TAG CTC AGT GGT AGA TCA C-3’ After each cross, the progenies were genotyped as described above. We have also...mutant F2 mice. PPD is a likelihood statistic that gives rise to the 95% confidence intervals, which is indicated by gray horizontal bars. cM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Benford, James N.; Benford, Dominic J., E-mail: jimbenford@gmail.com
The most observable leakage radiation from an advanced civilization may well be from the use of power beaming to transfer energy and accelerate spacecraft. Applications suggested for power beaming involve launching spacecraft to orbit, raising satellites to a higher orbit, and interplanetary concepts involving space-to-space transfers of cargo or passengers. We also quantify beam-driven launch to the outer solar system, interstellar precursors, and ultimately starships. We estimate the principal observable parameters of power beaming leakage. Extraterrestrial civilizations would know their power beams could be observed, and so could put a message on the power beam and broadcast it for ourmore » receipt at little additional energy or cost. By observing leakage from power beams we may find a message embedded on the beam. Recent observations of the anomalous star KIC 8462852 by the Allen Telescope Array (ATA) set some limits on extraterrestrial power beaming in that system. We show that most power beaming applications commensurate with those suggested for our solar system would be detectable if using the frequency range monitored by the ATA, and so the lack of detection is a meaningful, if modest, constraint on extraterrestrial power beaming in that system. Until more extensive observations are made, the limited observation time and frequency coverage are not sufficiently broad in frequency and duration to produce firm conclusions. Such beams would be visible over large interstellar distances. This implies a new approach to the SETI search: instead of focusing on narrowband beacon transmissions generated by another civilization, look for more powerful beams with much wider bandwidth. This requires a new approach for their discovery by telescopes on Earth. Further studies of power beaming applications should be performed, potentially broadening the parameter space of the observable features that we have discussed here.« less
Power Beaming Leakage Radiation as A SETI Observable
NASA Technical Reports Server (NTRS)
Benford, James N.; Benford, Dominic J.
2016-01-01
The most observable leakage radiation from an advanced civilization may well be from the use of power beam-ing to transfer energy and accelerate spacecraft. Applications suggested for power beaming involve launching spacecraft to orbit, raising satellites to a higher orbit, and interplanetary concepts involving space-to-space transfers of cargo or passengers. We also quantify beam-driven launch to the outer solar system, interstellar precursors and ultimately starships. We estimate the principal observable parameters of power beaming leak-age. Extraterrestrial civilizations would know their power beams could be observed, and so could put a message on the power beam and broadcast it for our receipt at little additional energy or cost. By observing leakage from power beams we may find a message embedded on the beam. Recent observations of the anomalous star KIC8462852 by the Allen Telescope Array (ATA) set some limits on extraterrestrial power beaming in that system.We show that most power beaming applications commensurate with those suggested for our solar system would be detectable if using the frequency range monitored by the ATA, and so the lack of detection is a meaningful,if modest, constraint on extraterrestrial power beaming in that system. Until more extensive observations are made, the limited observation time and frequency coverage are not sufficiently broad in frequency and duration to produce firm conclusions. Such beams would be visible over large interstellar distances. This implies a new approach to the SETI search: Instead of focusing on narrowband beacon transmissions generated by another civilization, look for more powerful beams with much wider bandwidth. This requires a new approach for their discovery by telescopes on Earth. Further studies of power beaming applications should be done, which could broaden the parameter space of observable features we have discussed here.
Dziewit, Lukasz; Jazurek, Magdalena; Drewniak, Lukasz; Baj, Jadwiga; Bartosik, Dariusz
2007-03-01
A group of proteic toxin-antitoxin (TA) cassettes whose representatives are widely distributed among bacterial genomes has been identified. These cassettes occur in chromosomes, plasmids, bacteriophages, and noncomposite transposons, as well as in the SXT conjugative element of Vibrio cholerae. The following four homologous loci were subjected to detailed comparative studies: (i) tad-ata from plasmid pAMI2 of Paracoccus aminophilus (the prototype of this group), (ii) gp49-gp48 from the linear bacteriophage N15 of Escherichia coli, (iii) s045-s044 from SXT, and (iv) Z3230-Z3231 from the genomic island of enterohemorrhagic Escherichia coli O157:H7 strain EDL933. Functional analysis revealed that all but one of these loci (Z3230-Z3231) are able to stabilize heterologous replicons, although the host ranges varied. The TA cassettes analyzed have the following common features: (i) the toxins are encoded by the first gene of each operon; (ii) the antitoxins contain a predicted helix-turn-helix motif of the XRE family; and (iii) the cassettes have two promoters that are different strengths, one which is located upstream of the toxin gene and one which is located upstream of the antitoxin gene. All four toxins tested are functional in E. coli; overexpression of the toxins (in the absence of antitoxin) results in a bacteriostatic effect manifested by elongation of bacterial cells and growth arrest. The toxins have various effects on cell viability, which suggests that they may recognize different intracellular targets. Preliminary data suggest that different cellular proteases are involved in degradation of antitoxins encoded by the loci analyzed.
Power Beaming Leakage Radiation as a SETI Observable
NASA Astrophysics Data System (ADS)
Benford, James N.; Benford, Dominic J.
2016-07-01
The most observable leakage radiation from an advanced civilization may well be from the use of power beaming to transfer energy and accelerate spacecraft. Applications suggested for power beaming involve launching spacecraft to orbit, raising satellites to a higher orbit, and interplanetary concepts involving space-to-space transfers of cargo or passengers. We also quantify beam-driven launch to the outer solar system, interstellar precursors, and ultimately starships. We estimate the principal observable parameters of power beaming leakage. Extraterrestrial civilizations would know their power beams could be observed, and so could put a message on the power beam and broadcast it for our receipt at little additional energy or cost. By observing leakage from power beams we may find a message embedded on the beam. Recent observations of the anomalous star KIC 8462852 by the Allen Telescope Array (ATA) set some limits on extraterrestrial power beaming in that system. We show that most power beaming applications commensurate with those suggested for our solar system would be detectable if using the frequency range monitored by the ATA, and so the lack of detection is a meaningful, if modest, constraint on extraterrestrial power beaming in that system. Until more extensive observations are made, the limited observation time and frequency coverage are not sufficiently broad in frequency and duration to produce firm conclusions. Such beams would be visible over large interstellar distances. This implies a new approach to the SETI search: instead of focusing on narrowband beacon transmissions generated by another civilization, look for more powerful beams with much wider bandwidth. This requires a new approach for their discovery by telescopes on Earth. Further studies of power beaming applications should be performed, potentially broadening the parameter space of the observable features that we have discussed here.
NASA Technical Reports Server (NTRS)
Gelfand, R.; Lambertsen, C. J.; Clark, J. M.; Hopkin, E.
1998-01-01
Potential adverse effects on the O2-sensing function of the carotid body when its cells are exposed to toxic O2 pressures were assessed during investigations of human organ tolerance to prolonged continuous and intermittent hyperoxia (Predictive Studies V and VI). Isocapnic hypoxic ventilatory responses (HVR) were determined at 1.0 ATA before and after severe hyperoxic exposures: 1) continuous O2 breathing at 1.5, 2.0, and 2.5 ATA for 17.7, 9.0, and 5.7 h and 2) intermittent O2 breathing at 2.0 ATA (30 min O2-30 min normoxia) for 14.3 O2 h within 30-h total time. Postexposure curvature of HVR hyperbolas was not reduced compared with preexposure controls. The hyperbolas were temporarily elevated to higher ventilations than controls due to increments in respiratory frequency that were proportional to O2 exposure time, not O2 pressure. In humans, prolonged hyperoxia does not attenuate the hypoxia-sensing function of the peripheral chemoreceptors, even after exposures that approach limits of human pulmonary and central nervous system O2 tolerance. Current applications of hyperoxia in hyperbaric O2 therapy and in subsea- and aerospace-related operations are guided by and are well within these exposure limits.
Evaluation of security algorithms used for security processing on DICOM images
NASA Astrophysics Data System (ADS)
Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.
2005-04-01
In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.
Hyperbaric pressure effects measured by growth of a transplantable tumor in the C3H/HeN mouse.
Herndon, B L; Lally, J J
1984-09-01
Both hypobaric exposure at 0.5 atmospheres absolute (ATA) and hyperbaric pressure exposure at 3.5-8 ATA slowed transplantable tumor growth. These experiments detailed the hyperbaric pressure exposure. C3H/HeN-MTV+ mice, bearing the 16/C transplantable murine mammary adenocarcinoma and exposed to 18 days' treatment by a hyperbaric chamber at 3.5-8 ATA, had tumor weights that averaged 50-75% less than the tumor weights in mice caged at ambient ("sea level") pressure. A series of experiments was run to investigate this response to hyperbaric pressure exposure. After mice underwent continuous exposure to 3.5-8 ATA normoxic (normal oxygen) hyperbaric pressure with use of either argon or nitrogen inert gas, which began 3 days after tumor inoculation, tumors were removed at about 3 weeks' growth from these pressure-exposed mice and measured for growth by weighing. Final tumor weight in pressure-exposed experimental mice was significantly less than tumor weight in paired groups of tumor-bearing controls that received no hyperbaric pressure. Tumor weight was inversely related to pressure "dose," although the small pressure range produced an effect at all pressures used. The number of compression-decompression cycles to which the animals were subjected, however, was related positively to tumor weight at necropsy. Continued tumor growth in mice subjected to frequent pressure change (in conjunction with pressure exposure that otherwise limited tumor size) was unexplained by these experiments. The greatest difference between tumor weights in controls and pressure-exposed animals was seen with 2 weeks' continuous pressure exposure. A limited profile of blood tests was performed, and these reflected only minor, expected change in the pressure-exposed experimental animals. The data at hand did not suggest a mechanism by which chronic normoxic hyperbaric pressure limited tumor size.
Silvestre, M A; Alfonso, J; García-Mengual, E; Salvador, I; Duque, C C; Molina, I
2007-05-01
The aim of this work was to study the effect of recombinant human (rh) FSH and LH on in vitro maturation of pig oocytes compared with a conventional hormonal supplement based on equine (PMSG) and human chorionic gonadotropins (hCG), as evaluated by the developmental ability of 3 types of pig embryos obtained by in vitro fertilization (IVF), intracytoplasmic sperm injection (ICSI), or artificial activation (ATA). In Exp. 1, one cumulus-oocyte complex group (A group) was supplemented with rh-FSH and rh-LH (0.1 IU/mL each), and the other group (B group) was supplemented with PMSG and hCG (10 IU/mL each). No differences in nuclear maturation between the A and B groups were observed (68.5 vs. 71.4%, respectively). No differences were detected between hormonal treatments in the rates of cleavage or blastocyst formation of ATA, IVF, and ICSI embryos. Total cell number of the embryos was not significantly different in any experimental group (A: 31.1, 28.5, and 19.8 vs. B: 25.2, 25.5, and 20.6 for ATA, IVF, and ICSI embryos, respectively). In Exp. 2, the effects of different concentrations of rh-FSH and rh-LH (0.5, 0.1, or 0.05 IU/mL) in maturation medium on nuclear maturation and in vitro development of embryos obtained by IVF were studied. No effect of different hormonal concentrations on blastocyst formation rates was observed (8.5, 13.0, and 5.7%, respectively). Blastocyst cell number was not different in any experimental group. In conclusion, the results obtained here permit us to substitute PMSG and hCG with rh-FSH and rh-LH and to produce pig embryos obtained by IVF, ICSI, or ATA.
2013-01-01
The use of bioactive antioxidants in feed of broiler to mitigate reactive oxygen species (ROS) in biological systems is one of promising nutritional strategies. The aim of present study was to alleviate ROS production in mitochondrial fraction (MF) of meat by supplemented dietary antioxidant in feed of broiler. For this purpose, mitochondria specific antioxidant: α-lipoic acid (25 mg, 75 mg and 150 mg) with or without combination of α-tocopherol acetate (200 mg) used in normal and palm olein oxidized oil (4%) supplemented feed. One hundred and eighty one day old broiler birds were randomly divided into six treatments and provided the mentioned feed from third week. Feed intake, feed conversion ratio (FCR) remained statistically same in all groups while body weight decreased in supplemented groups accordingly at the end of study. The broiler meat MF antioxidant potential was significantly improved by feeding supplemented feed estimated as 1,1-di phenyl-2-picrylhydrazyl (DPPH) free radical scavenging activity, 2,2-azinobis-(3- ethylbenzothiazoline-6-sulphonic acid) (ABTS+) and thiobarbituric acid reactive substances (TBARS). The maximum antioxidant activity was depicted in group fed on 150 mg/kg α-lipoic acid (ALA) and 200 mg/kg α-tocopherol acetate (ATA) (T4) in both breast and leg MF. Moreover, TBARS were higher in leg as compared to breast MF. Although, oxidized oil containing feed reduced the growth, lipid stability and antioxidant potential of MF whilst these traits were improved by receiving feed containing ALA and ATA. ALA and ATA showed higher deposition in T4 group while least in group received oxidized oil containing feed (T5). Positive correlation exists between DPPH free radical scavenging activity and the ABTS + reducing activity. In conclusion, ALA and ATA supplementation in feed had positive effect on antioxidant status of MF that consequently diminished the oxidative stress in polyunsaturated fatty acid enriched meat. PMID:23617815
A 2011 survey of clinical practice patterns in the management of Graves' disease.
Burch, Henry B; Burman, Kenneth D; Cooper, David S
2012-12-01
More than two decades have passed since members from the American Thyroid Association (ATA), European Thyroid Association, and Japan Thyroid Association were surveyed on management practices for patients with hyperthyroidism due to Graves' disease (GD). We sought to document current practices in the management of GD and compare these results both to those documented in earlier surveys and to practice recommendations made in the 2011 ATA/American Association of Clinical Endocrinologists (AACE) hyperthyroidism practice guidelines. Lastly, we sought to examine differences in GD management among international members of U.S.-based endocrine societies. Members of The Endocrine Society (TES), ATA, and AACE were invited to participate in a web-based survey dealing with testing, treatment preference, and modulating factors in patients with GD. A total of 730 respondents participated in the survey, 696 of whom completed all sections. Respondents included 641 TES members, 330 AACE members, and 157 ATA members. The preferred mode of therapy in uncomplicated GD was antithyroid drugs (ATDs) by 53.9% of respondents, radioactive iodine (RAI) therapy by 45.0%, and thyroid surgery in 0.7%. Compared with 1991, fewer U.S. (59.7 vs. 69%) and European (13.3% vs. 25%) respondents would use RAI therapy. Methimazole and carbimazole were the preferred ATDs, with only 2.7% of respondents selecting propylthiouracil. Patients with Graves' ophthalmopathy were treated with ATDs (62.9%) or surgery (18.5%) and less frequently with RAI plus corticosteroids (16.9%) or RAI alone (1.9%). Striking changes have occurred in the management of GD over the past two decades, with a shift away from RAI and toward ATDs in patients with uncomplicated GD. Apparent international differences persist but should be interpreted with caution. Current practices diverge in some areas from recently published guidelines; these differences should be assessed serially to determine the impact of the guidelines on future clinical practice.
Adversarial Feature Selection Against Evasion Attacks.
Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio
2016-03-01
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.
Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A
2013-10-01
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
The Influence of Intrinsic and Extrinsic Factors on Neurogenesis
2008-07-31
ACG AAT TGA GCA ATA ACG GTG ATG GCG ATA GTA AGA ACA GTT C 49 Table II-2. Sequence information and physical characteristics of...CTC TGA GCT AGT 550 50 24 60.15 3’mAT-O GTG ACA CTA GCA GAC CAG ATT CCT 550 50 24 61.08 5’mAT-N GCC TCT GAG CTA GTA TGT GTC ATC 274 50 24 59.46 3...8217mAT-N CCA TCA CCT TCT CCT TTC TAG GTC 274 50 24 61.64 5’rAT-O TTT AGC TCA GTG GTA GAG CGC 257 52 21 56 3’rAT-O GTT TCT GCC CTT TCC AAC TGC 257 52 21
How do you select the right security features for your company's products
NASA Astrophysics Data System (ADS)
Pickett, Gordon E.
1998-04-01
If your company manufacturers, supplies, or distributes products of almost any type, style, shape, or for any usage, they may become the objective of fraudulent activities from one or more sources. Therefore, someone at your company should be concerned about how these activities may affect the company's future. This paper/presentation will provide information about where these 'threats' may come from, what products have been compromised in the past, and what steps might be taken to deter these threats. During product security conferences, conversations, and other sources of information, you'll hear about many different types of security features that can be incorporated into monetary and identification documents, packaging, labeling, and other products/systems to help protect against counterfeiting, unauthorized tampering, or to identify 'genuine' products. Many of these features have been around for some time (which means that they may have lost at least some of their effectiveness) while others, or improved versions of some of the more mature features, have been or are being developed. This area is a 'moving target' and re-examination of the threats and counterthreats needs to be an ongoing activity. The 'value' and the capabilities of these features can sometimes be overstated, i.e. that a feature/system can solve all of the security-related problems that you may (or may not) have with your products. A couple of things to always keep in mind is that no feature(s) is universally effective and none of the features, or even combinations of features, is totally 'tamperproof' or counterfeitproof, irrespective of what may be said or claimed. So how do you go about determining if you have a product security problem and what, if any, security features might be used to reduce the threat(s) to your products? This paper will attempt to provide information to help you separate the 'wheat from the chaff' in these considerations. Specifically, information to be discussed in this paper will attempt to assist you and your associates define (1) what products are or may be under threat and how many different ways the product(s) might be compromised, (2) who might attempt to compromise your company's product(s), (3) what product security features may be effective in deterring the perceived threats, (4) how many deterrent features are needed, and should the features be overt, covert, or a combination of the two, (5) how will the candidate features hold up in the 'usage' environment, and (6) who will 'validate' the features and what skill levels, or auxiliary equipment, will be needed? Obviously, the cost effectiveness for adding possible security features to the product(s) needs to be considered, but more than just the cost of the feature, or the value of the product, needs to be factored into these considerations. For example, the effect of any compromise on the company's reputation and legal liabilities. This paper obviously can not provide all of the 'answers' but will attempt to provide you with 'food for thought.'
Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction
NASA Astrophysics Data System (ADS)
Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang
2011-02-01
Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to address the problem of secure SIFT feature extraction and representation in the encrypted domain. Since all the operations in SIFT must be moved to the encrypted domain, we propose a homomorphic encryption-based secure SIFT method for privacy-preserving feature extraction and representation based on Paillier cryptosystem. In particular, homomorphic comparison is a must for SIFT feature detection but is still a challenging issue for homomorphic encryption methods. To conquer this problem, we investigate a quantization-like secure comparison strategy in this paper. Experimental results demonstrate that the proposed homomorphic encryption-based SIFT performs comparably to original SIFT on image benchmarks, while preserving privacy additionally. We believe that this work is an important step toward privacy-preserving multimedia retrieval in an environment, where privacy is a major concern.
NASA Astrophysics Data System (ADS)
Lushnikov, D. S.; Zherdev, A. Y.; Odinokov, S. B.; Markin, V. V.; Smirnov, A. V.
2017-05-01
Visual security elements used in color holographic stereograms - three-dimensional colored security holograms - and methods their production is describes in this article. These visual security elements include color micro text, color-hidden image, the horizontal and vertical flip - flop effects by change color and image. The article also presents variants of optical systems that allow record the visual security elements as part of the holographic stereograms. The methods for solving of the optical problems arising in the recording visual security elements are presented. Also noted perception features of visual security elements for verification of security holograms by using these elements. The work was partially funded under the Agreement with the RF Ministry of Education and Science № 14.577.21.0197, grant RFMEFI57715X0197.
Qualification of security printing features
NASA Astrophysics Data System (ADS)
Simske, Steven J.; Aronoff, Jason S.; Arnabat, Jordi
2006-02-01
This paper describes the statistical and hardware processes involved in qualifying two related printing features for their deployment in product (e.g. document and package) security. The first is a multi-colored tiling feature that can also be combined with microtext to provide additional forms of security protection. The color information is authenticated automatically with a variety of handheld, desktop and production scanners. The microtext is authenticated either following magnification or manually by a field inspector. The second security feature can also be tile-based. It involves the use of two inks that provide the same visual color, but differ in their transparency to infrared (IR) wavelengths. One of the inks is effectively transparent to IR wavelengths, allowing emitted IR light to pass through. The other ink is effectively opaque to IR wavelengths. These inks allow the printing of a seemingly uniform, or spot, color over a (truly) uniform IR emitting ink layer. The combination converts a uniform covert ink and a spot color to a variable data region capable of encoding identification sequences with high density. Also, it allows the extension of variable data printing for security to ostensibly static printed regions, affording greater security protection while meeting branding and marketing specifications.
AGARWAL, SANDEEP K.; GOURH, PRAVITT; SHETE, SANJAY; PAZ, GENE; DIVECHA, DIPAL; REVEILLE, JOHN D.; ASSASSI, SHERVIN; TAN, FILEMON K.; MAYES, MAUREEN D.; ARNETT, FRANK C.
2010-01-01
Objective IL23R has been identified as a susceptibility gene for development of multiple autoimmune diseases. We investigated the possible association of IL23R with systemic sclerosis (SSc), an autoimmune disease that leads to the development of cutaneous and visceral fibrosis. Methods We tested 9 single-nucleotide polymorphisms (SNP) in IL23R for association with SSc in a cohort of 1402 SSc cases and 1038 controls. IL23R SNP tested were previously identified as SNP showing associations with inflammatory bowel disease. Results Case-control comparisons revealed no statistically significant differences between patients and healthy controls with any of the IL23R polymorphisms. Analyses of subsets of SSc patients showed that rs11209026 (Arg381Gln variant) was associated with anti-topoisomerase I antibody (ATA)-positive SSc (p = 0.001)) and rs11465804 SNP was associated with diffuse and ATA-positive SSc (p = 0.0001, p = 0.0026, respectively). These associations remained significant after accounting for multiple comparisons using the false discovery rate method. Wild-type genotype at both rs11209026 and rs11465804 showed significant protection against the presence of pulmonary hypertension (PHT). (p = 3×10−5, p = 1×10−5, respectively). Conclusion Polymorphisms in IL23R are associated with susceptibility to ATA-positive SSc and protective against development of PHT in patients with SSc. PMID:19918037
Falfán-Valencia, Ramcés; Pavón-Romero, Gandhi F; Camarena, Angel; García, María de la Luz; Galicia-Negrete, Gustavo; Negrete-García, María Cristina; Teran, Luis Manuel
2012-01-01
Aspirin exacerbated respiratory disease (AERD) is characterized by chronic hyperplastic rhinosinusitis, nasal polyposis, asthma, and aspirin sensitivity. The mechanisms which produce these manifestations of intolerance are not fully defined, current research focuses on cyclooxygenase 1 (COX-1) inhibition, metabolism of arachidonic acid, and the COX pathway to the lipoxygenase (LO) route, inducing increased synthesis of leukotrienes (LT). The biological plausibility of this model has led to the search for polymorphisms in genes responsible for proinflammatory cytokines synthesis, such as IL1B and IL8. We performed a genetic association study between IL8-251 (rs4073) and IL1B-511 (rs16944) polymorphisms in AERD, aspirin-tolerant asthma (ATA), and healthy control subjects. Using allelic discrimination by real-time PCR, we found statistically nonsignificant associations between AERD, ATA, and healthy control subjects for the GG and GA genotypes of IL1B (rs16944). Interestingly, the AA genotype showed an increased frequency in the AERD patients versus the ATA group (GF = 0.19 versus 0.07, p = 0.018, OR 2.98, and 95% CI 1.17-7.82). This is the first observation that IL1B polymorphisms are involved in AERD. Thus, future studies must investigate whether interleukin-1β is released in the airways of AERD patients and whether it relates to genetic polymorphisms in the IL1B gene.
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy
Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.
Camporez, João-Paulo G; Petersen, Max C; Abudukadier, Abulizi; Moreira, Gabriela V; Jurczak, Michael J; Friedman, Glenn; Haqq, Christopher M; Petersen, Kitt Falk; Shulman, Gerald I
2016-02-23
Sarcopenia, or skeletal muscle atrophy, is a debilitating comorbidity of many physiological and pathophysiological processes, including normal aging. There are no approved therapies for sarcopenia, but the antihypertrophic myokine myostatin is a potential therapeutic target. Here, we show that treatment of young and old mice with an anti-myostatin antibody (ATA 842) for 4 wk increased muscle mass and muscle strength in both groups. Furthermore, ATA 842 treatment also increased insulin-stimulated whole body glucose metabolism in old mice, which could be attributed to increased insulin-stimulated skeletal muscle glucose uptake as measured by a hyperinsulinemic-euglycemic clamp. Taken together, these studies provide support for pharmacological inhibition of myostatin as a potential therapeutic approach for age-related sarcopenia and metabolic disease.
Pathogenetic Influences of Human Herpesvirus 8 (HHV-8) in Prostate Cancer Progression
2012-05-25
expression of each GOI were calculated by raising 2 to the negative value ΔΔCt for each sample. Primer sequences used were: AR-F: 5’ ATG GTG AGC AGA... GTG CCC TAT C 3’ AR- R: 5’ ATG GTC CCT GGC AGT CTC CAA A 3’ PSA-F: CGC AAG TTC ACC CTC AGA AGG T 3’ PSA-R: 5’ GAC GTG ATA CCT TGA AGC ACA CC 3’ MSMB-F...TGG CGT TCC AGG GAC TCA T 3’ Zeb1-F: 5’ GGC ATA CAC CTA CTC AAC TAC GG 3’ Zeb1-R: 5’ TGG GCG GTG TAG AAT CAG AGT C 3’ Snail-F: 5’ TGC CCT CAA GAT
Effects of hyperbaric oxygen on Pseudomonas aeruginosa susceptibility to imipenem and macrophages.
Lima, Flavia Luna; Joazeiro, Paulo Pinto; Lancellotti, Marcelo; de Hollanda, Luciana Maria; de Araújo Lima, Bruna; Linares, Edlaine; Augusto, Ohara; Brocchi, Marcelo; Giorgio, Selma
2015-01-01
The seriousness to treat burn wounds infected with Pseudomonas aeruginosa led us to examine whether the effect of the carbapenem antibiotic imipenem is enhanced by hyperbaric oxygen (HBO). The effects of HBO (100% O2, 3 ATA, 5 h) in combination with imipenen on bacterial counts of six isolates of P. aeruginosa and bacterial ultrastructure were investigated. Infected macrophages were exposed to HBO (100% O2, 3 ATA, 90 min) and the production of reactive oxygen species monitored. HBO enhanced the effects of imipenen. HBO increased superoxide anion production by macrophages and likely kills bacteria by oxidative mechanisms. HBO in combination with imipenem can be used to kill P. aeruginosa in vitro and such treatment may be beneficial for the patients with injuries containing the P. aeruginosa.
An Overview of Electronic Passport Security Features
NASA Astrophysics Data System (ADS)
Říha, Zdeněk
Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.
Analytical study of beam handling and emittance control
NASA Astrophysics Data System (ADS)
Thompson, James R.; Sloan, M. L.
1993-12-01
The thrust of our research on beam handling and emittance control was to explore how one might design high current electron accelerators, with the preservation of high beam quality designed as the primary design consideration. We considered high current, induction linacs in the parameter class of the ETA/ATA accelerators at LLNL, but with improvements to the accelerator gap design and other features to permit a significant increase in the deliverable beam brightness. Our approach for beam quality control centered on the use of solenoidal magnetic focusing through such induction accelerators, together with gently-shaped (adiabatic) acceleration gaps. This approach offers several tools for the control of beam quality. The strength and axial variation in the solenoidal magnetic field may be designed, as may the length and shape of the acceleration gaps, the loading of the gaps, and the axial spacing from gap to gap. This research showed that each of these design features may individually be optimized to contribute to improved beam quality control, and by exploiting these features, it appears feasible to produce high current, high energy electron beams possessing breakthrough beam quality and brightness. Applications which have been technologically unachievable may for the first time become possible. One such application is the production of high performance free electron lasers at very short wavelengths, extending down to the optical (less than 1 micron) regime.
Banknotes and unattended cash transactions
NASA Astrophysics Data System (ADS)
Bernardini, Ronald R.
2000-04-01
There is a 64 billion dollar annual unattended cash transaction business in the US with 10 to 20 million daily transactions. Even small problems with the machine readability of banknotes can quickly become a major problem to the machine manufacturer and consumer. Traditional note designs incorporate overt security features for visual validation by the public. Many of these features such as fine line engraving, microprinting and watermarks are unsuitable as machine readable features in low cost note acceptors. Current machine readable features, mostly covert, were designed and implemented with the central banks in mind. These features are only usable by the banks large, high speed currency sorting and validation equipment. New note designs should consider and provide for low cost not acceptors, implementing features developed for inexpensive sensing technologies. Machine readable features are only as good as their consistency. Quality of security features as well as that of the overall printing process must be maintained to ensure reliable and secure operation of note readers. Variations in printing and of the components used to make the note are one of the major causes of poor performance in low cost note acceptors. The involvement of machine manufacturers in new currency designs will aid note producers in the design of a note that is machine friendly, helping to secure the acceptance of the note by the public as well as acting asa deterrent to fraud.
Wu, Jing; Chen, Jiong; Guo, Hua; Peng, Fang
2014-12-01
To investigate the effects of different atmosphere absolutes (ATA) of high-pressure oxygen (HPO) on brain tissue water content and Aquaporin-4 (AQP4) expression in rabbits with cerebral hemorrhage. 180 New Zealand white rabbits were selected and randomly divided into normal group (n = 30), control group (n = 30) and cerebral hemorrhage group (n = 120), and cerebral hemorrhage group was divided into group A, B, C and D with 30 rabbits in each group. The groups received 1.0, 1.8, 2.0 and 2.2 ATA of HPO treatments, respectively. Ten rabbits in each group were killed at first, third and fifth day to detect the brain tissue water content and change of AQP4 expression. In cerebral hemorrhage group, brain tissue water content and AQP4 expression after model establishment were first increased, then decreased and reached the maximum on third day (p < 0.05). Brain tissue water content and AQP4 expression in control group and cerebral hemorrhage group were significantly higher than normal group at different time points (p < 0.05). In contrast, brain tissue water content and AQP4 expression in group C were significantly lower than in group A, group B, group D and control group (p < 0.05). In control group, AQP4-positive cells significantly increased after model establishment, which reached maximum on third day, and positive cells in group C were significantly less than in group A, group B and group D. We also found that AQP4 expression were positively correlated with brain tissue water content (r = 0.719, p < 0.05) demonstrated by significantly increased AQP4 expression along with increased brain tissue water content. In conclusion, HPO can decrease AQP4 expression in brain tissue of rabbits with cerebral hemorrhage to suppress the progression of brain edema and promote repairing of injured tissue. 2.0 ATA HPO exerts best effects, which provides an experimental basis for ATA selection of HPO in treating cerebral hemorrhage.
NASA Technical Reports Server (NTRS)
Marks, V. J.; Benigue, C. E.
1983-01-01
Four programs deal with intruders and resource managment. Package available from COSMIC provides DEC VAX-11/780 with certain "deterent" security features. Although packages is not comprehensive security system, of interest for any VAX installation where security is concern.
How a central bank perceives the (visual) communication of security features on its banknotes
NASA Astrophysics Data System (ADS)
Tornare, Roland
1998-04-01
The banknotes of earlier generations were protected by two or three security features with which the general public was familiar: watermark, security thread, intaglio printing. The remaining features pleased primarily printers and central banks, with little thought being given to public perception. The philosophy adopted two decades ago was based on a certain measure of discretion. It required patience and perseverance to discover the built-in security features of the banknotes. When colour photocopiers appeared on the scene in the mid- eighties we were compelled to take precautionary measures to protect our banknotes. One such measure consisted of an information campaign to prepare ourselves for this new potential threat. At this point, we actually became fully aware of the complex design of our banknotes and how difficult it is to communicate clearly the difference between a genuine and a counterfeit banknote. This difficult experience has nevertheless been a great benefit. It badgered us continually during the initial phase of designing the banknotes and preparing the information campaign.
78 FR 78705 - Airworthiness Directives; Airbus Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
..., and equipment to perform this type of modification, repair, and access. UAL also stated that certain... Association (ATA) of America Code 25, Equipment/ Furnishings; and Code 53, Fuselage. (e) Reason This AD was...
American Telemedicine Association
... To ATA Home {{desc}} ', captionModule: 'caption' }); $(document).on( 'cycle-update-view', function( e, opts, slideOpts, currSlide ) { if ( ... currSlide ) ); el.show(); } else { el.hide(); } }); }); $(document).on( 'cycle-destroyed', function( e, opts ) { var el; $.each(['caption',' ...
Hydrogen gas alleviates oxygen toxicity by reducing hydroxyl radical levels in PC12 cells.
Yu, Junchao; Yu, Qiuhong; Liu, Yaling; Zhang, Ruiyun; Xue, Lianbi
2017-01-01
Hyperbaric oxygen (HBO) therapy through breathing oxygen at the pressure of above 1 atmosphere absolute (ATA) is useful for varieties of clinical conditions, especially hypoxic-ischemic diseases. Because of generation of reactive oxygen species (ROS), breathing oxygen gas at high pressures can cause oxygen toxicity in the central nervous system, leading to multiple neurological dysfunction, which limits the use of HBO therapy. Studies have shown that Hydrogen gas (H2) can diminish oxidative stress and effectively reduce active ROS associated with diseases. However, the effect of H2 on ROS generated from HBO therapy remains unclear. In this study, we investigated the effect of H2 on ROS during HBO therapy using PC12 cells. PC12 cells cultured in medium were exposed to oxygen gas or mixed oxygen gas and H2 at 1 ATA or 5 ATA. Cells viability and oxidation products and ROS were determined. The data showed that H2 promoted the cell viability and inhibited the damage in the cell and mitochondria membrane, reduced the levels of lipid peroxidation and DNA oxidation, and selectively decreased the levels of •OH but not disturbing the levels of O2•-, H2O2, or NO• in PC12 cells during HBO therapy. These results indicated that H2 effectively reduced •OH, protected cells against oxygen toxicity resulting from HBO therapy, and had no effect on other ROS. Our data supported that H2 could be potentially used as an antioxidant during HBO therapy.
Falfán-Valencia, Ramcés; Pavón-Romero, Gandhi F.; Camarena, Angel; García, María de la Luz; Galicia-Negrete, Gustavo; Negrete-García, María Cristina; Teran, Luis Manuel
2012-01-01
Aspirin exacerbated respiratory disease (AERD) is characterized by chronic hyperplastic rhinosinusitis, nasal polyposis, asthma, and aspirin sensitivity. The mechanisms which produce these manifestations of intolerance are not fully defined, current research focuses on cyclooxygenase 1 (COX-1) inhibition, metabolism of arachidonic acid, and the COX pathway to the lipoxygenase (LO) route, inducing increased synthesis of leukotrienes (LT). The biological plausibility of this model has led to the search for polymorphisms in genes responsible for proinflammatory cytokines synthesis, such as IL1B and IL8. We performed a genetic association study between IL8-251 (rs4073) and IL1B-511 (rs16944) polymorphisms in AERD, aspirin-tolerant asthma (ATA), and healthy control subjects. Using allelic discrimination by real-time PCR, we found statistically nonsignificant associations between AERD, ATA, and healthy control subjects for the GG and GA genotypes of IL1B (rs16944). Interestingly, the AA genotype showed an increased frequency in the AERD patients versus the ATA group (GF = 0.19 versus 0.07, p = 0.018, OR 2.98, and 95% CI 1.17–7.82). This is the first observation that IL1B polymorphisms are involved in AERD. Thus, future studies must investigate whether interleukin-1β is released in the airways of AERD patients and whether it relates to genetic polymorphisms in the IL1B gene. PMID:22132000
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties. PMID:25202737
Time pattern locking scheme for secure multimedia contents in human-centric device.
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security
NASA Astrophysics Data System (ADS)
Mahmadi, FN; Zaaba, ZF; Osman, A.
2016-11-01
Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.
Multimodal biometric approach for cancelable face template generation
NASA Astrophysics Data System (ADS)
Paul, Padma Polash; Gavrilova, Marina
2012-06-01
Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.
Security Certification Challenges in a Cloud Computing Delivery Model
2010-04-27
Relevant Security Standards, Certifications, and Guidance NIST SP 800 series ISO /IEC 27001 framework Cloud Security Alliance Statement of...CSA Domains / Cloud Features ISO 27001 Cloud Service Provider Responsibility Government Agency Responsibility Analyze Security gaps Compensating
Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L
2018-04-01
Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing. This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents. We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction. Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks. This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... modification that included installation of winglets and different engines and propellers) were installed. The... addition of winglets. (d) Subject Joint Aircraft System Component (JASC)/Air Transport Association (ATA) of...
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
Selective primary health care: a critical review of methods and results.
Unger, J P; Killingsworth, J R
1986-01-01
In the aftermath of the Alma Ata conference, three types of Primary Health Care (PHC), have been identified. Comprehensive PHC (CPHC) and Basic PHC (BPHC) both have a wide scope of activities, BPHC however does not include water and sanitation activities. Only one year after the Alma Ata conference, CPHC was attacked as not 'feasible' and selective PHC (SPHC) was offered as an interim alternative. SPHC only addresses 5 to 8 diseases, almost all of them falling within the realm of pediatrics. Our article critically analyses the methods and results of SPHC. It contrasts the lack of supportive data for SPHC and its methodological deficiencies with the extent of its adoption by bilateral cooperation agencies, foundations, academic and research institutions, and international agencies. We suggest that rather than health factors, the major determinants of this adoption have been political and economical constraints acting upon decision makers exposed to a similar training in public health.
Oxygen Toxicity and Special Operations Forces Diving: Hidden and Dangerous
Wingelaar, Thijs T.; van Ooij, Pieter-Jan A. M.; van Hulst, Rob A.
2017-01-01
In Special Operations Forces (SOF) closed-circuit rebreathers with 100% oxygen are commonly utilized for covert diving operations. Exposure to high partial pressures of oxygen (PO2) could cause damage to the central nervous system (CNS) and pulmonary system. Longer exposure time and higher PO2 leads to faster development of more serious pathology. Exposure to a PO2 above 1.4 ATA can cause CNS toxicity, leading to a wide range of neurologic complaints including convulsions. Pulmonary oxygen toxicity develops over time when exposed to a PO2 above 0.5 ATA and can lead to inflammation and fibrosis of lung tissue. Oxygen can also be toxic for the ocular system and may have systemic effects on the inflammatory system. Moreover, some of the effects of oxygen toxicity are irreversible. This paper describes the pathophysiology, epidemiology, signs and symptoms, risk factors and prediction models of oxygen toxicity, and their limitations on SOF diving. PMID:28790955
NASA Technical Reports Server (NTRS)
Mehta, Manish; Seaford, Mark; Kovarik, Brian; Dufrene, Aaron; Solly, Nathan
2014-01-01
ATA-002 Technical Team has successfully designed, developed, tested and assessed the SLS Pathfinder propulsion systems for the Main Base Heating Test Program. Major Outcomes of the Pathfinder Test Program: Reach 90% of full-scale chamber pressure Achieved all engine/motor design parameter requirements Reach steady plume flow behavior in less than 35 msec Steady chamber pressure for 60 to 100 msec during engine/motor operation Similar model engine/motor performance to full-scale SLS system Mitigated nozzle throat and combustor thermal erosion Test data shows good agreement with numerical prediction codes Next phase of the ATA-002 Test Program Design & development of the SLS OML for the Main Base Heating Test Tweak BSRM design to optimize performance Tweak CS-REM design to increase robustness MSFC Aerosciences and CUBRC have the capability to develop sub-scale propulsion systems to meet desired performance requirements for short-duration testing.
NASA Astrophysics Data System (ADS)
Castellanos, Aaron; Harp, G.
2014-01-01
The Allen Telescope Array (ATA) is a 42 radio dish array located in Hat Creek, CA and is used to search for traces of Extraterrestrial Intelligence (SETI) and to study the interstellar medium. The ATA has taken multi-epoch measurements of the Galactic Center 6667 MHz) and the intraday variable Blazar 0716+714 (1 & 3MHz) and are imaged on 10 second timescales to search for intensity fluctuations on timescales 10s and beyond. We utilize software developed and focused on antenna system temperatures to minimize Radio Frequency Interference (RFI) in order to enhance calibration and signal variability. We will discuss potential radio bursts from the Galactic Center, possibly originating from the descent of the gas cloud G2 into the Galactic Center.
NASA Astrophysics Data System (ADS)
Kumar Naik, K. H.; Ashok, B.; Naik, Nagaraja; Mulla, Jameel Ahmed S.; Prakasha, Avinash
2015-04-01
Transition metal complexes containing tri-dentate NSN donor ligands i.e., 5-((1(aminomethyl)cyclohexyl)methyl)-1,3,4-thiadiazol-2-amine (AMTA) (2) and 5-(2-aminophenyl)-1,3,4-thiadiazol-2-amine (ATA) (4i-ii) have been synthesized. The newly synthesized ligands and their respective complexes were characterized by elemental analysis, molar conductance measurement and various spectral studies [infrared (IR), electronic, and NMR (for ligands only)]. Metal complexes are like [M(AMTA)2], [M(ATA)2] type, where M = Mn(II), Co(II) and Cu(II). The proposed geometries of the complexes are octahedral in nature. The synthesized ligands and their complexes were exhibits effective anti-inflammatory, analgesic and DNA binding activities. All the tested compounds exhibited significant analgesic activity, whereas the compound 4i, 4(ia) and 4(iib) is equipotent with Diclofenac sodium.
Five Years of SETI with the Allen Telescope Array: Lessons Learned
NASA Astrophysics Data System (ADS)
Harp, Gerald
2016-01-01
We discuss recent observations at the Allen Telescope Array (ATA) supporting a wide ranging Search for Extraterrestrial Intelligence (SETI). The ATA supports observations over the frequency range 1-10 GHz with three simultaneous phased array beams used in an anticoincidence detector for false positive rejection. Here we summarize observational results over the years 2011-2015 covering multiple campaigns of exoplanet stars, the galactic plane, infrared excess targets, etc. Approximately 2 x 108 signals were identified and classified over more than 5000 hours of observation. From these results we consider various approaches to the rapid identification of human generated interference in the process of the search for a signal with origins outside the radius of the Moon's orbit. We conclude that the multi-beam technique is superb tool for answering the very difficult question of the direction of origin of signals. Data-based simulations of future instruments with more than 3 beams are compared.
Rood, M; Keijsers, V; van der Linden, M W; Tong, T; Borggreve, S; Verweij, C; Breedveld, F; Huizinga, T
1999-01-01
OBJECTIVE—To investigate the association of interleukin 10 (IL10) promoter polymorphisms and neuropsychiatric manifestations of systemic lupus erythematosus (SLE). METHODS—IL10 haplotypes of 11 healthy volunteers were cloned to confirm that in the Dutch population, only the three common haplotypes (-1082/-819/-592) GCC, ACC and ATA exist. The IL10 promoter polymorphisms of 92 SLE patients and 162 healthy controls were determined. The medical records of the SLE patients were screened for the presence of neuropsychiatric involvement. RESULTS—All cloned haplotypes were either GCC, ACC or ATA. Forty two SLE patients had suffered from neuropsychiatric manifestations (NP-SLE). In NP-SLE patients, the frequency of the ATA haplotype is 30% versus 18% in the controls and 17% in the non-NP-SLE group (odds ratios 1.9, p=0.02, and 2.1, p=0.04, respectively), whereas the GCC haplotype frequency is lower in the NP-SLE group compared with controls and non-NP-SLE patients (40% versus 55% and 61%, odds ratios 0.6, p=0.02 and 0.4 p=0.006). The odds ratio for the presence of NP-SLE is inversely proportional to the number of GCC haplotypes per genotype when the NP-SLE group is compared with non-NP-SLE patients. CONCLUSIONS—The IL10 locus is associated with neuropsychiatric manifestations in SLE. This suggests that IL10 is implicated in the immunopathogenesis of neuropsychiatric manifestations in SLE. Keywords: systemic lupus erythematosus; neuropsychiatric manifestations; genetics; interleukin 10 promoter haplotypes PMID:10343522
Hydrogen gas alleviates oxygen toxicity by reducing hydroxyl radical levels in PC12 cells
Yu, Junchao; Yu, Qiuhong; Liu, Yaling; Zhang, Ruiyun; Xue, Lianbi
2017-01-01
Hyperbaric oxygen (HBO) therapy through breathing oxygen at the pressure of above 1 atmosphere absolute (ATA) is useful for varieties of clinical conditions, especially hypoxic-ischemic diseases. Because of generation of reactive oxygen species (ROS), breathing oxygen gas at high pressures can cause oxygen toxicity in the central nervous system, leading to multiple neurological dysfunction, which limits the use of HBO therapy. Studies have shown that Hydrogen gas (H2) can diminish oxidative stress and effectively reduce active ROS associated with diseases. However, the effect of H2 on ROS generated from HBO therapy remains unclear. In this study, we investigated the effect of H2 on ROS during HBO therapy using PC12 cells. PC12 cells cultured in medium were exposed to oxygen gas or mixed oxygen gas and H2 at 1 ATA or 5 ATA. Cells viability and oxidation products and ROS were determined. The data showed that H2 promoted the cell viability and inhibited the damage in the cell and mitochondria membrane, reduced the levels of lipid peroxidation and DNA oxidation, and selectively decreased the levels of •OH but not disturbing the levels of O2•-, H2O2, or NO• in PC12 cells during HBO therapy. These results indicated that H2 effectively reduced •OH, protected cells against oxygen toxicity resulting from HBO therapy, and had no effect on other ROS. Our data supported that H2 could be potentially used as an antioxidant during HBO therapy. PMID:28362819
DOE Office of Scientific and Technical Information (OSTI.GOV)
Friedman, A.; Barnard, J.J.; Briggs, R.J.
The Heavy Ion Fusion Science Virtual National Laboratory (HIFS-VNL), a collaborationof LBNL, LLNL, and PPPL, has achieved 60-fold pulse compression of ion beams on the Neutralized Drift Compression eXperiment (NDCX) at LBNL. In NDCX, a ramped voltage pulse from an induction cell imparts a velocity"tilt" to the beam; the beam's tail then catches up with its head in a plasma environment that provides neutralization. The HIFS-VNL's mission is to carry out studies of Warm Dense Matter (WDM) physics using ion beams as the energy source; an emerging thrust is basic target physics for heavy ion-driven Inertial Fusion Energy (IFE). Thesemore » goals require an improved platform, labeled NDCX-II. Development of NDCX-II at modest cost was recently enabled by the availability of induction cells and associated hardware from the decommissioned Advanced Test Accelerator (ATA) facility at LLNL. Our initial physics design concept accelerates a ~;;30 nC pulse of Li+ ions to ~;;3 MeV, then compresses it to ~;;1 ns while focusing it onto a mm-scale spot. It uses the ATA cells themselves (with waveforms shaped by passive circuits) to impart the final velocity tilt; smart pulsers provide small corrections. The ATA accelerated electrons; acceleration of non-relativistic ions involves more complex beam dynamics both transversely and longitudinally. We are using analysis, an interactive one-dimensional kinetic simulation model, and multidimensional Warp-code simulations to develop the NDCX-II accelerator section. Both LSP and Warp codes are being applied to the beam dynamics in the neutralized drift and final focus regions, and the plasma injection process. The status of this effort is described.« less
Role of government in public health: Current scenario in India and future scope
Lakshminarayanan, Subitha
2011-01-01
The new agenda for Public Health in India includes the epidemiological transition, demographical transition, environmental changes and social determinants of health. Based on the principles outlined at Alma-Ata in 1978, there is an urgent call for revitalizing primary health care in order to meet these challenges. The role of the government in influencing population health is not limited within the health sector but also by various sectors outside the health systems. This article is a literature review of the existing government machinery for public health needs in India, its success, limitations and future scope. Health system strengthening, human resource development and capacity building and regulation in public health are important areas within the health sector. Contribution to health of a population also derives from social determinants of health like living conditions, nutrition, safe drinking water, sanitation, education, early child development and social security measures. Population stabilization, gender mainstreaming and empowerment, reducing the impact of climate change and disasters on health, improving community participation and governance issues are other important areas for action. Making public health a shared value across the various sectors is a politically challenging strategy, but such collective action is crucial. PMID:21694957
75 FR 61818 - Eighty-Third Meeting: RTCA Special Committee 159: Global Positioning System (GPS).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... & Hilton-ATA Room. All Day, Working Group 7, GPS/Antennas, ARINC Room. Friday, October 29 Plenary Session...) GPS/Antennas (WG-7) Review of EUROCAE Activities. Nav and ADS-B Out Equipment Requirements--Discussion...
Synthesis and Structure of Hexamolybdobisorganoarsonates.
1976-11-01
lU tnm s) —.~ ---- ---~~.“ . --. - ~~~ - -“ —‘ ‘ - ~~~ - — /~ ~132~ waki L .Aajdovi~ ”, J.K.Ata1ick, M.T. ~~’oPe s - • C O . Quicksall~ - - 544 1
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-07
... Liberty International Airport; High Density Rule at Reagan National Airport AGENCY: Federal Aviation... support for the ATA request for waiver. FAA Analysis Under the FAA's High Density Rule and Orders limiting...
American transit safety award : award winning safety program
DOT National Transportation Integrated Search
1950-01-01
Prepared ca. 1950. As the result of the widespread interest in safety evident among companies at meetings of the ATA Small Operations Division, the Division's Administrative Committee considered it desirable to put together a compilation of safety pr...
NASA Astrophysics Data System (ADS)
Svirsky, A.; Rogers, K. L.; Meissner, M.; Busby, G.; Roberge, W.
2014-12-01
The New York Center for Astrobiology (NYCA) EPO effort is a collaboration combining expertise in evaluation and assessment of STEM educational modules with disciplinary expertise in astrobiology. In practice, the NYCA partners with external experts in professional development, informal education and evaluation to assist in developing and implementing certain programs of the NYCA EPO activities. Two specific program initiatives of the NYCA EPO effort offer excellent examples of programs with strong science content knowledge as well as using effective tools to address the NSF impact categories. These are the ExxonMobil Bernard Harris Summer Science Camp (EMBHSSC, in conjunction with RPI's STEM Pipeline Initiative) and the Astrobiology Teachers Academy (ATA). The EMBHSSC for middle school students focuses on NASA astrobiology initiatives around the "Quest for Life" theme. The Camp has a comprehensive evaluation component and uses pre-and post- assessment of student knowledge and interest in STEM. Recent data suggest that every student has shown a measurable gain in these areas. The ATA is a weeklong summer intensive professional development program for P-12 STEM teachers that combines discipline scientists in the NYCA with an external evaluation organization, the Association for the Cooperative Advancement of Science and Education (ACASE). The goal is for teachers to develop a new learning module for a course they teach that uses astrobiology as a content focus to engage students. The Academy has scientists collaborating with teachers in this effort, providing content and assistance in designing instructional activities. Assessments are woven into the fabric of the work in a few ways: 1. There is a purposeful focus on assessment as part of the learning module, and the content of the ATA; 2. ACASE offers teachers a tool for tracking their students' attainment of the learning goals identified in their learning module; 3. There are daily evaluations of the teachers' experiences to enable mid-course corrections, and a final evaluation of the ATA at the end of the experience. NYCA scientists support the approach of working collaboratively with external experts in evaluation as a paradigm for EPO activities sponsored by NASA. Our presentation will highlight the myriad of tools used to measure outcomes of these activities.
Handling imbalance data in churn prediction using combined SMOTE and RUS with bagging method
NASA Astrophysics Data System (ADS)
Pura Hartati, Eka; Adiwijaya; Arif Bijaksana, Moch
2018-03-01
Customer churn has become a significant problem and also a challenge for Telecommunication company such as PT. Telkom Indonesia. It is necessary to evaluate whether the big problems of churn customer and the company’s managements will make appropriate strategies to minimize the churn and retaining the customer. Churn Customer data which categorized churn Atas Permintaan Sendiri (APS) in this Company is an imbalance data, and this issue is one of the challenging tasks in machine learning. This study will investigate how is handling class imbalance in churn prediction using combined Synthetic Minority Over-Sampling (SMOTE) and Random Under-Sampling (RUS) with Bagging method for a better churn prediction performance’s result. The dataset that used is Broadband Internet data which is collected from Telkom Regional 6 Kalimantan. The research firstly using data preprocessing to balance the imbalanced dataset and also to select features by sampling technique SMOTE and RUS, and then building churn prediction model using Bagging methods and C4.5.
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
Security solutions: strategy and architecture
NASA Astrophysics Data System (ADS)
Seto, Myron W. L.
2002-04-01
Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.
New color-shifting security devices
NASA Astrophysics Data System (ADS)
Moia, Franco
2004-06-01
The unbroken global increase of forgery and counterfeiting of valuable documents and products steadily requires improved types of optical security devices. Hence, the "security world" is actively seeking for new features which meet high security standards, look attractively and allow easy recognition. One special smart security device created by ROLIC's technology represents a cholesteric device combined with a phase image. On tilting, such devices reveal strong color shifts which are clearly visible to the naked eye. The additional latent image is invisible under normal lighting conditions but can be revealed to human eyes by means of a simple, commercially available linear sheet polarizer. Based on our earlier work, first published in 1981, we now have developed phase change guest-host devices combined with dye-doped cholesteric material for application in new security features. ROLIC has developed sophisticated material systems of cross-linkable cholesteric liquid crystals and suitable cross-linkable dyes which allow to create outstanding cholesteric color-shifting effects not only on light absorbing dark backgrounds but also on bright or even white backgrounds preserving the circularly polarizing state. The new security devices combine unambiguously 1st and 2nd level inspection features and show brilliant colors on black as well as on white substrates. On tilting, the security devices exhibit remarkable color shifts while the integrated hidden images can be revealed by use of a sheet polarizer. Furthermore, due to its very thin material layers, even demanding applications, such as on banknotes can be considered.
Wilson at RWS for STS-131 EVA 3 SSRMS Support
2010-04-13
View of Stephanie Wilson as she works at the Robotics Workstation (RWS) in US Laboratory Destiny as she conducts a Space Station Remote Manipulator System (SSRMS) Ammonia Tank Assembly (ATA) retrieval in support of STS-131 EVA 3.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
..., WG-1, Wake Vortex, ARINC Room. RTCA--All Day, WG-4, Application Technical Requirements, Colson Board... Vortex, MacIntosh-NBAA Room & Hilton-ATA Room. RTCA--All Day, WG-4, Application Technical Requirements...
A rhythm-based authentication scheme for smart media devices.
Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.
A Rhythm-Based Authentication Scheme for Smart Media Devices
Lee, Jae Dong; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
78 FR 41277 - Airworthiness Directives; Piper Aircraft, Inc. Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-10
... through 4697520. (d) Subject Joint Aircraft System Component (JASC)/Air Transport Association (ATA) of... fluorosilicone (orange) fuel vent valve following Part III of Piper Aircraft, Inc. Mandatory Service Bulletin No... Airworthiness Directives; Piper Aircraft, Inc. Airplanes AGENCY: Federal Aviation Administration (FAA), DOT...
ECOLOGICAL STRUCTURE AMONG MIGRANT AND RESIDENT SEABIRDS OF THE SCOTIA-WEDDELL CONFLUENCE REGION
Report quantitatively assesses seasonal changes in community structure and habitat selection among seabirds in the Scotia-Weddell Confluence region, Antarctica. iscussed are biological and physical factors underlying the patterns. ata were derived from strip-transects on closely-...
PROCEEDINGS OF THE WORKSHOP GEOMEMBRANE SEAMING: DATA ACQUISITION AND CONTROL
The U.S. Environmental Protection Agency's Risk Reduction Engineering Laboratory, in cooperation with the Geosynthetic Research Institute, sponsored a workshop on Geomembrane Wedge Welding Seaming: ata Acquisition and Control on April 22, 1993. he workshop was held at the Andrew ...
The new color of money: safer, smarter, more secure
NASA Astrophysics Data System (ADS)
DiNunzio, Lisa A.; Clarke, Lenore
2004-06-01
Approximately 60% of U.S. currency notes circulate abroad. As the most widely used currency in the world, U.S. notes are the most likely to be counterfeited. Since 1996, the United States has been issuing currency with new security features. These features make U.S. currency easier to recognize as genuine and more secure against advancing computer technology that could be used for counterfeiting. Currency counterfeiters are increasingly turning to digital methods, as advances in technology make digital counterfeiting of currency easier and cheaper. In 1995, for example, less than one percent of counterfeit notes detected in the U.S. were digitally produced. By 2002, that number had grown to nearly 40 percent, according to the Secret Service. Yet despite the efforts of counterfeiters, U.S. currency counterfeiting has been kept at low levels. According to current estimates, between 0.01 and 0.02 percent of notes in circulation are counterfeit, or about 1-2 notes in every 10,000 genuine notes. The strategy for maintaining the security of Federal Reserve notes is to enhance the design of U.S. currency every seven to ten years. One objective of introducing the new currency is to emphasize the number of features available to the public for authenticating bills. The most-talked-about aspect of the redesigned currency is the subtle introduction of background colors to the bills. While color itself is not a security feature, the use of color provides the opportunity to add features that could assist in deterring counterfeiting. Color will also help people to better distinguish their notes. Security features for the newly designed currency include a security thread, a watermark, and a more distinct color-shifting ink. The new 20 note was issued in fall 2003, with the 50 and 100 notes scheduled to follow 12 to 18 months later. Plans to redesign the 10 and 5 are still under consideration, but there are no plans to redesign the 2 and 1 notes. As was the case with the redesigned 20 note issued in 1998, the new design will co-circulate with the current design. As notes return to the Federal Reserve from depository institutions, the Federal Reserve will only destroy the unfit notes introduced since 1998. Designs older than the Series 1996 are destroyed when returned to the Federal Reserve regardless of condition. To ensure a smooth introduction of the new currency, a five-year international public education effort was launched in 2002 to inform the public and target audiences, including financial institutions, law enforcement, and the vending industry of the transition to the new design. The public is the first line of defense against counterfeiting. So, it's important the public has the tools to recognize the new and modified security features in the redesigned notes.
The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test.
Parra, Federico; Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan
2017-04-06
Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it for correlations with attachment security. The stability of the theory-consistent features across three different stimuli sets was explored using repeated measures analysis of variances (ANOVAs). In total, 46 theory-consistent correlations were found during the exploration (out of 65 total significant correlations). For example, attachment security as measured by the AAP was correlated with positive facial expressions (r=.36, P=.01). AMMI's security with the father was inversely correlated with the low frequency (LF) of HRV (r=-.87, P=.03). Attachment security to partners as measured by the AAQ was inversely correlated with anger facial expression (r=-.43, P=.001). The confirmatory analysis showed that the composite effects index was significantly correlated to security in the AAP (r=.26, P=.05) and the AAQ (r=.30, P=.04) but not in the AMMI. Repeated measures ANOVAs conducted individually on each of the theory-consistent features revealed that only 7 of the 46 (15%) features had significantly different values among responses to three different stimuli sets. We were able to validate two of the instrument's core assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Future validation of other of its dimensions, as well as the ongoing development of its scoring and classification algorithms is discussed. ©Federico Parra, Raphaële Miljkovitch, Gwenaelle Persiaux, Michelle Morales, Stefan Scherer. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.
The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test
Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan
2017-01-01
Background Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. Objective The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Methods A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it for correlations with attachment security. The stability of the theory-consistent features across three different stimuli sets was explored using repeated measures analysis of variances (ANOVAs). Results In total, 46 theory-consistent correlations were found during the exploration (out of 65 total significant correlations). For example, attachment security as measured by the AAP was correlated with positive facial expressions (r=.36, P=.01). AMMI’s security with the father was inversely correlated with the low frequency (LF) of HRV (r=−.87, P=.03). Attachment security to partners as measured by the AAQ was inversely correlated with anger facial expression (r=−.43, P=.001). The confirmatory analysis showed that the composite effects index was significantly correlated to security in the AAP (r=.26, P=.05) and the AAQ (r=.30, P=.04) but not in the AMMI. Repeated measures ANOVAs conducted individually on each of the theory-consistent features revealed that only 7 of the 46 (15%) features had significantly different values among responses to three different stimuli sets. Conclusions We were able to validate two of the instrument’s core assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Future validation of other of its dimensions, as well as the ongoing development of its scoring and classification algorithms is discussed. PMID:28385683
Vázquez-Villamar, M; Palafox-Sánchez, C A; Hernández-Bello, J; Muñoz-Valle, J F; Valle, Y; Cruz, A; Alatorre-Meza, A I; Oregon-Romero, E
2016-11-03
Interleukin 10 (IL-10) is an immunoregulatory cytokine with multiple roles in the immune system. Three single nucleotide polymorphisms at positions -1082 (A>G), -819 (C>T), and -592 (C>A) in the promoter region of the IL10 gene are believed to be associated with different inflammatory, infectious, and autoimmune diseases. These polymorphisms exhibit a strong linkage disequilibrium (LD) and form three principal haplotypes (GCC, ACC, and ATA). The GCC and ATA haplotypes have been associated with high and low levels of IL-10 production, respectively. The aim of this study was to establish the allele and haplotype frequencies of the IL10 polymorphisms in Mestizos from western Mexico. SNPs were analyzed in 340 healthy unrelated Mestizos from western Mexico by polymerase chain reaction-restriction fragment length polymorphism. The studied population presented significant differences, in the distribution of IL10 polymorphisms, from the Asian, African, and European populations. We also observed a strong LD within -1082 A>G, -819 C>T, and -592 C>A (100% pc = 7.735 x 10 -18 ). The haplotypes ACC (45.4%), ATA (22.0%), GTA (14.9%), and GCC (13.9%) were most frequently observed in this population. The haplotype frequencies, however, differed from those reported previously in Mestizos from central Mexico, Asians, Africans, and European Caucasians, suggesting a differential gene flow in the Mexican Mestizo population. This could account for the genetic variability between Mexicans and populations of other ethnicities. The study of these polymorphisms and their haplotypes could help in expanding our knowledge to design future disease-risk studies on the western Mexican population.
Yang, Bo Ra; Kim, Eun-Kyung; Moon, Hee Jung; Yoon, Jung Hyun; Park, Vivian Y; Kwak, Jin Young
2018-04-01
To evaluate qualitative and semiquantitative elastography for the diagnosis of intermediate suspicious thyroid nodules based on the 2015 American Thyroid Association (ATA) guidelines. Through a retrospective search of our institutional database, 746 solid thyroid nodules found on grayscale ultrasonography, strain elastography, and ultrasound-guided fine-needle aspiration between June and November 2009 were collected. Among them, 80 nodules from 80 patients with an intermediate suspicion of malignancy based on the 2015 ATA guidelines that were 10 mm or larger were recruited as the final study nodules. Elastographic findings were categorized according to the criteria of Rago et al (J Clin Endocrinol Metab 2007; 92:2917-2922) and Asteria et al (Thyroid 2008; 18:523-531), and strain ratio values were calculated and recorded. The independent 2-sample t test and χ 2 test (or Fisher exact test) were used to evaluate differences in clinical parameters between benign and malignant thyroid nodules. All variables were compared by univariate and multivariate logistic regression analyses, and odds ratios with 95% confidence intervals were calculated. Of the 80 nodules, 6 (7.5%) were malignant, and 74 (92.5%) were benign. No significant differences were observed in age, sex, nodule size, elasticity score, and strain ratio between benign and malignant nodules. No variables significantly predicted thyroid malignancy on the univariate analysis. On the multivariate logistic regression analysis, there were no independent variables associated with thyroid malignancy, including the elasticity score and strain ratio (all P > .05). Elastographic analysis using the elasticity score and strain ratio has limited ability to characterize the benignity or malignancy of thyroid nodules with an intermediate suspicion of malignancy based on the 2015 ATA guidelines. © 2017 by the American Institute of Ultrasound in Medicine.
Walker, William C; Franke, Laura Manning; Cifu, David X; Hart, Brett B
2014-06-01
Background Mild traumatic brain injury (mTBI) and residual postconcussion syndrome (PCS) are common among combatants of the recent military conflicts in Iraq and Afghanistan. Hyperbaric oxygen (HBO2) is a proposed treatment but has not been rigorously studied for this condition. Objectives In a secondary analysis, examine for possible effects on psychomotor (balance and fine motor) and cognitive performance 1 week after an HBO2 intervention in service members with PCS after mTBI. Methods A randomized, double-blind, sham control, feasibility trial comparing pretreatment and posttreatment was conducted in 60 male active-duty marines with combat-related mTBI and PCS persisting for 3 to 36 months. Participants were randomized to 1 of 3 preassigned oxygen fractions (10.5%, 75%, or 100%) at 2.0 atmospheres absolute (ATA), resulting in respective groups with an oxygen exposure equivalent to (1) breathing surface air (Sham Air), (2) 100% oxygen at 1.5 ATA (1.5 ATAO2), and (3) 100% oxygen at 2.0 ATA (2.0 ATAO2). Over a 10-week period, participants received 40 hyperbaric chamber sessions of 60 minutes each. Outcome measures, including computerized posturography (balance), grooved pegboard (fine motor speed/dexterity), and multiple neuropsychological tests of cognitive performance, were collected preintervention and 1-week postintervention. Results Despite the multiple sensitive cognitive and psychomotor measures analyzed at an unadjusted 5% significance level, this study demonstrated no immediate postintervention beneficial effect of exposure to either 1.5 ATAO2 or 2.0 ATAO2 compared with the Sham Air intervention. Conclusions These results do not support the use of HBO2 to treat cognitive, balance, or fine motor deficits associated with mTBI and PCS. © The Author(s) 2013.
Participation of PLA2 and PLC in DhL-induced activation of Rhinella arenarum oocytes.
Zapata-Martínez, J; Medina, M F; Gramajo-Bühler, M C; Sánchez-Toranzo, G
2016-08-01
Rhinella arenarum oocytes can be artificially activated, a process known as parthenogenesis, by a sesquiterpenic lactone of the guaianolide group, dehydroleucodine (DhL). Transient increases in the concentration of cytosolic Ca2+ are essential to trigger egg activation events. In this sense, the 1-4-5 inositol triphosphate receptors (IP3R) seem to be involved in the Ca2+ transient release induced by DhL in this species. We analyzed the involvement of phosphoinositide metabolism, especially the participation of phospholipase A2 (PLA2) and phospholipase C (PLC) in DhL-induced activation. Different doses of quinacrine, aristolochic acid (ATA) (PLA2 inhibitors) or neomycin, an antibiotic that binds to PIP2, thus preventing its hydrolysis, were used in mature Rhinella arenarum oocytes. In order to assay the participation of PI-PLC and PC- PLC we used U73122, a competitive inhibitor of PI-PLC dependent events and D609, an inhibitor of PC-PLC. We found that PLA2 inhibits quinacrine more effectively than ATA. This difference could be explained by the fact that quinacrine is not a specific inhibitor for PLA2 while ATA is specific for this enzyme. With respect to the participation of PLC, a higher decrease in oocyte activation was detected when cells were exposed to neomycin. Inhibition of PC-PLC with D609 and IP-PLC with U73122 indicated that the last PLC has a significant participation in the effect of DhL-induced activation. Results would indicate that DhL induces activation of in vitro matured oocytes of Rhinella arenarum by activation of IP-PLC, which in turn may induce IP3 formation which produces Ca2+ release.
Koiwai, Kotaro; Hartmann, Marcus D.; Linke, Dirk; Lupas, Andrei N.; Hori, Katsutoshi
2016-01-01
Trimeric autotransporter adhesins (TAAs) on the cell surface of Gram-negative pathogens mediate bacterial adhesion to host cells and extracellular matrix proteins. However, AtaA, a TAA in the nonpathogenic Acinetobacter sp. strain Tol 5, shows nonspecific high adhesiveness to abiotic material surfaces as well as to biotic surfaces. It consists of a passenger domain secreted by the C-terminal transmembrane anchor domain (TM), and the passenger domain contains an N-terminal head, N-terminal stalk, C-terminal head (Chead), and C-terminal stalk (Cstalk). The Chead-Cstalk-TM fragment, which is conserved in many Acinetobacter TAAs, has by itself the head-stalk-anchor architecture of a complete TAA. Here, we show the crystal structure of the Chead-Cstalk fragment, AtaA_C-terminal passenger domain (CPSD), providing the first view of several conserved TAA domains. The YadA-like head (Ylhead) of the fragment is capped by a unique structure (headCap), composed of three β-hairpins and a connector motif; it also contains a head insert motif (HIM1) before its last inner β-strand. The headCap, Ylhead, and HIM1 integrally form a stable Chead structure. Some of the major domains of the CPSD fragment are inherently flexible and provide bending sites for the fiber between segments whose toughness is ensured by topological chain exchange and hydrophobic core formation inside the trimer. Thus, although adherence assays using in-frame deletion mutants revealed that the characteristic adhesive sites of AtaA reside in its N-terminal part, the flexibility and toughness of the CPSD part provide the resilience that enables the adhesive properties of the full-length fiber across a wide range of conditions. PMID:26698633
Harch, Paul G; Andrews, Susan R; Fogarty, Edward F; Amen, Daniel; Pezzullo, John C; Lucarini, Juliette; Aubrey, Claire; Taylor, Derek V; Staab, Paul K; Van Meter, Keith W
2012-01-01
This is a preliminary report on the safety and efficacy of 1.5 ATA hyperbaric oxygen therapy (HBOT) in military subjects with chronic blast-induced mild to moderate traumatic brain injury (TBI)/post-concussion syndrome (PCS) and post-traumatic stress disorder (PTSD). Sixteen military subjects received 40 1.5 ATA/60 min HBOT sessions in 30 days. Symptoms, physical and neurological exams, SPECT brain imaging, and neuropsychological and psychological testing were completed before and within 1 week after treatment. Subjects experienced reversible middle ear barotrauma (5), transient deterioration in symptoms (4), and reversible bronchospasm (1); one subject withdrew. Post-treatment testing demonstrated significant improvement in: symptoms, neurological exam, full-scale IQ (+14.8 points; p<0.001), WMS IV Delayed Memory (p=0.026), WMS-IV Working Memory (p=0.003), Stroop Test (p<0.001), TOVA Impulsivity (p=0.041), TOVA Variability (p=0.045), Grooved Pegboard (p=0.028), PCS symptoms (Rivermead PCSQ: p=0.0002), PTSD symptoms (PCL-M: p<0.001), depression (PHQ-9: p<0.001), anxiety (GAD-7: p=0.007), quality of life (MPQoL: p=0.003), and self-report of percent of normal (p<0.001), SPECT coefficient of variation in all white matter and some gray matter ROIs after the first HBOT, and in half of white matter ROIs after 40 HBOT sessions, and SPECT statistical parametric mapping analysis (diffuse improvements in regional cerebral blood flow after 1 and 40 HBOT sessions). Forty 1.5 ATA HBOT sessions in 1 month was safe in a military cohort with chronic blast-induced PCS and PTSD. Significant improvements occurred in symptoms, abnormal physical exam findings, cognitive testing, and quality-of-life measurements, with concomitant significant improvements in SPECT.
PiHi Observations at the ATA, Conventional and Unconventional SETI
NASA Astrophysics Data System (ADS)
Harp, Gerald; Wilcox, B.; Arbunich, J.; Blair, S.; Backus, P. R.; Tarter, J. C.; Shostak, S.; Jordan, J.; Kilsdonk, T.; Ackermann, R. F.; Ross, J.; ATA Team
2010-01-01
Many radio SETI searches focus on the frequency range where the HI (1.42 GHz) and OH lines (1.6-1.7 GHz) lines are landmarks delineating the water hole This is only a small fraction of the terrestrial microwave window (TMW) from 1-10 GHz. This survey occurs near the center of the TMW at 4.462336275 GHz or π times the HI frequency. We call this the PiHI ("pie high") survey. The inspiration for PiHI observations comes from Carl Sagan in his book, Contact. This survey builds upon and extends a previous survey at PiHI (Blair, D. G. et al. (1992), MNRAS, 257, 105) with greater sensitivity, resolution, and coverage. We survey the nearest 94 main sequence stars in the HabCat catalog (Turnbull, M. C. and Tarter, J. C. (2003), ApJS, 145, 181) with spectral classes between F9 and G7 (max. radius 62 pc). The ATA's flexibility allows simultaneous measurements of targeted observations on stars (with beamformers) and 1° FOV "blind” observations of the areas around target stars (with imaging correlator). The targeted observations are carried out with a high resolution (0.7 Hz) spectrometer and integration times on the order of 200 s. The spectral imaging correlator measures a 50 x 50 grid of points with 3 kHz spectral resolution. This survey shows several signals of minor interest were discovered, though none of the signals reported are continuously "on,” which is an important characteristic for the positive identification of an ETI signal. The ATA has been funded through generous grants from the Paul G. Allen Family Foundation, the SETI Institute, UC Berkeley, the National Science Foundation (Grant No. 0540599), Sun Microsystems, Xilinx, Nathan Myhrvold, Greg Papadopoulos, and other corporations and individual donors.
Risk Profile of the RET A883F Germline Mutation: An International Collaborative Study.
Mathiesen, Jes Sloth; Habra, Mouhammed Amir; Bassett, John Howard Duncan; Choudhury, Sirazum Mubin; Balasubramanian, Sabapathy Prakash; Howlett, Trevor A; Robinson, Bruce G; Gimenez-Roqueplo, Anne-Paule; Castinetti, Frederic; Vestergaard, Peter; Frank-Raue, Karin
2017-06-01
The A883F germline mutation of the rearranged during transfection (RET) proto-oncogene causes multiple endocrine neoplasia 2B. In the revised American Thyroid Association (ATA) guidelines for the management of medullary thyroid carcinoma (MTC), the A883F mutation has been reclassified from the highest to the high-risk level, although no well-defined risk profile for this mutation exists. To create a risk profile for the A883F mutation for appropriate classification among the ATA risk levels. Retrospective analysis. International collaboration. Included were 13 A883F carriers. The intervention was thyroidectomy. Earliest age of MTC, regional lymph node metastases, distant metastases, age-related penetrance of MTC and pheochromocytoma (PHEO), overall and disease-specific survival, and biochemical cure rate. One and three carriers were diagnosed at age 7 to 9 years (median, 7.5 years) with a normal thyroid and C-cell hyperplasia, respectively. Nine carriers were diagnosed with MTC at age 10 to 39 years (median, 19 years). The earliest age of MTC, regional lymph node metastasis, and distant metastasis was 10, 20, and 20 years, respectively. Fifty percent penetrance of MTC and PHEO was achieved by age 19 and 34 years, respectively. Five- and 10-year survival rates (both overall and disease specific) were 88% and 88%, respectively. Biochemical cure for MTC at latest follow-up was achieved in 63% (five of eight carriers) with pertinent data. MTC of A883F carriers seems to have a more indolent natural course compared with that of M918T carriers. Our results support the classification of the A883F mutation in the ATA high-risk level. Copyright © 2017 Endocrine Society
DOE Office of Scientific and Technical Information (OSTI.GOV)
Friedman, A; Barnard, J J; Briggs, R J
The Heavy Ion Fusion Science Virtual National Laboratory (HIFS-VNL), a collaboration of LBNL, LLNL, and PPPL, has achieved 60-fold pulse compression of ion beams on the Neutralized Drift Compression eXperiment (NDCX) at LBNL. In NDCX, a ramped voltage pulse from an induction cell imparts a velocity 'tilt' to the beam; the beam's tail then catches up with its head in a plasma environment that provides neutralization. The HIFS-VNL's mission is to carry out studies of warm dense matter (WDM) physics using ion beams as the energy source; an emerging thrust is basic target physics for heavy ion-driven inertial fusion energymore » (IFE). These goals require an improved platform, labeled NDCX-II. Development of NDCX-II at modest cost was recently enabled by the availability of induction cells and associated hardware from the decommissioned advanced test accelerator (ATA) facility at LLNL. Our initial physics design concept accelerates an {approx} 30 nC pulse of Li{sup +} ions to {approx} 3 MeV, then compresses it to {approx} 1 ns while focusing it onto a mm-scale spot. It uses the ATA cells themselves (with waveforms shaped by passive circuits) to impart the final velocity tilt; smart pulsers provide small corrections. The ATA accelerated electrons; acceleration of non-relativistic ions involves more complex beam dynamics both transversely and longitudinally. We are using an interactive one-dimensional kinetic simulation model and multidimensional Warp-code simulations to develop the NDCX-II accelerator section. Both LSP and Warp codes are being applied to the beam dynamics in the neutralized drift and final focus regions, and the plasma injection process. The status of this effort is described.« less
Metamorphic Testing for Cybersecurity.
Chen, Tsong Yueh; Kuo, Fei-Ching; Ma, Wenjuan; Susilo, Willy; Towey, Dave; Voas, Jeffrey; Zhou, Zhi Quan
2016-06-01
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security-related functionality and behavior. As demonstrated by the effectiveness of MT in detecting previously unknown bugs in real-world critical applications such as compilers and code obfuscators, we conclude that software testing of security-related features should be conducted from diverse perspectives in order to achieve greater cybersecurity.
Metamorphic Testing for Cybersecurity
Chen, Tsong Yueh; Kuo, Fei-Ching; Ma, Wenjuan; Susilo, Willy; Towey, Dave; Voas, Jeffrey
2016-01-01
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security-related functionality and behavior. As demonstrated by the effectiveness of MT in detecting previously unknown bugs in real-world critical applications such as compilers and code obfuscators, we conclude that software testing of security-related features should be conducted from diverse perspectives in order to achieve greater cybersecurity. PMID:27559196
DOT National Transportation Integrated Search
1999-10-31
In May, 1997, the National Private Truck Councils (NPTC) Private Fleet Management Institute (PFMI) began a research program in cooperation with Sue Roberts Health Concepts, Inc., ATA Foundation, Inc., and the Federal Motor Carrier Safety Administr...
76 FR 56318 - Parts and Accessories Necessary for Safe Operation; Saddle-Mount Braking Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-13
... a petition for rulemaking from the Automobile Carriers Conference (ACC) of the American Trucking... antilock braking systems. ACC Automobile Carriers Conference. ATA American Trucking Associations. ATC ATC... Carrier Safety Regulations. NATA National Automobile Transporters Association. NPRM notice of proposed...
Pulmonary function in men after oxygen breathing at 3.0 ATA for 3.5 h
NASA Technical Reports Server (NTRS)
Clark, J. M.; Jackson, R. M.; Lambertsen, C. J.; Gelfand, R.; Hiller, W. D. B.; Unger, M.
1991-01-01
A complete description of pulmonary measurements obtained after continuous O2 exposure of 13 healthy men at 3.0 ATA for 3.5 h is presented. Measurements included flow-volume loops, spirometry, and airway resistance(n = 12); CO diffusing capacity (n = 11); closing volumes (n= 6); and air vs. HeO2 forced vital capacity maneuvers (n = 5). The average difference in maximum mid expiratory flows at 50 percent vital capacity on air and HeO2 was found to be significantly reduced postexposure by 18 percent. Raw and CO diffusing capacity were not changed postexposure. It is concluded that the relatively large change in forced expiratory flow at 25-75 percent of vital capacity compared with the mean forced expiratory volume in 1 s, the reduction in density dependence of flow, and the normal Raw postexposure are all consistent with flow limitation in peripheral airways as a major cause of the observed reduction in expiratory flow.
Gao, Luying; Liu, Ruyu; Jiang, Yuxin; Song, Wenfeng; Wang, Ying; Liu, Jia; Wang, Juanjuan; Wu, Dongqian; Li, Shuai; Hao, Aimin; Zhang, Bo
2018-04-01
The purpose of this study was to compare the diagnostic efficiency of a thyroid ultrasound computer-aided diagnosis (CAD) system with that of 1 radiologist. This study retrospectively reviewed 342 surgically resected thyroid nodules from July 2013 to December 2013 at our center. The nodules were assessed on typical ultrasound images using the CAD system and reviewed by 1 experienced radiologist. The radiologist stratified the risk of malignancy using the Thyroid Imaging Reporting and Data Systems (TIRADS) and the American Thyroid Association (ATA) guidelines. The radiologist, using TI-RADS and ATA guidelines, performed better than the CAD system (P < .01). The sensitivity of the CAD system was similar to that of an experienced radiologist (P > .05; P < .01; and P > .05). However, we found that the CAD system had lower specificity (P < .01). The sensitivity of a thyroid ultrasound CAD system in differentiating nodules was similar to that of an experienced radiologist. However, the CAD system had lower specificity. © 2017 Wiley Periodicals, Inc.
Analytical model for atomic resonant attosecond transient absorption
NASA Astrophysics Data System (ADS)
Cariker, C.; Kjellson, T.; Lindroth, E.; Argenti, L.
2017-04-01
Recent advancements in ultrafast laser technology have made it possible to probe electron dynamics in highly excited atomic states that autoionize on a femtosecond timescale, thus giving insight into the dynamics of Auger decay and its interference with the continuum. These experiments provide a stringent test for time-resolved analytical models of autoionization. Here we present a finite-pulse, multi-photon perturbative model which is used in conjunction with ab-initio structure calculations to predict the attosecond transient absorption spectrum (ATAS) of an atom above the ionization threshold. We apply this model to compute the ATAS of argon in the vicinity of the 3s-1 4 p resonance as a function of the time delay between an extreme ultraviolet (XUV) and an infrared (IR) pulse, as well as of the angle between their polarization. We show that by modulating the parameters of the IR pulse it is possible to control the dipolar coupling between neighboring states and hence the lineshape of the 3s-1 4 p resonance. NSF Grant No. 1607588.
Lee, K H; Park, K Y; Khanal, S K; Lee, J W
2013-01-15
This study examines the effects of household detergent on anaerobic methane fermentation of wastewater from food waste disposers (FWDs). Anaerobic toxicity assay (ATA) demonstrated that methane production substantially decreased at a higher detergent concentration. The Gompertz three-parameter model fitted well with the ATA results, and both the extent of methane production (M) and methane production rate (R(m)) obtained from the model were strongly affected by the concentration of the detergent. The 50% inhibitory concentration (IC(50)) of the detergent was 603 mg/L based on R(m). Results from fatty acid methyl esters (FAMEs) analysis of microbial culture revealed that deterioration of methane fermentation was attributed to impaired structure of anaerobic microbial membrane due to detergent. This study suggests that wastewater from FWD could be used for methane production, but it is necessary to reduce the concentration of detergent prior to anaerobic fermentation. Copyright © 2012 Elsevier B.V. All rights reserved.
Love-type surface acoustic wave on Y-X LiTaO3 with amorphous Ta2O5 thin film
NASA Astrophysics Data System (ADS)
Kakio, Shoji; Fukasawa, Haruka; Hosaka, Keiko
2015-07-01
In this study, to obtain a substrate structure with a lower phase velocity, the propagation properties of a Love-type surface acoustic wave (Love SAW) on Y-X LiTaO3 (LT) with an amorphous tantalum pentoxide (a-Ta2O5) thin film were investigated using a simple delay line and a resonator with a wavelength λ of 8 µm. The insertion loss of a simple delay line was decreased markedly by loading with an a-Ta2O5 film owing to a transformation from a leaky SAW (LSAW) to a non-leaky Love SAW. A phase velocity of 3,340 m/s, a coupling factor of 5.8%, and a propagation loss of 0.03 dB/λ were obtained for a normalized thickness h/λ of 0.120. Moreover, the resonance properties of the Love SAW were almost equal or superior to those for an LSAW on Al/36° Y-X LT, except for the fractional bandwidth.
ERIC Educational Resources Information Center
Olijnyk, Nicholas Victor
2014-01-01
The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…
Socioeconomic Data and Applications Center | SEDAC
Themes * Agriculture * Climate * Conservation * Governance * Hazards * Health * Infrastructure * Land Use satellite imagery. Agriculture and Food Security Theme - Agriculture and Food Security Find data sets, maps , map services, featured uses of data and other resources related to Agriculture and Food Security
Caribbean and Eastern Pacific Maritime Security: Regional Cooperation in Bridge and Insular States
The international cocaine market has transformed the Caribbean Basin into the most violent region in the world. Against the onslaught of drugs and... violence , interstate security cooperation and intelligence sharing are increasingly prominent features of state security strategies. The evolution of
Asia-Pacific Center for Security Studies Annual Report 2010
2010-01-01
focused symposium in the Maldives on combating terrorism involving officials from five South Asia nations; • A series of discussion periods in China on U.S...priorities and best practices among high-level security officials from the Republic of the Philippines, Sri Lanka, the Maldives and Mongolia; • A...international security featured as prominently in 2010 in so wide a range of security-related discussions: whether traditional security ( sinking of the
19 CFR 118.11 - Contents of application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... features, and staging and work space. Where a significant capital expenditure would be required in order..., and social security numbers. (Providing social security numbers is voluntary; however, failure to...
19 CFR 118.11 - Contents of application.
Code of Federal Regulations, 2011 CFR
2011-04-01
... features, and staging and work space. Where a significant capital expenditure would be required in order..., and social security numbers. (Providing social security numbers is voluntary; however, failure to...
Security bound of cheat sensitive quantum bit commitment.
He, Guang Ping
2015-03-23
Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.
23 CFR Appendix A to Part 1313 - Tamper Resistant Driver's License
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Block graphics. (15) Security fonts and graphics with known hidden flaws. (16) Card stock, layer with colors. (17) Micro-graphics. (18) Retroflective security logos. (19) Machine readable technologies such... permit that has one or more of the following security features: (1) Ghost image. (2) Ghost graphic. (3...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0029] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0030] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...
78 FR 58973 - Airworthiness Directives; Dassault Aviation Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-25
... 2000EX type design are included in Dassault Aviation Falcon 2000EX (F2000EX) Aircraft Maintenance Manual... numbers. (d) Subject Air Transport Association (ATA) of America Code 05, Time Limits/ Maintenance Checks... to introduce a corrosion prevention control program, among other changes, to the maintenance...
Accessing the Classroom Discourse Community through Accountable Talk: English Learners' Voices
ERIC Educational Resources Information Center
Ardasheva, Yuliya; Howell, Penny B.; Vidrio Magaña, Margarita
2016-01-01
This case study draws on Gee's (1989) "D/discourse theory" to investigate English learners' (ELs') perspectives regarding Accountable Talk (AT)--a structured, discourse-intensive instructional approach--after a yearlong implementation in three content-based (mathematics) middle school classrooms. Interviews with 21 ELs (3 Advanced…
ERIC Educational Resources Information Center
Scott, Alexander; Straker-Cook, Dawn
1976-01-01
This paper contains survey information relating to the relative performance of economics pupils at"A" level, their feelings about the subject, and the type of teaching to which they are exposed. The primary concern is to stimulate debate about the issues raised. Journal is available from: Economics Association, Room 340, Hamilton House, Mabledon…
76 FR 75470 - Drivers of CMVs: Restricting the Use of Cellular Phones
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-02
... children and/or school personnel between home and school. This particular exemption is not based on any... said that this ``overly prescriptive'' regulatory wording would inhibit development of innovative... Association suggested allowing negligible movements to activate a hands-free mobile telephone. ATA recommended...
Building Assessment Survey and Evaluation Study: Quality Assurance Project Plan
This supplement describes QA/QC aspects of the implementation of the Office of Radiation and Indoor Air's BASE protocol including: recruitment of study buildings, execution of field studies in each building, and the processing and coordination of each building's ata for final submittal to EPA.
NASA Astrophysics Data System (ADS)
Chen, G. S.; Chen, S. T.
2000-06-01
Tantalum-related thin films containing different amounts of nitrogen are sputter deposited at different argon-to-nitrogen flow rate ratios on (100) silicon substrates. Using x-ray diffractometry, transmission electron microscopy, composition and resistivity analyses, and bending-beam stress measurement technique, this work examines the impact of varying the nitrogen flow rate, particularly on the crystal structure, composition, resistivity, and residual intrinsic stress of the deposited Ta2N thin films. With an adequate amount of controlled, reactive nitrogen in the sputtering gas, thin films of the tantalum nitride of nominal formula Ta2N are predominantly amorphous and can exist over a range of nitrogen concentrations slightly deviated from stoichiometry. The single-layered quasi-amorphous Ta2N (a-Ta2N) thin films yield intrinsic compressive stresses in the range 3-5 GPa. In addition, the use of the 40-nm-thick a-Ta2N thin films with different nitrogen atomic concentrations (33% and 36%) and layering designs as diffusion barriers between silicon and copper are also evaluated. When subjected to high-temperature annealing, the single-layered a-Ta2N barrier layers degrade primarily by an amorphous-to-crystalline transition of the barrier layers. Crystallization of the single-layered stoichiometric a-Ta2N (Ta67N33) diffusion barriers occurs at temperatures as low as 450 °C. Doing so allows copper to preferentially penetrate through the grain boundaries or thermal-induced microcracks of the crystallized barriers and react with silicon, sequentially forming {111}-facetted pyramidal Cu3Si precipitates and TaSi2 Overdoping nitrogen into the amorphous matrix can dramatically increase the crystallization temperature to 600 °C. This temperature increase slows down the inward diffusion of copper and delays the formation of both silicides. The nitrogen overdoped Ta2N (Ta64N36) diffusion barriers can thus be significantly enhanced so as to yield a failure temperature 100 °C greater than that of the Ta67N33 diffusion barriers. Moreover, multilayered films, formed by alternately stacking the Ta67N33 and Ta64N36 layers with an optimized bilayer thickness (λ) of 10 nm, can dramatically reduce the intrinsic compressive stress to only 0.7 GPa and undergo high-temperature annealing without crystallization. Therefore, the Ta67N33/Ta64N36 multilayered films exhibit a much better barrier performance than the highly crystallization-resistant Ta64N36 single-layered films.
A 2015 Survey of Clinical Practice Patterns in the Management of Thyroid Nodules.
Burch, Henry B; Burman, Kenneth D; Cooper, David S; Hennessey, James V; Vietor, Nicole O
2016-07-01
The management of thyroid nodules has changed dramatically over the past two decades. In the interim, technological advances including high-resolution ultrasound and molecular testing of thyroid nodules have been introduced. We sought to document current practices in the management thyroid nodules and assess the extent to which technological advances have been incorporated into current practice. We further sought to compare current practice to recommendations made in a recently updated American Thyroid Association (ATA) clinical practice guideline (CPG) and examine differences in thyroid nodule management among international members of U.S.-based endocrine societies. Members of The Endocrine Society, ATA, and American Association of Clinical Endocrinologists were invited to participate in a Web-based survey dealing with testing, treatment preference, and modulating factors in patients with thyroid nodules. A total of 897 respondents participated in the survey, including 661 members of The Endocrine Society, 454 American Association of Clinical Endocrinologists members, and 365 ATA members. Thyroid fine-needle aspiration (FNA) in 2015 is generally performed by endocrinologists (56.6%) and radiologists (31.9%), most frequently using ultrasound guidance (83.3%). Respondents in general have a lower threshold for FNA of thyroid nodules than that recommended in the updated ATA CPG. Management depends on the FNA result, with follicular lesion of undetermined significance/atypia of undetermined significance resulting in molecular testing (38.8% of respondents), repeat FNA cytology (31.5%), or immediate referral for thyroid surgery (24.4%). Nodules showing follicular neoplasm by FNA are referred for thyroid surgery by 61.2% of respondents (46.6 % lobectomy, 14.6 % total thyroidectomy) or molecular testing (29.0 %). Nodules found suspicious but not conclusive for malignancy (Bethesda category V), are referred for thyroid surgery (86.0%) and rarely undergo molecular testing (9.5%). During pregnancy, only 47.6% of respondents would perform FNA in the absence of nodular growth, with most respondents deferring FNA until after pregnancy. Endocrinologists are 64.2% less likely to perform FNA in an octogenarian than a younger patient with a comparable thyroid nodule. Striking international differences were identified in the routine measurement of calcitonin and in the use of molecular testing of thyroid nodules. In summary, our survey of clinical endocrinologists on the management of thyroid nodules documents current practice patterns and demonstrates both concordance and focal discordance with recently updated CPGs. Both international differences and a change in practice patterns during the past two decades are demonstrated.
Timing in audiovisual speech perception: A mini review and new psychophysical data.
Venezia, Jonathan H; Thurman, Steven M; Matchin, William; George, Sahara E; Hickok, Gregory
2016-02-01
Recent influential models of audiovisual speech perception suggest that visual speech aids perception by generating predictions about the identity of upcoming speech sounds. These models place stock in the assumption that visual speech leads auditory speech in time. However, it is unclear whether and to what extent temporally-leading visual speech information contributes to perception. Previous studies exploring audiovisual-speech timing have relied upon psychophysical procedures that require artificial manipulation of cross-modal alignment or stimulus duration. We introduce a classification procedure that tracks perceptually relevant visual speech information in time without requiring such manipulations. Participants were shown videos of a McGurk syllable (auditory /apa/ + visual /aka/ = perceptual /ata/) and asked to perform phoneme identification (/apa/ yes-no). The mouth region of the visual stimulus was overlaid with a dynamic transparency mask that obscured visual speech in some frames but not others randomly across trials. Variability in participants' responses (~35 % identification of /apa/ compared to ~5 % in the absence of the masker) served as the basis for classification analysis. The outcome was a high resolution spatiotemporal map of perceptually relevant visual features. We produced these maps for McGurk stimuli at different audiovisual temporal offsets (natural timing, 50-ms visual lead, and 100-ms visual lead). Briefly, temporally-leading (~130 ms) visual information did influence auditory perception. Moreover, several visual features influenced perception of a single speech sound, with the relative influence of each feature depending on both its temporal relation to the auditory signal and its informational content.
Timing in Audiovisual Speech Perception: A Mini Review and New Psychophysical Data
Venezia, Jonathan H.; Thurman, Steven M.; Matchin, William; George, Sahara E.; Hickok, Gregory
2015-01-01
Recent influential models of audiovisual speech perception suggest that visual speech aids perception by generating predictions about the identity of upcoming speech sounds. These models place stock in the assumption that visual speech leads auditory speech in time. However, it is unclear whether and to what extent temporally-leading visual speech information contributes to perception. Previous studies exploring audiovisual-speech timing have relied upon psychophysical procedures that require artificial manipulation of cross-modal alignment or stimulus duration. We introduce a classification procedure that tracks perceptually-relevant visual speech information in time without requiring such manipulations. Participants were shown videos of a McGurk syllable (auditory /apa/ + visual /aka/ = perceptual /ata/) and asked to perform phoneme identification (/apa/ yes-no). The mouth region of the visual stimulus was overlaid with a dynamic transparency mask that obscured visual speech in some frames but not others randomly across trials. Variability in participants' responses (∼35% identification of /apa/ compared to ∼5% in the absence of the masker) served as the basis for classification analysis. The outcome was a high resolution spatiotemporal map of perceptually-relevant visual features. We produced these maps for McGurk stimuli at different audiovisual temporal offsets (natural timing, 50-ms visual lead, and 100-ms visual lead). Briefly, temporally-leading (∼130 ms) visual information did influence auditory perception. Moreover, several visual features influenced perception of a single speech sound, with the relative influence of each feature depending on both its temporal relation to the auditory signal and its informational content. PMID:26669309
Image feature extraction in encrypted domain with privacy-preserving SIFT.
Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang
2012-11-01
Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preserving SIFT (PPSIFT) and to address the problem of secure SIFT feature extraction and representation in the encrypted domain. As all of the operations in SIFT must be moved to the encrypted domain, we propose a privacy-preserving realization of the SIFT method based on homomorphic encryption. We show through the security analysis based on the discrete logarithm problem and RSA that PPSIFT is secure against ciphertext only attack and known plaintext attack. Experimental results obtained from different case studies demonstrate that the proposed homomorphic encryption-based privacy-preserving SIFT performs comparably to the original SIFT and that our method is useful in SIFT-based privacy-preserving applications.
2018-05-01
Reports an error in "Objectifying the subjective: Building blocks of metacognitive experiences in conflict tasks" by Laurence Questienne, Anne Atas, Boris Burle and Wim Gevers ( Journal of Experimental Psychology: General , 2018[Jan], Vol 147[1], 125-131). In this article, the second sentence of the second paragraph of the Data Processing section is incorrect due to a production error. The second sentence should read as follows: RTs slower/shorter than Median 3 Median Absolute Deviations computed by participant were removed. (The following abstract of the original article appeared in record 2017-52065-001.) Metacognitive appraisals are essential for optimizing our information processing. In conflict tasks, metacognitive appraisals can result from different interrelated features (e.g., motor activity, visual awareness, response speed). Thanks to an original approach combining behavioral and electromyographic measures, the current study objectified the contribution of three features (reaction time [RT], motor hesitation with and without response competition, and visual congruency) to the subjective experience of urge-to-err in a priming conflict task. Both RT and motor hesitation with response competition were major determinants of metacognitive appraisals. Importantly, motor hesitation in absence of response competition and visual congruency had limited effect. Because science aims to rely on objectivity, subjective experiences are often discarded from scientific inquiry. The current study shows that subjectivity can be objectified. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
77 FR 75908 - Airworthiness Directives; Gulfstream Aerospace Corporation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
.... (d) Subject Joint Aircraft System Component (JASC)/Air Transport Association (ATA) of America Code... of the fuel boost pump and over-heat damage found on the internal components and external housing. This proposed AD would require doing an inspection to determine if fuel boost pumps having a certain...
Rural health care support mechanism. Final rule; petition for reconsideration.
2008-04-10
In this document, the Commission grants American Telemedicine Association's (ATA) Petition for Reconsideration in part and extends for three years the Commission's prior determination to grandfather those health care providers who were eligible under the Commission's definition of "rural" prior to the Second Report and Order.
DOT National Transportation Integrated Search
2009-08-31
This report presents the results of the United States Department of Transportation evaluation of a federally funded earmark project implemented by the Area Transportation Authority of North Central Pennsylvania (ATA). The project implemented a suite ...
76 FR 49388 - Proposed Establishment of Class E Airspace; Tatitlek, AK
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... approach procedure at the Tatitlek Airport has made this action necessary to enhance safety and management... 26, 2011. ADDRESSES: Send comments on the proposal to the Docket Management Facility, U.S. Department... Federal Aviation Administration, Office of Air Traffic Airspace Management, ATA-400, 800 Independence...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Institute “Code for Pressure Piping, Power Piping.” ASME Code means the American Society of Mechanical Engineers “Boiler and Pressure Vessel Code.” ASME PVHO-1 means the ANSI/ASME standard “Safety Standard for Pressure Vessels for Human Occupancy.” ATA means a measure of pressure expressed in terms of atmosphere...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Institute “Code for Pressure Piping, Power Piping.” ASME Code means the American Society of Mechanical Engineers “Boiler and Pressure Vessel Code.” ASME PVHO-1 means the ANSI/ASME standard “Safety Standard for Pressure Vessels for Human Occupancy.” ATA means a measure of pressure expressed in terms of atmosphere...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Institute “Code for Pressure Piping, Power Piping.” ASME Code means the American Society of Mechanical Engineers “Boiler and Pressure Vessel Code.” ASME PVHO-1 means the ANSI/ASME standard “Safety Standard for Pressure Vessels for Human Occupancy.” ATA means a measure of pressure expressed in terms of atmosphere...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Institute “Code for Pressure Piping, Power Piping.” ASME Code means the American Society of Mechanical Engineers “Boiler and Pressure Vessel Code.” ASME PVHO-1 means the ANSI/ASME standard “Safety Standard for Pressure Vessels for Human Occupancy.” ATA means a measure of pressure expressed in terms of atmosphere...
75 FR 26062 - Representation Election Procedure
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
... as follows. A. Motions for Disqualification Following the close of the comment period under the NPRM... 15, 2010, Right to Work also filed a motion requesting the disqualification of Members Hoglander and... Airlines, and US Airways did not join in this motion. ATA and Right to Work each contend \\3\\ that ``[p...
Educational activities for the diffusion of scientific culture
NASA Astrophysics Data System (ADS)
Ferlet, Roger
2015-08-01
Considering there is a divorce between science and culture, we suggest activities such as trails of mathematical/astronomical knowledge and vision of scientific teaching and education, that are aiming ata global, citizen dialogue, at reviving a truly human culture integrating science, and at answering all kinds of obscurantism/fundamentalism.
Translation and Interpreting Support for Army R&D Activities.
1986-04-30
mean "radio-thermal" translate into English as "infrared." •" 24/ American Translators’ Association, 109 Croton Avenue, Ossining , New York 10562. 68...Translator and Interpreter Training Prepared on Behalf of the ATA, Ossining , NY, August 1983 Gale Research Company, 1985-85 Encyclopedia of Information
The Operator Shell: A means of privilege distribution under Unix
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neuman, M.; Christoph, G.
1994-03-01
The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell for providing fine-grain distribution of system privileges for a wide range of usages and requirements. Osh offers a marked improvement over other Unix privilege distribution systems in its ability to specify access to both commands and files, auditing features, and familiar interface. This paper describes the design, features, security considerations, internals, and applications of the Operator Shell.
Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan
2016-01-01
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.
31 CFR 363.5 - How do I contact Fiscal Service?
Code of Federal Regulations, 2014 CFR
2014-07-01
...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE REGULATIONS GOVERNING SECURITIES...” feature within TreasuryDirect ® to communicate information to us over a secure Internet connection. (b... otherwise. We are not responsible for the security of e-mail messages you may send to us, or replies we may...
The Handbook for Campus Safety and Security Reporting. 2016 Edition
ERIC Educational Resources Information Center
US Department of Education, 2016
2016-01-01
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2014 CFR
2014-04-01
... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to... determining the current availability of an optional form of benefit or social security supplement if the...
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2013 CFR
2013-04-01
... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to... determining the current availability of an optional form of benefit or social security supplement if the...
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2012 CFR
2012-04-01
... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to... determining the current availability of an optional form of benefit or social security supplement if the...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
78 FR 67956 - Rates for Interstate Inmate Calling Services
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... facility employees. Our Order ensures that security features that are part of modern ICS continue to be...]iven modern-day technology, the costs for providing secure phone and video services to correctional...
Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran
2016-01-01
Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
Moghaddasi, Hamid; Kamkarhaghighi, Mehran
2016-01-01
Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823
2002-09-01
Basic for Applications ( VBA ) 6.0 as macros may not be supported in 8 future versions of Access. Access 2000 offers Internet- related features for...security features from Microsoft’s SQL Server. [1] 3. System Requirements Access 2000 is a resource-intensive application as are all Office 2000...1] • Modules – Functions and procedures written in the Visual Basic for Applications ( VBA ) programming language. The capabilities of modules
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
77 FR 41934 - Airworthiness Directives; The Boeing Company Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... Transport Association (ATA) of America Code 2800, Aircraft Fuel System. (e) Unsafe Condition This AD was... operational tests of the engine fuel suction feed of the fuel system, and other related testing if necessary... loss of boost pump pressure of the fuel feed system, followed by loss of fuel system suction feed...
77 FR 23166 - Airworthiness Directives; The Boeing Company Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-18
... Aircraft System Component (JASC)/Air Transport Association (ATA) of America Code 28, Fuel. (e) Unsafe...-30F, MD-11, and MD-11F airplanes. This proposed AD was prompted by fuel system reviews conducted by... for fuel tank systems. As a result of those findings, we issued a regulation titled ``Transport...
The Environmental Monitoring and Assessment Program (EMAP) has collected a suite of environmental data over a four year period from estuarine system in the mid-Atlantic and Gulf of Mexico. ata are currently available for secondary users including environmental modelers. he data w...
An Automated Cloud Observation System (ACOS).
1980-12-17
IQ 4. TITLE (and SubliIII.J 5- TYPE OF REPORT & PERIOD COVERED AN.JUTOXMATrD A LOUD OBSERVATION Scientific . Interim. SYSTEM (ALLIS) 6 PERFORMING ORG...p oci -dIi IV ( ( )S). . hhe 6 lists the percentage of agreement realizied by -:~ tc thc fiftt en metthods (I’ p touping ceilomieter t’ ata (see Ta
GRAS notice 733 for Purified steviol glycosides part 2
Center for Food Safety and Applied Nutrition (CFSAN)
... d()..to. +.'LSl. ct ~ttJ!~~: D : \\ CH . EM32\\ l\\~ATA\\2 J l 6 ~ 09-~~;:1CG002;.o , 'r'\\CVV'I naa~~ .. L' t~ tw~ ~i. i..i./J(ti-. • "'t. c:i.tta.. P.«f pe4t. (J.~" ...
Cheaters: A Case Study of Plagiarism in Composition Classrooms
ERIC Educational Resources Information Center
Yadgir, Sheri A.
2013-01-01
This study sought to find a better understanding of plagiarism in the university writing classroom; specifically, institutional and departmental honor codes and policies were looked at--as was the tendency of individual instructors to follow those policies versus creating their own. The narrow purpose of the study was to investigate plagiarism…
ERIC Educational Resources Information Center
Eko, Ebele
1986-01-01
Describes mother-daughter relations in four American and African literary works: Ama Ata Aidoo's "Anowa," Gloria Naylor's "Women of Brewster Place," Bessie Head's "Maru," and Paule Marshall's "Brown Girl Brownstones." Argues that the myth of Black mother-daughter confrontations camouflages deep-seated frustrations associated with racial and sexual…
Automated Test-Form Generation
ERIC Educational Resources Information Center
van der Linden, Wim J.; Diao, Qi
2011-01-01
In automated test assembly (ATA), the methodology of mixed-integer programming is used to select test items from an item bank to meet the specifications for a desired test form and optimize its measurement accuracy. The same methodology can be used to automate the formatting of the set of selected items into the actual test form. Three different…
76 FR 62661 - Airworthiness Directives; The Boeing Company Model 767-200 and -300 Series Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-11
...-766-5680; e-mail: [email protected] ; Internet: https://www.myboeingfleet.com . You may review...- 3356; phone: 425-917-6596; fax: 425-917-6590; e-mail: [email protected] . SUPPLEMENTARY INFORMATION... Transport Association (ATA) of America Code 25: Equipment and Furnishings. Unsafe Condition (e) This AD was...
JPRS Report, Proliferation Issues
1992-06-25
control of INGTON POST saying: "Secretary of Defense Richard Nuclemon Minero Quimica Ltda. [Nuclebras Monazite and Cheney approved the Pentagon’s plan ... Planned [Alm a-Ata Radio] .................................................................................................. 26 Krasnoyarsk Search for...34 [Article by political staff: "Space plan defended"] He said the aim of the investigation was to determine the market opportunities, risks and
ERIC Educational Resources Information Center
Meyer, Kevin R.; Mao, Yuping
2014-01-01
Previous studies have revealed that American undergraduate students complain about International Teaching Assistants' (ITAs) lack of English proficiency and rate ITAs lower than American Teaching Assistants (ATAs) on teaching evaluations. This study investigates student perceptions of classroom climate to discover how ITAs might overcome students'…
Bardhan, Munmun; Misra, Tapas; Ganguly, Tapan
2012-01-05
The present paper reports the investigations on the spectroscopic behavior of the binary complexes of the dye aurintricarboxylic acid (ATA) with protein bovine serum albumin (BSA) and 18-crown 6 (CW) (ATA·BSA, ATA·CW) and the ternary complex ATA·CW·BSA by using UV-vis steady state and time resolved fluorescence spectroscopy. The primary aim of the work is to determine the protein (BSA) quantization by fluorescence enhancement method and investigate the 'enhancer' activity of crown ether (CW) on it to increase the resolution. Steady state and time resolved fluorescence measurements demonstrated how fluorescence intensity of ATA could be used for the determination of the protein BSA in aqueous solution. The binding of dye (probe/fluorescent medicinal molecule) with protein and the denaturing effect in the polar environment of acetonitrile of the dye protein complex act as drug binding as well as drug release activity. Apart from its basic research point of view, the present study also possesses significant importance and applications in the field of medicinal chemistry. Copyright © 2011 Elsevier B.V. All rights reserved.
A New Paradigm of Primary Health Care in Kazakhstan
Sharman, Almaz
2014-01-01
This paper discusses the need for change from Kazakhstan’s current disease-centric healthcare paradigm to a new primary health and wellness-centric health care paradigm, technology-driven and based on personal relationships within a social context. While many different papers have been published about the importance of prevention and primary health care, few have focused on healthcare transition in Kazakhstan or other countries in Central Asia. The WHO’s historic 1978 Alma-Ata Declaration signed in Kazakhstan promoted the centrality of primary care to the provision of effective, efficient, and equitable health services. Modern technologies such as the Internet, social media, and portable medical devices democratize medicine, providing great opportunities to rethink the Alma-Ata Declaration and reinvent primary health care on an entirely new platform that is knowledge-based and technology-assisted. The new paradigm suggested for the future development of health in Central Asian region emphasizes personal relationships and encourages sustainable solutions created by communities. This paper also introduces HealthCity, a new project in Kazakhstan aiming at introducing private, community-based and standardized primary healthcare that is driven by SmartHealth innovative technology. PMID:29755891
Lu, B.; Petrola, Z.; Luquetti, A. O.; PereiraPerrin, M.
2010-01-01
The Chagas’ disease parasite Trypanosoma cruzi promotes survival and differentiation of neurones by binding and activating nerve growth factor (NGF) receptor TrkA. The functional mimic of NGF in T. cruzi is a surface-bound and shed immunogenic protein [neurotrophic factor/trans-sialidase (TS)], which raised the possibility that immune response to T. cruzi in general and to neurotrophic factor/TS in particular leads to loss of immunological tolerance to host NGF and/or the NGF-binding partner TrkA. In testing this hypothesis, we found that sera of individuals with chronic Chagas’ disease bear unique IgG2 autoantibodies that bind TrkA and TrkA family members TrkB and TrkC (ATA). Binding of ATA to Trk receptors is specific because the autoantibodies did not cross-react with five other growth factor receptors, NGF and other neurotrophins, and T. cruzi. Thus, individuals with chronic Chagas’ disease produce unique antibodies that react with pan-Trk receptors, one of which (TrkA) T. cruzi exploits to inhibit host cell apoptosis and to promote cellular invasion. PMID:18410251
SETI Observations of Exoplanets with the Allen Telescope Array
NASA Astrophysics Data System (ADS)
Harp, G. R.; Richards, Jon; Tarter, Jill C.; Dreher, John; Jordan, Jane; Shostak, Seth; Smolek, Ken; Kilsdonk, Tom; Wilcox, Bethany R.; Wimberly, M. K. R.; Ross, John; Barott, W. C.; Ackermann, R. F.; Blair, Samantha
2016-12-01
We report radio SETI observations on a large number of known exoplanets and other nearby star systems using the Allen Telescope Array (ATA). Observations were made over about 19000 hr from 2009 May to 2015 December. This search focused on narrowband radio signals from a set totaling 9293 stars, including 2015 exoplanet stars and Kepler objects of interest and an additional 65 whose planets may be close to their habitable zones. The ATA observations were made using multiple synthesized beams and an anticoincidence filter to help identify terrestrial radio interference. Stars were observed over frequencies from 1 to 9 GHz in multiple bands that avoid strong terrestrial communication frequencies. Data were processed in near-real time for narrowband (0.7-100 Hz) continuous and pulsed signals with transmitter/receiver relative accelerations from -0.3 to 0.3 m s-2. A total of 1.9 × 108 unique signals requiring immediate follow-up were detected in observations covering more than 8 × 106 star-MHz. We detected no persistent signals from extraterrestrial technology exceeding our frequency-dependent sensitivity threshold of 180-310 × 10-26 W m-2.
Dynamic security contingency screening and ranking using neural networks.
Mansour, Y; Vaahedi, E; El-Sharkawi, M A
1997-01-01
This paper summarizes BC Hydro's experience in applying neural networks to dynamic security contingency screening and ranking. The idea is to use the information on the prevailing operating condition and directly provide contingency screening and ranking using a trained neural network. To train the two neural networks for the large scale systems of BC Hydro and Hydro Quebec, in total 1691 detailed transient stability simulation were conducted, 1158 for BC Hydro system and 533 for the Hydro Quebec system. The simulation program was equipped with the energy margin calculation module (second kick) to measure the energy margin in each run. The first set of results showed poor performance for the neural networks in assessing the dynamic security. However a number of corrective measures improved the results significantly. These corrective measures included: 1) the effectiveness of output; 2) the number of outputs; 3) the type of features (static versus dynamic); 4) the number of features; 5) system partitioning; and 6) the ratio of training samples to features. The final results obtained using the large scale systems of BC Hydro and Hydro Quebec demonstrates a good potential for neural network in dynamic security assessment contingency screening and ranking.
Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments
2010-11-01
behavioral feature values. This would provide a baseline notional object trust and is formally defined as follows: TO(1)[0, 1] = ∑ 0,n:νbt wtP (S) (8...TO(2)[0, 1] = ∑ wtP (S) · identity(O,P ) (9) 28- 12 RTO-MP-IST-091 Combining Trust and Behavioral Analysis to Detect Security Threats in Open...respectively. The wtP weight function determines the significance of a particular behavioral feature in the final trust calculation. Note that the weight
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Minnicelli, Carolina; Segges, Priscilla; Stefanoff, Gustavo; Kristcevic, Flavia; Ezpeleta, Joaquin; Tapia, Elizabeth; Niedobitek, Gerald; Barros, Mário Henrique M.
2018-01-01
ABSTRACT Interleukin-10 (IL10) is an immune regulatory cytokine. Single nucleotide polymorphisms (SNPs) in IL10 promoter have been associated with prognosis in adult classical Hodgkin lymphoma (cHL). We analyzed IL10 SNPs −1082 and −592 in respect of therapy response, gene expression and tumor microenvironment (TME) composition in 98 pediatric patients with cHL. As confirmatory results, we found that −1082AA/AG; −592CC genotypes and ATA haplotype were associated with unfavourable prognosis: Progression-free survival (PFS) was shorter in −1082AA+AG (72.2%) than in GG patients (100%) (P = 0.024), and in −592AA (50%) and AC (74.2%) vs. CC patients (87.0%) (P = 0.009). In multivariate analysis, the −592CC genotype and the ATA haplotype retained prognostic impact (HR: 0.41, 95% CI 0.2–0.86; P = 0.018, and HR: 3.06 95% CI 1.03–9.12; P = 0.044, respectively). Our analysis further led to some new observations, namely: (1) Low IL10 mRNA expression was associated with −1082GG genotype (P = 0.014); (2) IL10 promoter polymorphisms influence TME composition;−1082GG/−592CC carriers showed low numbers of infiltrating cells expressing MAF transcription factor (20 vs. 78 and 49 vs. 108 cells/mm2, respectively; P< 0.05); while ATA haplotype (high expression) associated with high numbers of MAF+ cells (P = 0.005). Specifically, −1082GG patients exhibited low percentages of CD68+MAF+ (M2-like) intratumoral macrophages (15.04% vs. 47.26%, P = 0.017). Considering ours as an independent validation cohort, our results give support to the clinical importance of IL10 polymorphisms in the full spectrum of cHL, and advance the concept of genetic control of microenvironment composition as a basis for susceptibility and therapeutic response. PMID:29721365
Vera-Lozada, Gabriela; Minnicelli, Carolina; Segges, Priscilla; Stefanoff, Gustavo; Kristcevic, Flavia; Ezpeleta, Joaquin; Tapia, Elizabeth; Niedobitek, Gerald; Barros, Mário Henrique M; Hassan, Rocio
2018-01-01
Interleukin-10 (IL10) is an immune regulatory cytokine. Single nucleotide polymorphisms (SNPs) in IL10 promoter have been associated with prognosis in adult classical Hodgkin lymphoma (cHL). We analyzed IL10 SNPs -1082 and -592 in respect of therapy response, gene expression and tumor microenvironment (TME) composition in 98 pediatric patients with cHL. As confirmatory results, we found that -1082AA/AG; -592CC genotypes and ATA haplotype were associated with unfavourable prognosis: Progression-free survival (PFS) was shorter in -1082AA+AG (72.2%) than in GG patients (100%) (P = 0.024), and in -592AA (50%) and AC (74.2%) vs. CC patients (87.0%) (P = 0.009). In multivariate analysis, the -592CC genotype and the ATA haplotype retained prognostic impact (HR: 0.41, 95% CI 0.2-0.86; P = 0.018, and HR: 3.06 95% CI 1.03-9.12; P = 0.044, respectively). Our analysis further led to some new observations, namely: (1) Low IL10 mRNA expression was associated with -1082GG genotype (P = 0.014); (2) IL10 promoter polymorphisms influence TME composition;-1082GG/-592CC carriers showed low numbers of infiltrating cells expressing MAF transcription factor (20 vs. 78 and 49 vs. 108 cells/mm 2 , respectively; P< 0.05); while ATA haplotype (high expression) associated with high numbers of MAF+ cells (P = 0.005). Specifically, -1082GG patients exhibited low percentages of CD68+MAF+ (M2-like) intratumoral macrophages (15.04% vs. 47.26%, P = 0.017). Considering ours as an independent validation cohort, our results give support to the clinical importance of IL10 polymorphisms in the full spectrum of cHL, and advance the concept of genetic control of microenvironment composition as a basis for susceptibility and therapeutic response.
Hyperbaric oxygen preconditioning protects against traumatic brain injury at high altitude.
Hu, S L; Hu, R; Li, F; Liu, Z; Xia, Y Z; Cui, G Y; Feng, H
2008-01-01
Recent studies have shown that preconditioning with hyperbaric oxygen (HBO) can reduce ischemic and hemorrhagic brain injury. We investigated effects of HBO preconditioning on traumatic brain injury (TBI) at high altitude and examined the role of matrix metalloproteinase-9 (MMP-9) in such protection. Rats were randomly divided into 3 groups: HBO preconditioning group (HBOP; n = 13), high-altitude group (HA; n = 13), and high-altitude sham operation group (HASO; n = 13). All groups were subjected to head trauma by weight-drop device, except for HASO group. HBOP rats received 5 sessions of HBO preconditioning (2.5 ATA, 100% oxygen, 1 h daily) and then were kept in hypobaric chamber at 0.6 ATA (to simulate pressure at 4000m altitude) for 3 days before operation. HA rats received control pretreatment (1 ATA, room air, 1 h daily), then followed the same procedures as HBOP group. HASO rats were subjected to skull opening only without brain injury. Twenty-four hours after TBI, 7 rats from each group were examined for neurological function and brain water content; 6 rats from each group were killed for analysis by H&E staining and immunohistochemistry. Neurological outcome in HBOP group (0.71 +/- 0.49) was better than HA group (1.57 +/- 0.53; p < 0.05). Preconditioning with HBO significantly reduced percentage of brain water content (86.24 +/- 0.52 vs. 84.60 +/- 0.37; p < 0.01). Brain morphology and structure seen by light microscopy was diminished in HA group, while fewer pathological injuries occurred in HBOP group. Compared to HA group, pretreatment with HBO significantly reduced the number of MMP-9-positive cells (92.25 +/- 8.85 vs. 74.42 +/- 6.27; p < 0.01). HBO preconditioning attenuates TBI in rats at high altitude. Decline in MMP-9 expression may contribute to HBO preconditioning-induced protection of brain tissue against TBI.
Antithymocyte antibody-induced coagulopathy in renal transplant recipients.
Siparsky, N F; Klein, R; Kushnir, L F; Gallichio, M H; Conti, D J
2013-05-01
Antithymocyte antibody (ATA) remains the most commonly used induction immunosuppressive agent in renal transplantation (RT). To date, few case reports of ATA-induced coagulopathy exist. We performed a single-center, retrospective analysis of renal transplant recipients (RTRs) who underwent RT followed by ATA therapy between 2007 and 2011. The protocol used for deceased donor and unrelated living donor recipient immunosuppression was Thymoglobulin (TMG), methylprednisolone, Cellcept, Prograf, and Rapamune. In related living donor recipients, Simulect (SIM) was substituted for TMG. The international normalized ratio (INR) was routinely checked on days 0 and 2, and thereafter at the discretion of the surgeon. RTRs were transfused packed red blood cells (PRBCs) or fresh frozen plasma (FFP) at the discretion of the surgeon. During the study period, 257 RTs were performed at our institution. The following 18 RTR were excluded: simultaneous kidney and pancreas transplant recipients (4), RTRs on warfarin at the time of admission (2), RTRs who received OKT3 (2), and RTRs with INR ≥ 1.2 at the time of admission (10). Of the remaining 239 RTR, 208 (87%) underwent TMG induction therapy; 31 RTR (13%) underwent SIM induction therapy. The mean INR peaked in both groups on day 4 but was higher in TMG recipients (TMG 1.35, SIM 1.20). FFP was transfused in 65 TMG (31%) and 3 SIM (10%) recipients (P = .01); PRBCs were transfused in 88 TMG (44%) and 6 SIM (19%) recipients (P = .02). No patients returned to the operating room for bleeding complications within 7 days of RT. Patient age, gender, ethnicity, and diabetes status were not statistically significant factors in the development of coagulopathy. TMG administration is associated with coagulopathy. Using an INR screening protocol and an aggressive transfusion protocol, bleeding complications associated with coagulopathy can be avoided in this higher-risk group. Copyright © 2013 Elsevier Inc. All rights reserved.
Giunti, Massimo; Troia, Roberta; Bergamini, Paolo Famigli; Dondi, Francesco
2015-01-01
To investigate the prognostic value of the acute patient physiologic and laboratory evaluation (APPLE) score and relevant clinicopathological markers in dogs with systemic inflammatory response syndrome (SIRS). Prospective observational cohort study. Veterinary teaching hospital. Thirty-three dogs with SIRS admitted to the intensive care unit (ICU) were compared to 35 healthy control dogs. Dogs with SIRS were divided into septic (n = 20) and nonseptic (n = 13) etiologies and as survivors (alive to discharge, n = 22) and nonsurvivors (n = 11: died, n = 6, or humanely euthanized, n = 5). For all dogs, physiological and laboratory parameters were prospectively collected for the calculation of the APPLE fast score. No difference between septic and nonseptic SIRS dogs was detected for any parameter evaluated. Survivors had significantly higher total protein, albumin concentrations, antithrombin activity (ATA), and base excess (BE), as well as significantly lower lactate, urea, creatinine concentrations, urinary protein to creatinine ratio and APPLE fast score compared to nonsurvivors. Higher values of creatinine, lactate, anion gap, alanine transaminase (ALT), and APPLE fast score were significantly associated with an increased risk of death in SIRS dogs, while higher values of total protein, albumin, ATA, and BE were associated with a significantly reduced risk of mortality. When a multivariate binary logistic regression analysis was performed, the APPLE fast score was the only significant parameter retained. The determination of the APPLE fast score in clinical setting, as well as the measurement of APP, ATA, lactate, BE, anion gap, ALT, urinary proteins, and electrolytes may be beneficial for a better assessment of dogs with SIRS. Identified parameters were significantly related with the presence of SIRS and their evaluation should be considered for the assessment of disease severity, and guidance of the decision-making process in critically ill dogs. © Veterinary Emergency and Critical Care Society 2014.
A slippery molecular assembly allows water as a self-erasable security marker
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K.; Ajayaghosh, Ayyappanpillai
2015-01-01
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication. PMID:25940779
A slippery molecular assembly allows water as a self-erasable security marker.
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K; Ajayaghosh, Ayyappanpillai
2015-05-05
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication.
Comparative analysis of public opinion research in the U.S. and Canada
NASA Astrophysics Data System (ADS)
Setlakwe, Linda; DiNunzio, Lisa A.
2004-06-01
Bank note producers are working to thwart the threat of counterfeit notes created using high resolution, digital image processing software and color output devices such as inkjet printers, color copiers, and scanners. Genuine notes must incorporate better overt and machine-readable security features that will reduce the chance of counterfeit notes being passed. Recently, Canada and the United States introduced newly designed bank notes that are intended to enable the general public to more easily distinguish genuine notes from counterfeits. The Bank of Canada (BoC) and the U.S. Department of Treasury"s Bureau of Engraving and Printing (BEP) have conducted similar market research projects to explore target audiences' perceptions and attitudes towards currency design and security features. This paper will present a comparative analysis of the two research projects, both of which were conducted using similar methodology. The results of these research studies assist in the selection of security features for future generations of bank notes.
Smart cards--the key to trustworthy health information systems.
Neame, R.
1997-01-01
Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719
Computers Launch Faster, Better Job Matching
ERIC Educational Resources Information Center
Stevenson, Gloria
1976-01-01
Employment Security Automation Project (ESAP), a five-year program sponsored by the Employment and Training Administration, features an innovative computer-assisted job matching system and instantaneous computer-assisted service for unemployment insurance claimants. ESAP will also consolidate existing automated employment security systems to…
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Performance Assessment of State Senior High School Teachers Aged 56 Years and Above
ERIC Educational Resources Information Center
Yusrizal; Harun, Cut Zahri; Husen; Iqbal, Muhammad
2018-01-01
This research aimed at determining the level of performance of state senior high school (Sekolah Menengah Atas Negeri abbreviated as SMAN) teachers aged 56 years and older. The research population was all SMAN teachers aged 56 years and older in Banda Aceh Municipality, Districts of Aceh Besar, Pidie and Pidie Jaya. Performance assessment…
JPLEX: Java Simplex Implementation with Branch-and-Bound Search for Automated Test Assembly
ERIC Educational Resources Information Center
Park, Ryoungsun; Kim, Jiseon; Dodd, Barbara G.; Chung, Hyewon
2011-01-01
JPLEX, short for Java simPLEX, is an automated test assembly (ATA) program. It is a mixed integer linear programming (MILP) solver written in Java. It reads in a configuration file, solves the minimization problem, and produces an output file for postprocessing. It implements the simplex algorithm to create a fully relaxed solution and…
Magnetic Resonance Arterial Spin Tagging for Noninvasive Pharmacokinetic Analysis of Breast Cancer
1998-10-01
TIbr () - TIbr (j) and 1 In (Sreg - Sno (i)) - In (Sreg - Snon(J)) (1.9) Ti. Tlb, Wi - Tlbr W) where Sreg = the average steady-state signal intensity at...a pixel under the Regular Condition, Tlbr (i) = the ith effective inversion time (TI) (used for the ith image), Ssel(i) = the steady-state signal
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-01
... Fuel System Airworthiness Limitations, the requirements of Appendix H.1(a) of the Federal Aviation... Additional Service Information The ATA, on behalf of its member AirTran Airways, requested that we approve... comment, AirTran Airways stated that the information notices clarify and provide corrections to Boeing...
2011-09-19
Integration – Non-Thermal Plasma JP8 reformer & SOFC system – Lithium-Iron Phosphate Battery Technology – Lithium Ion Battery & energy storage systems...regeneration and includes a lithium ion battery energy storage – Export power capabilities meeting mission requirements (5-50 kilowatt [kW]) – Air
50 CFR 23.50 - What are the requirements for a sample collection covered by an ATA carnet?
Code of Federal Regulations, 2010 CFR
2010-10-01
... Appendix-I species bred in captivity or artificially propagated for commercial purposes, that will: (1..., BARTER, EXPORTATION, AND IMPORTATION OF WILDLIFE AND PLANTS (CONTINUED) CONVENTION ON INTERNATIONAL TRADE... plants in part 24 of this subchapter and 7 CFR parts 319, 352, and 355. (d) U.S. application form...
50 CFR 23.50 - What are the requirements for a sample collection covered by an ATA carnet?
Code of Federal Regulations, 2013 CFR
2013-10-01
... Appendix-I species bred in captivity or artificially propagated for commercial purposes, that will: (1..., BARTER, EXPORTATION, AND IMPORTATION OF WILDLIFE AND PLANTS (CONTINUED) CONVENTION ON INTERNATIONAL TRADE... plants in part 24 of this subchapter and 7 CFR parts 319, 352, and 355. (d) U.S. application form...
50 CFR 23.50 - What are the requirements for a sample collection covered by an ATA carnet?
Code of Federal Regulations, 2014 CFR
2014-10-01
... Appendix-I species bred in captivity or artificially propagated for commercial purposes, that will: (1..., BARTER, EXPORTATION, AND IMPORTATION OF WILDLIFE AND PLANTS (CONTINUED) CONVENTION ON INTERNATIONAL TRADE... plants in part 24 of this subchapter and 7 CFR parts 319, 352, and 355. (d) U.S. application form...
50 CFR 23.50 - What are the requirements for a sample collection covered by an ATA carnet?
Code of Federal Regulations, 2012 CFR
2012-10-01
... Appendix-I species bred in captivity or artificially propagated for commercial purposes, that will: (1..., BARTER, EXPORTATION, AND IMPORTATION OF WILDLIFE AND PLANTS (CONTINUED) CONVENTION ON INTERNATIONAL TRADE... plants in part 24 of this subchapter and 7 CFR parts 319, 352, and 355. (d) U.S. application form...
50 CFR 23.50 - What are the requirements for a sample collection covered by an ATA carnet?
Code of Federal Regulations, 2011 CFR
2011-10-01
... Appendix-I species bred in captivity or artificially propagated for commercial purposes, that will: (1..., BARTER, EXPORTATION, AND IMPORTATION OF WILDLIFE AND PLANTS (CONTINUED) CONVENTION ON INTERNATIONAL TRADE... plants in part 24 of this subchapter and 7 CFR parts 319, 352, and 355. (d) U.S. application form...
Concept Mapping in Science Class: A Case Study of Fifth Grade Students
ERIC Educational Resources Information Center
Asan, Askin
2007-01-01
The purpose of this research project was to determine the effects of incorporating concept mapping on the achievement of fifth grade students in science class. The study was conducted with twenty-three students at Ata Elementary School, Trabzon, Turkey. The students were tested with teacher-constructed pre- and post tests containing 20…
Aircraft Command in Emergency Situations (ACES). Phase 1. Concept. Development
1991-04-01
tine-consuming, and if the left pack is malfunctioning, can allow large quantities of smoke to enter the passenger cabin, creating high levels of...airport, thus providing the crew additional time to evc’,ataIe th airplanc . ’li maved in landing the aircraft safely results from: a0 I)ctectioi n (f
ERIC Educational Resources Information Center
Andretta, James R.; Worrell, Frank C.; Mello, Zena R.
2014-01-01
Using cluster analysis of Adolescent Time Attitude Scale (ATAS) scores in a sample of 300 adolescents ("M" age = 16 years; "SD" = 1.25; 60% male; 41% European American; 25.3% Asian American; 11% African American; 10.3% Latino), the authors identified five time attitude profiles based on positive and negative attitudes toward…
A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State
NASA Astrophysics Data System (ADS)
Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping
2016-02-01
In this paper, we propose a multi-proxy blind signature scheme based on controlled teleportation. Genuine four-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security analysis shows the scheme satisfies the security features of multi-proxy signature, unforgeability, undeniability, blindness and unconditional security.
2010-01-01
Background Through the nearly three decades that have passed since the Alma Ata conference on Primary Health Care, a wide range of global health initiatives and ideas have been advocated to improve the health of people living in developing countries. The issues raised in the Primary Health Care concept, the Structural Adjustment Programmes and the Health Sector Reforms have all influenced health service delivery. Increasingly however, health systems in developing countries are being described as having collapsed Do the advocated frameworks contribute to this collapse through not adequately including population trust as a determinant of the revival of health services, or are they primarily designed to satisfy the values of other actors within the health care system? This article argues there is an urgent need to challenge common thinking on health care provision under extreme resource scarcity. Methods This article sets out to discuss and analyze the described collapse of health services through a brief case study on provision of Emergency Obstetric Care in Northern Tanzania. Results The article argues that post the Alma Ata conference on Primary Health Care developments in global health initiatives have not been successful in incorporating population trust into the frameworks, instead focusing narrowly on expert-driven solutions through concepts such as prevention and interventions. The need for quantifiable results has pushed international policy makers and donors towards vertical programmes, intervention approaches, preventive services and quantity as the coverage parameter. Health systems have consequently been pushed away from generalized horizontal care, curative services and quality assurance, all important determinants of trust. Conclusions Trust can be restored, and to further this objective a new framework is proposed placing generalized services and individual curative care in the centre of the health sector policy domain. Preventive services are important, but should increasingly be handled by other sectors in a service focused health care system. To facilitate such a shift in focus we should acknowledge that limited resources are available and accept the conflict between population demand and expert opinion, with the aim of providing legitimate, accountable and trustworthy services through fair, deliberative, dynamic and incremental processes. A discussion of the acceptable level of quality, given the available resources, can then be conducted. The article presents for debate that an increased focus on quality and accountability to secure trust is an important precondition for enabling the political commitment to mobilize necessary resources to the health sector. PMID:20500857
Flexible feature interface for multimedia sources
Coffland, Douglas R [Livermore, CA
2009-06-09
A flexible feature interface for multimedia sources system that includes a single interface for the addition of features and functions to multimedia sources and for accessing those features and functions from remote hosts. The interface utilizes the export statement: export "C" D11Export void FunctionName(int argc, char ** argv,char * result, SecureSession *ctrl) or the binary equivalent of the export statement.
NASA Electronic Library System (NELS): The system impact of security
NASA Technical Reports Server (NTRS)
Mcgregor, Terry L.
1993-01-01
This paper discusses security issues as they relate to the NASA Electronic Library System which is currently in use as the repository system for AdaNET System Version 3 (ASV3) being operated by MountainNET, Inc. NELS was originally designed to provide for public, development, and secure collections and objects. The secure feature for collections and objects was deferred in the initial system for implementation at a later date. The NELS system is now 9 months old and many lessons have been learned about the use and maintenance of library systems. MountainNET has 9 months of experience in operating the system and gathering feedback from the ASV3 user community. The user community has expressed an interest in seeing security features implemented in the current system. The time has come to take another look at the whole issue of security for the NELS system. Two requirements involving security have been put forth by MountainNET for the ASV3 system. The first is to incorporate at the collection level a security scheme to allow restricted access to collections. This should be invisible to end users and be controlled by librarians. The second is to allow inclusion of applications which can be executed only by a controlled group of users; for example, an application which can be executed by librarians only. The requirements provide a broad framework in which to work. These requirements raise more questions than answers. To explore the impact of these requirements a top down approach will be used.
Comparing Commercial WWW Browsers.
ERIC Educational Resources Information Center
Notess, Greg R.
1995-01-01
Four commercial World Wide Web browsers are evaluated for features such as handling of WWW protocols and different URLs: FTP, Telnet, Gopher and WAIS, and e-mail and news; bookmark capabilities; navigation features; file management; and security support. (JKP)
Petri net modeling of encrypted information flow in federated cloud
NASA Astrophysics Data System (ADS)
Khushk, Abdul Rauf; Li, Xiaozhong
2017-08-01
Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.
A Unified Approach to Intra-Domain Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shue, Craig A; Kalafut, Andrew J.; Gupta, Prof. Minaxi
2009-01-01
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a secure version of the DHCP protocol, which has the additional feature of providing each host with a certificate. We then leverage these certificates to secure ARP, prevent spoofing within the domain, and secure SSH and VPN connections between the domain and hosts which have previously interacted with it locally. In doing so, we also develop an incrementally deployable public key infrastructuremore » which can later be leveraged to support inter-domain authentication.« less
2011-06-01
Selected Security Features in BlackBerry and SME PED Devices...Figure 1, the blue bars represent the net present value (NPV) of costs for current DoD wireless services on the unclassified (e.g., BlackBerry ) and...PDA], Blackberry , iPhone, etc.) for both Battle Command applications and communications and secure data only that needs to be classified as part of
Comment on "Secure quantum private information retrieval using phase-encoded queries"
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun
2016-12-01
In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.
NASA Astrophysics Data System (ADS)
Kuo, Cynthia; Walker, Jesse; Perrig, Adrian
Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.
Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar
2018-05-23
Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
OLMS: Online Learning Management System for E-Learning
ERIC Educational Resources Information Center
Ippakayala, Vinay Kumar; El-Ocla, Hosam
2017-01-01
In this paper we introduce a learning management system that provides a management system for centralized control of course content. A secure system to record lectures is implemented as a key feature of this application. This feature would be accessed through web camera and mobile recording. These features are mainly designed for e-learning…
INSTALLATION AT FRANKFURT OF A RECEIVING STATION FOR THE TRANSIT PROGRAM, PHASE I
ata. The 2 receivers cover the range between 53 and 262 mc that includes satelite frequencies of 54, 108, 162 and 216 mc, except 324 mc. It wil be...E 390 envisaged for the reception of standard frequencies and time signals, satelites can be observed at a frequency of 20 mc (using a sepaate local
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-12
... of the United States Code specifies the FAA's authority to issue rules on aviation safety. Subtitle I... proposed actions to address it. Subject (d) Air Transport Association (ATA) of America Code 25: Equipment...,400--04013 Tor Tre Ponti, Italy; telephone 0039-0773- 689330 or 0039-0773-689291; fax 0039-0773-631546...
ERIC Educational Resources Information Center
World Health Organization, Geneva (Switzerland).
A summary of proceedings is presented from an international conference which focused on the needs and problems of primary health care. The report describes background of the conference, attendance, a summary of discussions, and recommendations. Sponsored by the World Health Organization and UNICEF, the conference was attended by delegations from…
ERIC Educational Resources Information Center
Kirkwood, Donna; Shulsky, Debra; Willis, Jana
2014-01-01
The advent of technology and access to the internet through the World Wide Web have stretched the traditional ways of teaching social studies beyond classroom boundaries. This article explores how teachers can create authentic and contextualized cultural studies experiences for young children by integrating social studies and technology. To…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-16
... (ATA), on behalf of its member Delta Air Lines Inc. (Delta), asked that the 60-month compliance time in the supplemental NPRM be extended to better align with industry standard tank entry intervals. Delta stated that the required modifications will require entry into the main and center fuel tanks, and Delta...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-18
... Association (ATA) on behalf of its member Delta Air Lines Inc. (Delta) asks that we consider reviewing the compliance time to better align with industry standard tank entry intervals. Delta notes that the... intervals; and the center tank is opened at 4-year intervals. Delta states that the 60-month compliance time...
JPRS Report, Science & Technology, USSR: Computers, Control Systems and Machines
1989-03-14
optimizatsii slozhnykh sistem (Coding Theory and Complex System Optimization ). Alma-Ata, Nauka Press, 1977, pp. 8-16. 11. Author’s certificate number...Interpreter Specifics [0. I. Amvrosova] ............................................. 141 Creation of Modern Computer Systems for Complex Ecological...processor can be designed to decrease degradation upon failure and assure more reliable processor operation, without requiring more complex software or
The Effect of Corpus-Based Activities on Verb-Noun Collocations in EFL Classes
ERIC Educational Resources Information Center
Ucar, Serpil; Yükselir, Ceyhun
2015-01-01
This current study sought to reveal the impacts of corpus-based activities on verb-noun collocation learning in EFL classes. This study was carried out on two groups--experimental and control groups- each of which consists of 15 students. The students were preparatory class students at School of Foreign Languages, Osmaniye Korkut Ata University.…
Automated Test Assembly Using lp_Solve Version 5.5 in R
ERIC Educational Resources Information Center
Diao, Qi; van der Linden, Wim J.
2011-01-01
This article reviews the use of the software program lp_solve version 5.5 for solving mixed-integer automated test assembly (ATA) problems. The program is freely available under Lesser General Public License 2 (LGPL2). It can be called from the statistical language R using the lpSolveAPI interface. Three empirical problems are presented to…
Summary Report on NRL Participation in the Microwave Landing System Program.
1980-08-19
shifters were measured and statistically analyzed. Several research contracts for promising phased array techniques were awarded to industrial contractors...program was written for compiling statistical data on the measurements, which reads out inser- sertion phase characteristics and standard deviation...GLOSSARY OF TERMS ALPA Airline Pilots’ Association ATA Air Transport Association AWA Australiasian Wireless Amalgamated AWOP All-weather Operations
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-22
... ATA, on behalf of its member airline AAL, expressed concern with the measurement requirements of the... with using common maintenance measurement tools to better allow the operator to comply with these... measurement is four decimal places of accuracy (0.XXXX). AAL stated that this dimension is in Boeing Assembly...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harp, G. R.; Richards, Jon; Tarter, Jill C.
We report radio SETI observations on a large number of known exoplanets and other nearby star systems using the Allen Telescope Array (ATA). Observations were made over about 19000 hr from 2009 May to 2015 December. This search focused on narrowband radio signals from a set totaling 9293 stars, including 2015 exoplanet stars and Kepler objects of interest and an additional 65 whose planets may be close to their habitable zones. The ATA observations were made using multiple synthesized beams and an anticoincidence filter to help identify terrestrial radio interference. Stars were observed over frequencies from 1 to 9 GHzmore » in multiple bands that avoid strong terrestrial communication frequencies. Data were processed in near-real time for narrowband (0.7–100 Hz) continuous and pulsed signals with transmitter/receiver relative accelerations from −0.3 to 0.3 m s{sup −2}. A total of 1.9 × 10{sup 8} unique signals requiring immediate follow-up were detected in observations covering more than 8 × 10{sup 6} star-MHz. We detected no persistent signals from extraterrestrial technology exceeding our frequency-dependent sensitivity threshold of 180–310 × 10{sup −26} W m{sup −2}.« less
Zhong, Yi-ping; Ying, Ying; Wu, Hai-tao; Zhou, Can-quan; Xu, Yan-wen; Wang, Qiong; Li, Jie; Shen, Xiao-ting; Li, Jin
2012-01-01
To investigate the impact of antithyroid antibody on pregnancy outcome following the in vitro fertilization and embryo transfer (IVF-ET). A total of 90 patients (156 cycles) positive for antithyroid antibody (ATA+ group) and 676 infertile women (1062 cycles) negative for antithyroid antibody (ATA- group) undergoing IVF/ICSI from August 2009 to August 2010 were retrospectively analyzed. There was no significant difference in the days of ovarian stimulation, total gonadotropin dose, serum E2 level of HCG day and number of oocytes retrieved between the two groups. The fertilization rate, implantation rate and pregnancy rate following IVF-ET were significantly lower in women with antithyroid antibody than in control group (64.3% vs 74.6%, 17.8% vs 27.1% and 33.3% vs 46.7%, respectively), but the abortion rate was significantly higher in patients with antithyroid antibody (26.9% vs 11.8%). Patients with antithyroid antibody showed significantly lower fertilization rate, implantation rate and pregnancy rate and higher risk for abortion following IVF-ET when compared with those without antithyroid antibody. Thus, the presence of antithyroid antibody is detrimental for the pregnancy outcome following IVF-ET.
Zhong, Yi-ping; Ying, Ying; Wu, Hai-tao; Zhou, Can-quan; Xu, Yan-wen; Wang, Qiong; Li, Jie; Shen, Xiao-ting; Li, Jin
2012-01-01
Objective: To investigate the impact of antithyroid antibody on pregnancy outcome following the in vitro fertilization and embryo transfer (IVF-ET). Methods: A total of 90 patients (156 cycles) positive for antithyroid antibody (ATA+ group) and 676 infertile women (1062 cycles) negative for antithyroid antibody (ATA- group) undergoing IVF/ICSI from August 2009 to August 2010 were retrospectively analyzed. Results: There was no significant difference in the days of ovarian stimulation, total gonadotropin dose, serum E2 level of HCG day and number of oocytes retrieved between the two groups. The fertilization rate, implantation rate and pregnancy rate following IVF-ET were significantly lower in women with antithyroid antibody than in control group (64.3% vs 74.6%, 17.8% vs 27.1% and 33.3% vs 46.7%, respectively), but the abortion rate was significantly higher in patients with antithyroid antibody (26.9% vs 11.8%). Conclusion: Patients with antithyroid antibody showed significantly lower fertilization rate, implantation rate and pregnancy rate and higher risk for abortion following IVF-ET when compared with those without antithyroid antibody. Thus, the presence of antithyroid antibody is detrimental for the pregnancy outcome following IVF-ET. PMID:22253557
Private payer telehealth reimbursement in the United States.
Antoniotti, Nina M; Drude, Kenneth P; Rowe, Nancy
2014-06-01
Significant information is available about government-reimbursed telehealth services such as Medicare and Medicaid across the United States. Although currently 20 states mandate reimbursement for telehealth services and some private insurers have voluntarily covered those services in other states, relatively little is known about telehealth provider experiences with reimbursement from private insurance payers. To investigate this, the American Telemedicine Association's (ATA's) Telemental Health Special Interest Group (SIG), the Policy Group, and the Business and Finance SIG, with the help of ATA staff, conducted a national private payer reimbursement online survey in 2012 using Survey Monkey™ (Palo Alto, CA) ( www.surveymonkey.com/ ). Survey responses were received from respondents in 46 of the 50 states. The survey found that telehealth services are being reimbursed by private payers but that progress in reimbursement has been relatively slow compared with earlier surveys. Key findings from this study were that government payers as well as several major private payers are highly influential in payment policies for telehealth private payers, that private payers have administrative rules regarding telehealth reimbursement that are barriers to services and reimbursement, and that some providers would benefit from being better informed about billing and coding for telehealth services and how to advocate for telehealth services reimbursement.
Reconstructing the critically damaged health service system of the country.
Banerji, Debabar
2012-01-01
India's ruling class, in association with international agencies, bureaucrats, and business interests, has formed a powerful syndicate that has been imposing its will on the country to the detriment of public health. After gaining independence, India developed a body of knowledge suited to its social, cultural, economic, and epidemiological conditions. This led to an alternative approach to public health education, practice, and research that foreshadowed the Alma Ata Declaration on Primary Health Care of 1978. In the early 1980s, global power shifts undermined national and international commitment to the Declaration. Wealthy countries' response to the declaration of self-reliance by economically disadvantaged countries was swift: an effort to suppress the Declaration's ideals in favor of an unscientific, market-driven agenda. As a result, public health practice in India virtually disappeared. Responding to growing restiveness among a population in need, political leaders have launched the foredoomed National Rural Health Mission and pursued an American brand of public health through the Public Health Foundation of India. Reconstructing the damaged public health system will require pressure on the syndicate to ensure India's public health heritage will be used to effectively transfer "People's health in people's hands" according to the guidelines set down at Alma Ata.
Oxidation state and interfacial effects on oxygen vacancies in tantalum pentoxide
Bondi, Robert J.; Marinella, Matthew J.
2015-02-28
First-principles density-functional theory (DFT) calculations are used to study the atomistic structure, structural energetics, and electron density near the O monovacancy (V O n; n=0,1+,2+) in both bulk, amorphous tantalum pentoxide (a-Ta 2O 5) and also at vacuum and metallic Ta interfaces. We calculate multivariate vacancy formation energies to evaluate stability as a function of oxidation state, distance from interface plane, and Fermi energy. V O n of all oxidation states preferentially segregate at both Ta and vacuum interfaces, where the metallic interface exhibits global formation energy minima. In a-Ta 2O 5, V O 0 are characterized by structural contractionmore » and electron density localization, while V O 2+ promote structural expansion and are depleted of electron density. In contrast, interfacial V O 0 and V O 2+ show nearly indistinguishable ionic and electronic signatures indicative of a reduced V O center. Interfacial V O 2+ extract electron density from metallic Ta indicating V O 2+ is spontaneously reduced at the expense of the metal. This oxidation/reduction behavior suggests careful selection and processing of both oxide layer and metal electrodes for engineering memristor device operation.« less
Aoyagi, Satoka; Abe, Kiyoshi; Yamagishi, Takayuki; Iwai, Hideo; Yamaguchi, Satoru; Sunohara, Takashi
2017-11-01
Blood adsorption onto the inside surface of hollow fiber dialysis membranes was investigated by means of time-of-flight secondary ion mass spectrometry (TOF-SIMS) and near-field infrared microscopy (NFIR) in order to evaluate the biocompatibility and permeability of dialysis membranes. TOF-SIMS is useful for the imaging of particular molecules with a high spatial resolution of approximately 100 nm. In contrast, infrared spectra provide quantitative information and NFIR enables analysis with a high spatial resolution of less than 1 μm, which is close to the resolution of TOF-SIMS. A comparison was made of one of the most widely used dialysis membranes made of polysulfone (PSf), that has an asymmetric and inhomogeneous pore structure, and a newly developed asymmetric cellulose triacetate (ATA) membrane that also has an asymmetric pore structure, even though the conventional cellulose triacetate membrane has a symmetric and homogeneous pore structure. As a result, it was demonstrated that blood adsorption on the inside surface of the ATA membrane is more reduced than that on the PSf membrane. Graphical abstract Analysis of blood adsorption on inside surface of hollow fiber membrane.
Differences in community composition of bacteria in four glaciers in western China
NASA Astrophysics Data System (ADS)
An, L. Z.; Chen, Y.; Xiang, S.-R.; Shang, T.-C.; Tian, L.-D.
2010-06-01
Microbial community patterns vary in glaciers worldwide, presenting unique responses to global climatic and environmental changes. Four bacterial clone libraries were established by 16S rRNA gene amplification from four ice layers along the 42-m-long ice core MuztB drilled from the Muztag Ata Glacier. A total of 151 bacterial sequences obtained from the ice core MuztB were phylogenetically compared with the 71 previously reported sequences from three ice cores extracted from ice caps Malan, Dunde, and Puruogangri. Six phylogenetic clusters Flavisolibacter, Flexibacter (Bacteroidetes), Acinetobacter, Enterobacter (Gammaproteobacteria), Planococcus/Anoxybacillus (Firmicutes), and Propionibacter/Luteococcus (Actinobacteria) frequently occurred along the Muztag Ata Glacier profile, and their proportion varied by seasons. Sequence analysis showed that most of the sequences from the ice core clustered with those from cold environments, and the sequence clusters from the same glacier more closely grouped together than those from the geographically isolated glaciers. Moreover, bacterial communities from the same location or similarly aged ice formed a cluster, and were clearly separate from those from other geographically isolated glaciers. In summary, the findings provide preliminary evidence of zonal distribution of microbial community, and suggest biogeography of microorganisms in glacier ice.
Differences in community composition of bacteria in four deep ice sheets in western China
NASA Astrophysics Data System (ADS)
An, L.; Chen, Y.; Xiang, S.-R.; Shang, T.-C.; Tian, L.-De
2010-02-01
Microbial community patterns vary in glaciers world wide, presenting unique responses to global climatic and environmental changes. Four bacterial clone libraries were established by 16S rRNA gene amplification from four ice layers along the 42-m-long ice core MuztB drilled from the Muztag Ata Glacier. A total of 152 bacterial sequences obtained from the ice core MuztB were phylogenetically compared with the 71 previously reported sequences from three ice cores extracted from ice caps Malan, Dunde, and Puruoganri. The six functional clusters Flavisolibacter, Flexibacter (Bacteroidetes), Acinetobacter, Enterobacter (Gammaproteobacteria), Planococcus/Anoxybacillus (Firmicutes), and Propionibacter/Luteococcus (Actinobacteria) frequently occurred along the Muztag Ata Glacier profile. Sequence analysis showed that most of the sequences from the ice core clustered with those from cold environments, and the sequences from the same glacier formed a distinct cluster. Moreover, bacterial communities from the same location or similarly aged ice formed a cluster, and were clearly separate from those from other geographically isolated glaciers. In a summary, the findings provide preliminary evidence of zone distribution of microbial community, support our hypothesis of the spatial and temporal biogeography of microorganisms in glacial ice.
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.
Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong
2009-01-01
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.
NASA Astrophysics Data System (ADS)
Mizuta, Kohei; Ohtaki, Michitaka
2016-03-01
We report the electrical and thermal properties of β-pyrochlore (defect pyrochlore) oxides AFe0.33W1.67O6 ( A = K, Rb, Cs) with a crystal structure having a small cation surrounded by oversized cage-like framework. The thermal conductivity, κ, of CsFe0.33W1.67O6 and RbFe0.33W1.67O6 showed extremely low values as oxides (below 1.0 W/mK) similar to those of ATaWO6 ( A = K, Rb, Cs) which we have already reported. These low κ values are ascribed to a "rattling" motion of the A cations, evidenced by their crystal structure refinement and the Raman spectra. Their electrical conductivity, σ, was in the order of 10-3 S/cm, and the Seebeck coefficient, S, was -500 to -600 μV/K. The electrical conductivity of AFe0.33W1.67O6 ( A = Rb, Cs) was much higher than those of ATaWO6 ( A = Rb, Cs), suggesting that an appropriate selection of the framework composition enables us to have better thermoelectric performance.
Role of shell diffusion area in incubating eggs at simulated high altitude.
Weiss, H S
1978-10-01
Embryonic development is inhibited when eggs are incubated at 9,100 m (0.3 atm) despite a normoxic environment. The problem apparently relates to respiratory gas exchange occurring by diffusion through gas-filled pores in the shell. Gaseous flux is therefore inversely proportional to ambient pressure and is affected by the physical characteristics of the ambient gas (Chapman-Enskog equation). Excess loss of H2O and CO2 occurs in eggs incubating at altitude and could be detrimental. Such increased loss should be correctable by decreasing diffusion area. This was tested by progressively increasing coverage of the shell with paraffin and incubating at simulated 0.3 ATA (225 Torr) in 100% O2. Uncoated eggs failed to hatch, but numbers of chicks increased with increased coverage. Maximum hatch was an extrapolated 90% of controls at 69% shell coverage. With further coverage, hatch size decreased. Egg weight loss, and estimate of H2O diffusion, was around three times controls in uncoated eggs but decreased linearly with paraffin coverage, reaching near normal at maximum hatch. Reduction of diffusion area to 0.3 normal at maximum hatch generally balanced the increased flux predicted for 0.3 ATA.
Hereditary medullary thyroid carcinoma: the management dilemma.
Zhou, Ping; Liu, Jian; Cheng, Shao-Wen; Wang, Bing; Yang, Rong; Peng, Ling
2012-06-01
Hereditary medullary thyroid carcinoma (hereditary MTC) is a rare malignancy, accounting for 25-30% of all MTC. It occurs as part of multiple endocrine neoplasia type 2 (MEN 2). Autosomal dominant gain-of-function mutations in the RET proto-oncogene is the cause of the disease, in which the common mutations are codons 609, 611, 618, 620, 630, 634 and 918. In recent years, the spectrum of RET gene mutations has changed. The classical mutations reduced, whereas the less aggressive mutations increased. Hereditary MTC is a time-dependent disease. Stages of the disorder at diagnosis can significantly influence survival rates. Based on the genotype-phenotype, RET mutations have been classified into four risk levels by American Thyroid Association (ATA) at 2009. The classification system guides the hereditary MTC management, including risk assessment, biochemical screenings and surgical intervention. Though the application of genetic testing and codon-specific phenotypes in hereditary MTC diagnosis is effective with high accuracy, there are some difficulties in implementing RET gene testing as a routine for MTC diagnosis. And most of carriers with RET mutations did not undergo thyroidectomy at the age recommended by the ATA guidelines. The aim of the study is to review the hereditary MTC and discuss the management dilemma.
Smale, Andrew; Tsouras, Theo
2017-01-01
We present a standardized test methodology and results for our evaluation of the Carefusion Alaris PC infusion pump, comprising the model 8015 PC Unit and the model 8100 Large Volume Pump (LVP) module. The evaluation consisted of basic suitability testing, internal component inspection, surface temperature measurement of selected internal components, and critical performance testing (infusion rate accuracy and occlusion alarm pressure) during conditions of typical hyperbaric oxygen (HBO₂) treatment in our facility's class A multiplace chamber. We have found that the pumps pose no enhanced risk as an ignition source, and that the pumps operate within manufacturer's specifications for flow rate and occlusion alarms at all stages of HBO₂ treatments, up to 4.0 ATA and pressurization and depressurization rates up to 180 kPa/minute. The pumps do not require purging with air or nitrogen and can be used unmodified, subject to the following conditions: pumps are undamaged, clean, fully charged, and absent from alcohol cleaning residue; pumps are powered from the internal NiMH battery only; maximum pressure exposure 4.0 ATA; maximum pressurization and depressurization rate of 180 kPa/minute; LVP modules locked in place with retaining screws. Copyright© Undersea and Hyperbaric Medical Society.
Okosieme, Onyebuchi; Gilbert, Jackie; Abraham, Prakash; Boelaert, Kristien; Dayan, Colin; Gurnell, Mark; Leese, Graham; McCabe, Christopher; Perros, Petros; Smith, Vicki; Williams, Graham; Vanderpump, Mark
2016-06-01
The management of primary hypothyroidism with levothyroxine (L-T4) is simple, effective and safe, and most patients report improved well-being on initiation of treatment. However, a proportion of individuals continue to suffer with symptoms despite achieving adequate biochemical correction. The management of such individuals has been the subject of controversy and of considerable public interest. The American Thyroid Association (ATA) and the European Thyroid Association (ETA) have recently published guidelines on the diagnosis and management of hypothyroidism. These guidelines have been based on extensive reviews of the medical literature and include sections on the role of combination therapy with L-T4 and liothyronine (L-T3) in individuals who are persistently dissatisfied with L-T4 therapy. This position statement by the British Thyroid Association (BTA) summarises the key points in these guidelines and makes recommendations on the management of primary hypothyroidism based on the current literature, review of the published positions of the ETA and ATA, and in line with best principles of good medical practice. The statement is endorsed by the Association of Clinical Biochemistry, (ACB), British Thyroid Foundation, (BTF), Royal College of Physicians (RCP) and Society for Endocrinology (SFE). © 2015 John Wiley & Sons Ltd.
Kong, Su-Kang; Soo Kim, Byung; Gi Uhm, Tae; Soo Chang, Hun; Sook Park, Jong; Woo Park, Sung; Park, Choon-Sik; Chung, Il Yup
2016-01-01
Aspirin hypersensitivity is a hallmark of aspirin-exacerbated respiratory disease (AERD), a clinical syndrome characterized by the severe inflammation of the respiratory tract after ingestion of cyclooxygenase-1 inhibitors. We investigated the capacity of aspirin to induce interleukin-4 (IL-4) production in inflammatory cells relevant to AERD pathogenesis and examined the associated biochemical and molecular pathways. We also compared IL-4 production in peripheral blood mononuclear cells (PBMCs) from patients with AERD vs aspirin-tolerant asthma (ATA) upon exposure to aspirin. Aspirin induced IL-4 expression and activated the IL-4 promoter in a report assay. The capacity of aspirin to induce IL-4 expression correlated with its activity to activate mitogen-activated protein kinases, to form DNA–protein complexes on P elements in the IL-4 promoter and to synthesize nuclear factor of activated T cells, critical transcription factors for IL-4 transcription. Of clinical importance, aspirin upregulated IL-4 production twice as much in PBMCs from patients with AERD compared with PBMCs from patients with ATA. Our results suggest that IL-4 is an inflammatory component mediating intolerance reactions to aspirin, and thus is crucial for AERD pathogenesis. PMID:27534531
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
NASA Astrophysics Data System (ADS)
Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan
2017-08-01
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
Advanced verification methods for OVI security ink
NASA Astrophysics Data System (ADS)
Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom
2006-02-01
OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.
Protecting proprietary rights - A potential Shuttle user's view
NASA Technical Reports Server (NTRS)
Day, J. B.
1977-01-01
Maintaining a high degree of industrial security in the multiple-payload Shuttle environment poses a number of problems for NASA. As a part of Battelle-Columbus' support of NASA's User Development Program, this paper presents a potential user's perspective on this situation. The need for security, the nature of the problem, and precedents for NASA security measures are discussed. Eleven policy guidelines representing desirable features from a potential user's viewpoint are presented for NASA consideration.
Defense Logistics Agency Computer-Aided Acquisition and Logistics Support Security Measures
1989-09-29
sopisit ftre a nduate eiromensweaonsyte dt i vaiou mdi, nfrrngcls- having security features commensurate with today’s weapon system data in various media ...sections, ministrator that has completed an accredited three areas of improvement in security emphasis are APscrt orebfr htst a ecn deemed appropriate...May 1989, been in a hardcopy media and in accordance with Washington, D.C. specific contract clauses and FAR/DFAR. Through CALS, the Government shall
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Information Security and Privacy in Network Environments.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Annual Report and Crime Summary, 1992.
ERIC Educational Resources Information Center
Johnson County Community Coll., Overland Park, KS. Dept. of Safety and Security.
In accordance with the Student Right-to-Know and Campus Security Act of 1990, the Safety and Security Department of Johnson County Community College (JCCC), in Kansas, prepared this report providing information on crime statistics and departmental policies. Introductory sections of the annual report feature an overview of the department's mission,…
Identity Theft - The National Guard
Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front name. Social Security Numbers - If after doing everything in your power to clear up the effects of identity theft you discover someone is still fraudulently using your Social Security Number, you can
Enhanced optical security by using information carrier digital screening
NASA Astrophysics Data System (ADS)
Koltai, Ferenc; Adam, Bence
2004-06-01
Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.
NATIONAL PREPAREDNESS: Technologies to Secure Federal Buildings
2002-04-25
Medium, some resistance based on sensitivity of eye Facial recognition Facial features are captured and compared Dependent on lighting, positioning...two primary types of facial recognition technology used to create templates: 1. Local feature analysis—Dozens of images from regions of the face are...an adjacent feature. Attachment I—Access Control Technologies: Biometrics Facial Recognition How the technology works
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Security and Efficiency Concerns With Distributed Collaborative Networking Environments
2003-09-01
have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while
The Concept of Comprehensive Security: A Distinctive Feature of a Shared Security Culture in Europe
2007-12-01
Sicherheitsbegriff, ed. Bundesakademie für Sicherheitspolitik (Hamburg: Mittler, 2001), 18. 92. Emil Kirchner and James Sperling , “The New Security Threats in...im 21. Jahrhundert - Keine allein militärische Aufgabe. Rede von Heidi Wegener, MdB, am 23.03.2006 im Marshall Center. www.marshallcenter.org/site...Wenger (Zürich: Forschungsstelle für Sicherheitspolitik, 2005), 11 217. Kurt R. Spillmann, " Von der bewaffneten Neutralität zur kooperativen
Evaluation of Different Features for Face Recognition in Video
2014-09-01
and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014...deployment of innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border
Yu, Rui-Feng; Yang, Lin-Dong; Wu, Xin
2017-05-01
This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.
Advancing Aeronautics: A Decision Framework for Selecting Research Agendas
2011-01-01
Engineering Board ASME American Society of Mechanical Engineers ATA Air Transport Association ATM air traffic management ATP Aeronautics Test Program...not provide a competitive advantage for a sufficient period to justify the R&D outlay. Such projects can include technolo- gies that address...fuel efficiency improvements multiplied by the cost of fuel would provide an estimate of their value to society. Likewise, technolo- gies for
Quality of School Work Life of Public School Teachers: Cases from Turkey and Pakistan
ERIC Educational Resources Information Center
Akram, Muhammad; Ilgan, Abdurrahman; Ozu, Oyku; Shah, Ashfaque Ahmad
2017-01-01
The Quality of Work life (QWL) is the employees' feeling or perception of being comfortable with their work. The objective of the present study was to compare Quality of School Work Life (QSWL) of public school teachers from Turkey and Pakistan. A QSWL scale developed by Ilgan, Ata, Zepeda and Ozu-Cengiz (2014) having 30 items was used as the…
Pathophysiology of spontaneous venous gas embolism
NASA Technical Reports Server (NTRS)
Lambertsen, C. J.; Albertine, K. H.; Pisarello, J. B.; Flores, N. D.
1991-01-01
The use of controllable degrees and durations of continuous isobaric counterdiffusion venous gas embolism to investigate effects of venous gas embolism upon blood, cardiovascular, and respiratory gas exchange function, as well as pathological effects upon the lung and its microcirculation is discussed. Use of N2O/He counterdiffusion permitted performance of the pathophysiologic and pulmonary microstructural effects at one ATA without hyperbaric or hypobaric exposures.
ERIC Educational Resources Information Center
Rodríguez, Sonia Alejandra
2018-01-01
There is a long history of discrimination and marginalization of Chicanas/Latinas in the classroom due to xenophobia, language barriers, citizenship status, oversexualization, and much more. Through an analysis of Gloria Velasquez's ("Juanita Fights the School Board," Piñata Books, Houston, 1995) I seek to demonstrate the ways in which…
Improved Operational Readiness through Environmental Stress Screening
1987-11-01
Rhoades of Gru-,.:an’s Field Marketing Department, and the cooperation of the ni- merous Air Force logistics centers and operational facilities visited...EQUIPMENT AGE * ENVIRONMENTAL MAINTENANCE EFFECT PROFILES DtATA * TAILORING DEFINTION MET HOD1OLOGY I 1GUIDELINE oi FIELD ESS IMPLEMENTATION GUIDELINW...any mixing or mismatching appeared, the data was eliminated completely. Figure 5 provides the annual historical trends of each case history equipment
2014-12-01
senior leadership ATA Anti -Terrorism Assistance BG Brigadier General CIA Central Intelligence Agency CID criminal investigative division...authorizes the use of wiretapping evidence only in crimes involving narco-trafficking or money laundering . While the AG’s office originally signed 134...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE MAJOR CRIMES
ERIC Educational Resources Information Center
Jepson, Bryan; Granpeesheh, Doreen; Tarbox, Jonathan; Olive, Melissa L.; Stott, Carol; Braud, Scott; Yoo, J. Helen; Wakefield, Andrew; Allen, Michael S.
2011-01-01
Hyperbaric oxygen therapy (HBOT) has been used to treat individuals with autism. However, few studies of its effectiveness have been completed. The current study examined the effects of 40 HBOT sessions at 24% oxygen at 1.3 ATA on 11 topographies of directly observed behavior. Five replications of multiple baselines were completed across a total…
Brain Potentials and Personality: A New Look at Stress Susceptibility.
1987-09-01
disinhibition (Dis) measures a hedonistic , extraverted lifestyle including drinking, parties, sex, and gambling; boredom susceptibility (BS) indicates an...adventure seeking; ES = Experience seeking; Dis = Disinhibition; BS = Boredom susceptibility. 1 14 I N i*5’ Table 4 Correlation of Auditory Evoked...20. aTAS = Thrill and adventure seeking; ES = Experience seeking; Dis = Disinhibition; BS = Boredom susceptibility. < .05. 15 I The present study
Translations on USSR Military Affairs No. 1369
1978-08-09
in brackets [] are’ supplied by JPRS. Processing indicators such as [ Text ] or [Excerpt] in the first line of each item, or following the last line...Moscow,KRASNAYA ZVEZDA in Russian 1 Mar 78 p 4 [Article: "Military Political Schools"] [ Text ] Rizhskoye vyssheye voyenno-politicheskoye...34] [ Text ] Alma-Atinskoye vyssheye obshchevoyskovoye komandnoye uchilishche imeni Marshala Sovetskogo Soyuza I. S. Koneva (480094, g. Alma-Ata, 94
AN ITALIAN SURVEY OF COMPLIANCE WITH MAJOR GUIDELINES FOR L-THYROXINE OF PRIMARY HYPOTHYROIDISM.
Vezzani, Silvia; Giannetta, Elisa; Altieri, Barbara; Barbonetti, Arcangelo; Bellastella, Giuseppe; Certo, Rosaria; Cignarelli, Angelo; Cinti, Francesca; D'Andrea, Settimio; Di Dalmazi, Giulia; Frara, Stefano; Garelli, Silvia; Giuffrida, Giuseppe; Maiorino, Maria Ida; Mele, Chiara; Mezza, Teresa; Pani, Maria Grazia; Samà, Maria Teresa; Satta, Chiara; Santi, Daniele
2018-05-01
The adherence by endocrinologists to guideline regarding levothyroxine (LT4) therapy and the compliance of patients may impact the management of hypothyroidism. The aim of this study was to compare the adherence of Italian endocrinologists to the ATA/AACE and ETA guidelines on the management of newly diagnosed primary hypothyroidism and to validate the Italian version of the Morisky-Green Medical Adherence Scale-8 (MMAS-8) questionnaire as applied to the evaluation of the adherence of patients with hypothyroidism to LT4 treatment. This was an observational, longitudinal, multicenter, cohort study, involving 12 Italian Units of Endocrinology. The study enrolled 1,039 consecutive outpatients (mean age 48 years; 855 women, 184 men). The concordance of Italian endocrinologists with American Association of Clinical Endocrinologists/American Thyroid Association (AACE/ATA) and European Thyroid Association (ETA) recommendations was comparable (77.1% and 71.7%) and increased (86.7 and 88.6%) after the recommendations on LT4 dose were excluded, considering only the remaining recommendations on diagnosis, therapy, and follow-up. The MMAS-8 was filled out by 293 patients. The mean score was 6.71 with 23.9% low (score <6), 38.6% medium (6 to <8), 37.5% highly (= 8) adherers; the internal validation coefficient was 0.613. Highly adherent patients were not more likely to have good control of hypothyroidism compared with either medium (69% versus 72%, P = .878) or low (69% versus 43%, P = .861) adherers. Clinical management of hypothyroidism in Italy demonstrated an observance of international guidelines by Italian endocrinologists. Validation of the Italian version of the MMAS-8 questionnaire provides clinicians with a reliable and simple tool for assessing the adherence of patients to LT4 treatment. AACE = American Association of Clinical Endocrinologists; ATA = American Thyroid Association; EDIPO = Endotrial SIE: DIagnosis and clinical management of Primitive hypothyrOidism in Italy; eCRF = electronic case report form; ETA = European Thyroid Association; fT3 = free triiodothyronine; fT4 = free thyroxine; LT4 = levothyroxine; MMAS-8 = Morisky-Green Medical Adherence Scale-8; PH = primary hypothyroidism; T3 = triiodothyronine; T4 = thyroxine; TSH = thyroid-stimulating hormone; US = ultrasonography.
[Primary health care and the millennium development goals].
Faye, A; Bob, M; Fall, A; Fall, C
2012-01-01
Member countries of the World Health Organization (WHO) met in Alma Ata (8-12 September 1978) to define and advocate the implementation of primary health care (PHC) worldwide, above all, in developing countries, which had a real need to review their strategies for meeting the health needs of their populations. They did not suspect that 20 years later the vision they displayed would remain undeniably relevant. Here we examine the similarities and points of convergence of their declaration about PHC with the Millennium Development Goals that seek today to reduce poverty across the world. An exhaustive and analytic literature review was conducted to collect those similarities. Further analysis of the definitions, objectives, principles and recommendations of the Alma Ata Declaration and the Millennium Declaration reveals multiple dependencies and fundamental points of similarity between these two representations. Almost all states have pledged to achieve the eight MDG by 2015: to eradicate extreme poverty and hunger, achieve universal primary education, promote gender equality and empower women, reduce child mortality, improve maternal health, combat HIV/AIDS, malaria and other diseases, ensure environmental sustainability, and develop a global partnership for development. The Alma Ata conference defined primary health care as essential health care, based on practical methods and techniques that are both scientifically sound and socially acceptable, universally accessible to all individuals and all families of the community, through their full participation and at a cost that the community and countries can afford at all stages of their development in the spirit of self-reliance and self-determination. It is an integral part of economic and social development. The following principles are involved in the achievement of both primary health care and the MDG: social equity, community participation, and intersectorality. Public health is an essential condition of poverty eradication and MDG achievement. Public health issues are central to the problem of sustainable development and must therefore remain the focus of attention. It is increasingly urgent to break the vicious circle created by the close correlation between environmental degradation, poor health, and poverty.
NASA Astrophysics Data System (ADS)
Wang, Qiang
2017-09-01
As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.
Transparent Proxy for Secure E-Mail
NASA Astrophysics Data System (ADS)
Michalák, Juraj; Hudec, Ladislav
2010-05-01
The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.
SELF-CENTERING POSITIVE LOCKING GRAPNEL
Hopper, C.G.
1961-07-01
A grapnel used for remotely securing a load to be hoisted is described. The grapnel of the invention is generally conical in shape with a plurality of semi-open bores laterally disposed about the device. The bores meet at the apex of the grapnel and there provde a securing pocket for a spherical member. A load provided with a rigid support rod having a spherical member at its end can be secured by directing the spherical member down one of the bores and into the securing pocket. The major advantsges of the invention reside in the self- centering and positive locking features.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nauss, R.
1994-12-31
In this review we describe three integer programming applications involving fixed income securities. A bond trading model is presented that features a number of possible different objectives and collections of constraints including future interest rate scenarios. A mortgage backed security (MBS) financing model that accounts for potential defaults in the MBS is also presented. Finally we describe an approach to allocate collections of bank securities into three categories: hold to maturity, available for sale, or trading. Placement of securities in these categories affects the capital, net income, and liquidity of a bank according to new accounting rules promulgated by themore » Financial Accounting Standards Board.« less
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
Analysis of ISO/IEEE 11073 built-in security and its potential IHE-based extensibility.
Rubio, Óscar J; Trigo, Jesús D; Alesanco, Álvaro; Serrano, Luis; García, José
2016-04-01
The ISO/IEEE 11073 standard for Personal Health Devices (X73PHD) aims to ensure interoperability between Personal Health Devices and aggregators-e.g. health appliances, routers-in ambulatory setups. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of different standards in healthcare systems (e.g. Personal/Electronic Health Records, alert managers, Clinical Decision Support Systems) by defining profiles intended for medical use cases. X73PHD provides a robust syntactic model and a comprehensive terminology, but it places limited emphasis on security and on interoperability with IHE-compliant systems and frameworks. However, the implementation of eHealth/mHealth applications in environments such as health and fitness monitoring, independent living and disease management (i.e. the X73PHD domains) increasingly requires features such as secure connections to mobile aggregators-e.g. smartphones, tablets-, the sharing of devices among different users with privacy, and interoperability with certain IHE-compliant healthcare systems. This work proposes a comprehensive IHE-based X73PHD extension consisting of additive layers adapted to different eHealth/mHealth applications, after having analyzed the features of X73PHD (especially its built-in security), IHE profiles related with these applications and other research works. Both the new features proposed for each layer and the procedures to support them have been carefully chosen to minimize the impact on X73PHD, on its architecture (in terms of delays and overhead) and on its framework. Such implications are thoroughly analyzed in this paper. As a result, an extended model of X73PHD is proposed, preserving its essential features while extending them with added value. Copyright © 2016 Elsevier Inc. All rights reserved.
Internet Roadside Cafe #6. [Videotape.
ERIC Educational Resources Information Center
American Library Association Video/Library Video Network, Towson, MD.
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2010 CFR
2010-04-01
... this section and the effective availability requirement of paragraph (c) of this section. Paragraph (d... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to...
Quantum cryptography with 3-state systems.
Bechmann-Pasquinucci, H; Peres, A
2000-10-09
We consider quantum cryptographic schemes where the carriers of information are 3-state particles. One protocol uses four mutually unbiased bases and appears to provide better security than obtainable with 2-state carriers. Another possible method allows quantum states to belong to more than one basis. Security is not better, but many curious features arise.
Drop-in Security for Distributed and Portable Computing Elements.
ERIC Educational Resources Information Center
Prevelakis, Vassilis; Keromytis, Angelos
2003-01-01
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Explorations in Knowing: Thinking Psychosocially about Legitimacy
ERIC Educational Resources Information Center
Chappell, Anne; Ernest, Paul; Ludhra, Geeta; Mendick, Heather
2014-01-01
In this paper, we look at what engaging with psychoanalysis, through psychosocial accounts of subjectivity, has contributed to our struggles for legitimacy and security within our ways of knowing. The psychosocial, with its insistence on the unconscious and the irrational, features as both a source of security and of insecurity. We use three…
Perception of personal safety in urban recreation sites
Herbert W. Schroeder; L.M. Anderson
1984-01-01
Photograph of 17 urban recreation sites in Chicago and Atlanta were evaluated by college students (n = 68) in Illinois, Georgia, and Michigan, for either perceived security, scenic quality, or both. For most raters, high visibility and developed park features significantly enhanced perceived security. Scenic quality, on the other hand, was enhanced for the majority of...
NASA Astrophysics Data System (ADS)
Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.
2015-05-01
It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad
Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less
Questionnaire about psychology/disease correlation–I
Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD
2011-01-01
Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...
2017-11-24
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.
2017-01-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028
Provably secure and high-rate quantum key distribution with time-bin qudits.
Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J
2017-11-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.
Provably secure and high-rate quantum key distribution with time-bin qudits
DOE Office of Scientific and Technical Information (OSTI.GOV)
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Designing ECG-based physical unclonable function for security of wearable devices.
Shihui Yin; Chisung Bae; Sang Joon Kim; Jae-Sun Seo
2017-07-01
As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.
Secure voice for mobile satellite applications
NASA Technical Reports Server (NTRS)
Vaisnys, Arvydas; Berner, Jeff
1990-01-01
The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
Task Force Report on Emergency Evacuation of Transport Airplanes. Volume 1. Summary report.
1986-07-01
panel was composed of five FAA specialists: Fred Jenkins - Aircraft Certification, Joe Starkel - Aircraft Certification, Rick Cremer - Air Carrier...and Special Projects Officer, Transport Airplane Certification Directorate Chairman, Training and Operations Working Group: Rick L. Cremer , Acting...Washington, D.C. Kirke Comstock ATA - United Airlines Rick Cremer FAA, AFS-220, Washington, D.C. Fred W. Crenshaw FAA, AFS-300, Washington, D.C. Jim
USSR Report Agriculture No. 1380
1983-04-29
Committee G . Golovenko, "Compared to 1981 and 1982, appropriate changes have been made in the structure of the area under crops. Allow me to cite...equipment was furnished by enterprises, and kolkhozes._ The restoration work is proceeding in a successful manner, /by G . Klyucherov/ /Text/ /Moscow...were mobilized to help eliminate the consequences of this natural disaster. G . Bondar1, the chief of the Alma-Ata Weather Bureau, told the TRUD
Applications of Electron Linear Induction Accelerators
NASA Astrophysics Data System (ADS)
Westenskow*, Glen; Chen, Yu-Jiuan
Linear Induction Accelerators (LIAs) can readily produce intense electron beams. For example, the ATA accelerator produced a 500 GW beam and the LIU-30 a 4 TW beam (see Chap. 2). Since the induction accelerator concept was proposed in the late 1950s [1, 2], there have been many proposed schemes to convert the beam power to other forms. Categories of applications that have been demonstrated for electron LIAs include:
Families in the Army: Looking Ahead
1989-06-01
WRi 0ata FEA14-64) This study considers how aggregate demand for Army family services will change in the future and identifies long-range issues posed...although Army actions and policies could potentially modify that future. Four long-range issues deserve closer study and continued monitoring: (1...important issues those changes pose, and explores their implications for force manage- ment and service delivery policies. It is meant to provide RAND and
Compendium of Proposed NTPR Expedited Processing Groups
2011-11-01
seven ships (USS COGSWELL, USS COMSTOCK, USS EPPERSON, USS HITCHITI, USS SILVERSTEIN, USS TILLAMOOK, and USS TORTUGA ) that only participated in shots at...230 USS TILLAMOOK (ATA 192) Johnston Island July 28 August 7 ~20 USS TORTUGA (LSD 26) Enewetak Atoll Pre-Operation March 1 April 14 326 Total...radioactivity found in water samples drawn at these times and distances would have been so dilute as to preclude measureable exposure. USS TORTUGA
The Improved Three Axis Test Table (ITATT): Program Status and Recommendation for Completion
1990-08-01
8ihMs Group qo O4e3/ 023 1 WfltlhfJ____________. Contraves USA U’NTERIM REPORT ON THIE IMPROVED) THREE AXIS TEST TABLE (ITATh): PROGRAM STATUS AND...Bhirle Group £OIn VHI TR-27824 Page i. Contraves USA TABLE OF CONTENTS Page I INTRODUCTION - EXECUTIVE SUMMARY ........................ 1 2 PURPOSE...D ata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4.1.3 What Has Contraves Learned? .......................... 8
Ji, Xinjian; Mandalapu, Dhanaraju; Cheng, Jinduo; Ding, Wei; Zhang, Qi
2018-03-30
The radical S-adenosylmethionine (SAM) superfamily enzymes cleave SAM reductively to generate a highly reactive 5'-deoxyadenosyl (dAdo) radical, which initiates remarkably diverse reactions. Unlike most radical SAM enzymes, the class C radical SAM methyltransferase NosN binds two SAMs in the active site, using one SAM to produce a dAdo radical and the second as a methyl donor. Here, we report a mechanistic investigation of NosN in which an allyl analogue of SAM (allyl-SAM) was used. We show that NosN cleaves allyl-SAM efficiently and the resulting dAdo radical can be captured by the olefin moieties of allyl-SAM or 5'-allylthioadenosine (ATA), the latter being a derivative of allyl-SAM. Remarkably, we found that NosN produced two distinct sets of products in the presence and absence of the methyl acceptor substrate, thus suggesting substrate-triggered production of ATA from allyl-SAM. We also show that NosN produces S-adenosylhomocysteine from 5'-thioadenosine and homoserine lactone. These results support the idea that 5'-methylthioadenosine is the direct methyl donor in NosN reactions, and demonstrate great potential to modulate radical SAM enzymes for novel catalytic activities. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
NASA Astrophysics Data System (ADS)
Harkema, Nathan; Liao, Chen-Ting; Sandhu, Arvinder
2017-04-01
Attosecond transient absorption spectroscopy (ATAS) enables the study of excited electron dynamics with unprecedented temporal and energy resolution. Many ATAS experiments use an extreme ultraviolet (XUV) pump pulse and a near-infrared (NIR) probe fixed at the fundamental laser frequency ( 800 nm) to study the light induced effects on electronic structure of atoms and molecules. We extend the technique by using an optical parametric amplifier in one arm of our setup, which allows us to independently tune the frequency of the probe pulse from 1200 to 1800 nm. These long-wavelength pulses allow us to explore a new regime, where we can control the couplings between nearby electronic states to alter the transient absorption lineshapes in atoms. We use this technique to investigate the 4p-3s detuning dependent Autler-Townes splitting of the 4p state in Helium. Light induced Floquet structures extending into the continuum are observed in our study. We demonstrate new tunable XUV emission channels from four-wave mixing processes, and the efficiency of these emissions can be strongly enhanced through resonant couplings. The tunable IR induced electronic couplings are also used to influence the autoionization dynamics in Argon. This work is supported by NSF Grant No. PHY-1505556 and ARO Grant No. W911NF-14-1-0383.
Towards new paradigms for the treatment of hypobaric decompression sickness.
Dart, T S; Butler, W
1998-04-01
Altitude induced (hypobaric) decompression sickness (DCS) has long been treated with ground level oxygen and U.S. Navy Treatment Tables 5 and 6. These treatment tables originate from surface excursion diving and, when implemented, require significant resource allocation. Although they are effective treatment regimens, these tables were not developed for treating hypobaric DCS which has an etiology similar to saturation diving DCS. In this review, different treatment options for hypobaric DCS are presented. These options include more aggressive use of ground level oxygen and treatment tables using a maximum pressure of 2 atmospheres (ATA). Specific attention is given to USAF Table VIII, an experimental hypobaric DCS treatment-table, and space suit overpressurization treatment. This paradigm shift for DCS treatment is based on a projected increase in hypobaric DCS treatment from exposure to low pressure during several operational conditions: cruise flight in the next generation aircraft (e.g., F-22); high altitude, unpressurized flight by special operations forces; and the extraordinary amount of extravehicular activity (EVA) required to construct the international space station. Anticipating the need to treat DCS encountered during these and other activities, it is proposed that 2 ATA or less hyperbaric oxygen (HBO) treatment conjoined with new collapsible chamber technology can be used to address these issues in a safe and cost effective fashion.
RFI in the 0.5 to 10.8 GHz Band at the Allen Telescope Array
NASA Astrophysics Data System (ADS)
Backus, Peter R.; Kilsdonk, T. N.; Allen Telescope Array Team
2007-05-01
Thanks to funding from the Paul G. Allen Foundation (and other philanthropic supporters) for the technology development and first phase of construction, the first 42 elements of the Allen Telescope Array (ATA-42) are being commissioned for rapid surveys of the astrophysical and technological sky. Because of the innovative design of this array that will eventually include 350 elements, traditional radio astronomy and SETI are enabled simultaneously 24x7. The array has been designed to provide an optimal snapshot image of a very large field of view and simultaneously, 16 (dual polarization) phased beams within the field of view to be analyzed by a suite of backend processors. Four independent 100 MHz bands may be tuned anywhere within the instantaneous receiver bandwidth from 0.5 to 11.2 GHz. One key to the success of rapid surveys for astrophysical or technological signals is a quiet background. This poster presents the results of initial surveys with 6.1 meter dishes at high-spectral-resolution of the background spectrum from 0.5 to 10.8 GHz at the Hat Creek Radio Observatory, where the ATA is being constructed, and compares it with the background spectrum from 1.2-3 GHz at other observatories where SETI observations have been conducted within the past 11 years.
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock
Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong
2009-01-01
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode. PMID:22291566
Human respiration at rest in rapid compression and at high pressures and gas densities
NASA Technical Reports Server (NTRS)
Gelfand, R.; Lambertsen, C. J.; Strauss, R.; Clark, J. M.; Puglia, C. D.
1983-01-01
The ventilation (V), end-tidal PCO2 (PACO2), and CO2 elimination rate were determined in men at rest breathing CO2-free gas over the pressure range 1-50 ATA and the gas density range 0.4-25 g/l, during slow and rapid compressions, at stable elevated ambient pressures and during slow decompressions. Progressive increase in pulmonary gas flow resistance due to elevation of ambient pressure and inspired gas density to the He-O2 equivalent of 5000 feet of seawater was found to produce a complex pattern of change in PACO2. It was found that as both ambient pressure and pulmonary gas flow resistance were progressively raised, PACO2 at first increased, went through a maximum, and then declined towards values near the 1 ATA level. It is concluded that this pattern of PACO2 change results from the interaction on ventilation of the increase in pulmonary resistance due to the elevation of gas density with the increase in respiratory drive postulated as due to generalized central nervous system excitation associated with exposure to high hydrostatic pressure. It is suggested that a similar interaction exists between increased gas flow resistance and the increase in respiratory drive related to nitrogen partial pressure and the resulting narcosis.
Standards and Guidelines in Telemedicine and Telehealth
Krupinski, Elizabeth A.; Bernard, Jordana
2014-01-01
The development of guidelines and standards for telemedicine is an important and valuable process to help insure effective and safe delivery of quality healthcare. Some organizations, such as the American Telemedicine Association (ATA), have made the development of standards and guidelines a priority. The practice guidelines developed so far have been well received by the telemedicine community and are being adopted in numerous practices, as well as being used in research to support the practice and growth of telemedicine. Studies that utilize published guidelines not only help bring them into greater public awareness, but they also provide evidence needed to validate existing guidelines and guide the revision of future versions. Telemedicine will continue to grow and be adopted by more healthcare practitioners and patients in a wide variety of forms not just in the traditional clinical environments, and practice guidelines will be a key factor in fostering this growth. Creation of guidelines is important to payers and regulators as well as increasingly they are adopting and integrating them into regulations and policies. This paper will review some of the recent ATA efforts in developing telemedicine practice guidelines, review the role of research in guidelines development, review data regarding their use, and discuss some of areas where guidelines are still needed. PMID:27429261
Health through people's empowerment: a rights-based approach to participation.
De Vos, Pol; De Ceukelaire, Wim; Malaise, Geraldine; Pérez, Dennis; Lefèvre, Pierre; Van der Stuyft, Patrick
2009-01-01
Analysis of the academic discourse on participation, empowerment, and the right to health since the 1978 Alma-Ata International Conference on Primary Health Care and the subsequent Alma-Ata Declaration shows that each phase of the evolution of these concepts added important new aspects to the discussion. This article focuses on three crucial issues that relate to these additions: the importance of social class when analyzing the essentials of community participation, the pivotal role of power highlighted in the discussion on empowerment, and the role of the state, which refers to the concepts of claim holders and duty bearers included in a rights-based approach to health. The authors compare these literature findings with their own experiences over the past 20 years in the Philippines, Palestine, and Cuba, and they offer some lessons learned. The concept of "health through people's empowerment" is proposed to identify and describe the core aspects of participation and empowerment from a human rights perspective and to put forward common strategies. If marginalized groups and classes organize, they can influence power relations and pressure the state into action. Such popular pressure through organized communities and people's organizations can play an essential role in ensuring adequate government policies to address health inequities and in asserting the tright to health.
Patel, Parth; Parmar, Bhavesh; Kureshy, Rukhsana I; Khan, Noor-Ul H; Suresh, Eringathodi
2018-06-19
Herein, a zinc(ii)-based 3D mixed ligand metal organic framework (MOF) was synthesized via versatile routes including green mechanochemical synthesis. The MOF {[Zn(ATA)(L)·H2O]}n (ZnMOF-1-NH2) has been characterized by various physico-chemical techniques, including SCXRD, and composed of the bipyridyl-based Schiff base (E)-N'-(pyridin-4-ylmethylene)isonicotinohydrazide (L) and 2-aminoterephthalic acid (H2ATA) ligands as linkers. The MOF material has been explored as a multifunctional heterogeneous catalyst for the cycloaddition of alkyl and aryl epoxides with CO2 and sulfoxidation reactions of aryl sulfides. The influence of various reaction parameters is examined to optimize the performance of the catalytic reactions. It is found that solvent-free catalytic reaction conditions offer good catalytic conversion in the case of cyclic carbonates, and for sulfoxide, good conversion and selectivity are achieved in the presence of DCM as a solvent medium under ambient reaction conditions. The chemical and thermal stability of the catalyst are excellent and it is active for up to four catalytic cycles without significant loss in activity. Furthermore, based on the catalytic activity and structural evidence, a plausible mechanism for both catalytic reactions is proposed.
ERIC Educational Resources Information Center
Gerlinger, Julie; Wo, James C.
2016-01-01
A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…
NASA Technical Reports Server (NTRS)
Skeberdis, Daniel
2016-01-01
This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
Securing the Global Airspace System Via Identity-Based Security
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2015-01-01
Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-25
... conditions for the Gulfstream GVI airplane. This airplane may have novel or unusual design features... standards for these design features. These proposed special conditions contain the additional safety... transport airplane with an executive cabin interior. The maximum takeoff weight will be 99,600 pounds, with...
Feature Extraction Using an Unsupervised Neural Network
1991-05-03
with this neural netowrk is given and its connection to exploratory projection pursuit methods is established. DD I 2 P JA d 73 EDITIONj Of I NOV 6s...IS OBSOLETE $IN 0102- LF- 014- 6601 SECURITY CLASSIFICATION OF THIS PAGE (When Daoes Enlered) Feature Extraction using an Unsupervised Neural Network
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... design features associated with the architecture and connectivity capabilities of the airplane's computer... novel or unusual design features: digital systems architecture composed of several connected networks. The architecture and network configuration may be used for, or interfaced with, a diverse set of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... airplane. This airplane will have novel or unusual design features associated with the architecture and... incorporate the following novel or unusual design features: Digital systems architecture composed of several connected networks. The proposed architecture and network configuration may be used for, or interfaced with...
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.
Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments
ERIC Educational Resources Information Center
Rooney, Tonya
2015-01-01
In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…
NASA Astrophysics Data System (ADS)
Lohweg, Volker; Schaede, Johannes; Türke, Thomas
2006-02-01
The authenticity checking and inspection of bank notes is a high labour intensive process where traditionally every note on every sheet is inspected manually. However with the advent of more and more sophisticated security features, both visible and invisible, and the requirement of cost reduction in the printing process, it is clear that automation is required. As more and more print techniques and new security features will be established, total quality security, authenticity and bank note printing must be assured. Therefore, this factor necessitates amplification of a sensorial concept in general. We propose a concept for both authenticity checking and inspection methods for pattern recognition and classification for securities and banknotes, which is based on the concept of sensor fusion and fuzzy interpretation of data measures. In the approach different methods of authenticity analysis and print flaw detection are combined, which can be used for vending or sorting machines, as well as for printing machines. Usually only the existence or appearance of colours and their textures are checked by cameras. Our method combines the visible camera images with IR-spectral sensitive sensors, acoustical and other measurements like temperature and pressure of printing machines.
Identifiable piezoelectric security system design
NASA Astrophysics Data System (ADS)
Li, Zhenyu; Zhang, Xiaoming
2017-10-01
Directing at the disadvantages of low environmental suitability, inferior anti-interference ability and being easy to be found and destroyed in existing security product, a kind of identifiable piezoelectric security system based on piezoelectric cable is designed. The present system gathers vibration signals of different moving bodies, such as human, vehicles, animals and so on, with piezoelectric cable buried under -ground and distinguishes the different moving bodies through recognition algorithm and thus giving an alarm. As is shown in experiments, the present system has the features of good concealment and high accuracy in distinguishing moving bodies.
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
PREMIX: PRivacy-preserving EstiMation of Individual admiXture.
Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang
2016-01-01
In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.
USSR Report, Political and Sociological Affairs, No. 1445, Central Asian Press Surveys -- 1983
1983-08-16
Industry Product Quality Low 16 Siberian Oil Pipeline Comes to Chimkent 17 Ecological Problems Impede Expansion in Cramped Pavlodar 17 Editorial...picture. - 16 SIBERIAN OIL PIPELINE COMES TO CHIMKENT [Editorial Report] Alma-Ata SOTSIALISTIK QAZAQSTAN in Kazakh 19 March 1983 carries on page 3 a...the rubric "At the Construction Sites of the 5-Year-Plan." The Siberian Petroleum Pipeline, which stretches through 1,642 kilometers of difficult
Investigations of Antiangiogenic Mechanisms Using Novel Imaging Techniques
2011-02-01
011112-1 Downloaded from SPIE Digital Library on 22 Feb 2010 to 1lular functions that exacerbate treatment resistance and tumor aggressiveness.9 Cycling...measurements, which further complicates ata acquisition and interpretation. Blood flow on the mi- rovessel level has traditionally been measured using laser...34ournal of Biomedical Optics 011112-2 Downloaded from SPIE Digital Library on 22 Feb 2010 to 1The goal of this study was to dynamically image changes in
The Presidential Nuclear Initiatives of 1991-1992
2012-09-01
and/or warhead downloading ), and use START Treaty procedures to implement it. This was the first serious public proposal to emerge from a longstanding...discussion to relevant technolo- gies , rather than to venture into more sensitive areas of nuclear weapons practice and procedures.56 Gorbachev did not...States. The same basic points were made by 11 republic heads in the Alma- Ata Declaration on December 21.58 On December 25, Gorbachev submitted his
A Study of Precipitation Occurrence Using Visual and Infrared Satellite Data.
1983-12-01
THESIS A STUDY OF PRECIPITATION OCCURRENCE USING VISUAL AND INFRARED SATELLITE DATA by Linda Sue Paul December 1983 L1J Thesis Advisor: C . H. Wash Approved...PRECIPITATION SPECIFICATION ............ 18 A. INTRODUCTICI O N ...... • ........ 18 B. BI-SPECTRAL AND INFRARID THRBSH3LD ...... 18 C . LIFE HISTORY 3...4 III. DATA PROCESSING * .• ....... * ...... A. INTRODUCTION o . . . . . .o. . . o o . o 2 B. C ATA SORT o . o . . o o
Marine Fuel Cell Technology Verification Trainer Program: Operator Curriculum Development
2004-06-01
collection of tnormiratin is estimiate to average 1 hour per response, Including the time INr reviewing InatruCtlona. ear-ching existing =ata aourcas...guidelines and standards are provided. With the anticipation that up to several years’ delay will occur between the time of this report and the maturity of...reference only, given as foundation sources available at the time of this project. The supplemental references to published materials are considered the
1980-10-01
animals breath- ing a helium-oxygen mix (P02 maintained at 0.2 ATA). Results indicated that increased pressure did not alter the analgesic effect of this...diphenhydramine (Benadryl); the effects of caffeine and dimenhydrinate (Dramamine) were dependent on individual suscepti- bility, and the analgesics produced...34Behavioral Effects of Drugs in the Hyperbaric Environment) ...... ................. ... 17 J. M. Walsh Discussion ................... 23 Chapter II
Hydrostatic Extrusion of 60mm Mortar Tubes
1974-10-01
Transverse "Tensile Test Specimen 16 9. Subsize Charpy and Tensile Test Specimens 17 10. Extruded 718 Alloy Tube Pressure-strain Pressure Test [)ata 18... subsize specimens. (d) Previous studies have shown that the standard size Charpy values are 4.5 times the subsize values. 22 -. •. ., *. ...20 II. Tensile Properties of Extruded and Aged Tube (a) 21 III. Extruded 718 Alloy Pressure Test Data 21 IV. V-Notch Charpy Impact Properties(c) of
Propagation of High Energy Laser Beams in Various Environments
2007-06-08
The initial aerosol distribution corresponds to that of Fig. 2. 23 PwV ’ 2 7r nA PA kB ATA a R’ a,,tal I= aw. I + 4r nARA AT A + a.. I + "A (16) Pwv ...vapor from a vaporized aerosol enters the air at an elevated temperature. The third term is small compared to the first since PWV / Pa’,a,,h << 1 , and
TRADOC Annual Command History, 1 January to 31 December 1991
1992-06-01
24th Infantry Division (Mechanized), the French 6th Light Armored Division, the 3d Armored Cavalry Regiment, and other units assigned; and VII Corps...under Lt. Gen. Frederick M. Franks, Jr., with the U.S. Ist Infantry Division (Mechanized), Ist and 3d Armored Divisions, the Ist Cavalry Division, the...Alma Ata, Kazakhstan, the presidents of all the former republics except Georgia and the three seceding Baltic states, declared formation of the
1989-05-01
from the computer and tells the operator whether the hole meets the established criteria. All the components have been incorporated into a mobile cart...DeHavilland: - Dash-8 applications " General Dynamics: - F16 tail light panel - ATF Supportable Hybrid Stuctures Program - ATA aplications " USAF AFWAL...Compressive Fatigue of Flawed Graphite/Epoxy Composites," Doctoral Thesis , Massachusetts Institute of Technology, Department of Aeronautics and
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet
2017-01-01
As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things. PMID:28696393
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things.
Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet; Hoebeke, Jeroen
2017-07-11
As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-25
... Gulfstream GVI airplane. This airplane will have novel or unusual design features associated with the... not contain adequate or appropriate safety standards for these design features. These proposed special... will be an all-new, two- engine jet transport airplane with an executive cabin interior. The maximum...
Methods, systems and devices for detecting threatening objects and for classifying magnetic data
Kotter, Dale K [Shelley, ID; Roybal, Lyle G [Idaho Falls, ID; Rohrbaugh, David T [Idaho Falls, ID; Spencer, David F [Idaho Falls, ID
2012-01-24
A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as representing a threatening object. Another step includes acquiring magnetic data. Another step includes determining if the acquired magnetic data comprises a unique feature.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lopez, Juan; Liefer, Nathan C.; Busho, Colin R.
Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML)more » and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.« less
Internal Review of the Washington Navy Yard Shooting. A Report to the Secretary of Defense
2013-11-20
the following: • Biometrically enabled background security screening • Identification card security features • Identity -proofing and vetting...claimed identities vetted through mandatory databases such as NCIC and TSDB. This occurred in attempts to reduce access costs. OMB memorandum 05-24...other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for
Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Qinghua; Zhang, Fengli
This paper explores a real security vulnerability and patch management dataset from an electric utility in order to shed light on characteristics of the vulnerabilities that electric utility assets have and how they are remediated in practice. Specifically, it first analyzes the distribution of vulnerabilities over software, assets, and other metric. Then it analyzes how vulnerability features affect remediate actions.
Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.
2016-02-02
A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.
Green Peace: Can Biofuels Accelerate Energy Security
2013-02-14
http://www.navy.mil/features/Navy_EnergySecurity.pdf 6 James T. Bartis and Lawrence Van Bibber. Alternative Fuels for Military Applications, (Santa...2013) 28 James T. Bartis and Lawrence Van Bibber, Alternative Fuels for Military Applications, (Santa Monica, CA: RAND Corporation, 2011), http...research/algae-based-biofuels (accessed 18 November 2012). 55 John Laitner, Karen Ehrhardt-Martinez, and Vanessa McKinney, Examining the Scale of
Alexander, Erik K.; Bible, Keith C.; Doherty, Gerard M.; Mandel, Susan J.; Nikiforov, Yuri E.; Pacini, Furio; Randolph, Gregory W.; Sawka, Anna M.; Schlumberger, Martin; Schuff, Kathryn G.; Sherman, Steven I.; Sosa, Julie Ann; Steward, David L.; Tuttle, R. Michael; Wartofsky, Leonard
2016-01-01
Background: Thyroid nodules are a common clinical problem, and differentiated thyroid cancer is becoming increasingly prevalent. Since the American Thyroid Association's (ATA's) guidelines for the management of these disorders were revised in 2009, significant scientific advances have occurred in the field. The aim of these guidelines is to inform clinicians, patients, researchers, and health policy makers on published evidence relating to the diagnosis and management of thyroid nodules and differentiated thyroid cancer. Methods: The specific clinical questions addressed in these guidelines were based on prior versions of the guidelines, stakeholder input, and input of task force members. Task force panel members were educated on knowledge synthesis methods, including electronic database searching, review and selection of relevant citations, and critical appraisal of selected studies. Published English language articles on adults were eligible for inclusion. The American College of Physicians Guideline Grading System was used for critical appraisal of evidence and grading strength of recommendations for therapeutic interventions. We developed a similarly formatted system to appraise the quality of such studies and resultant recommendations. The guideline panel had complete editorial independence from the ATA. Competing interests of guideline task force members were regularly updated, managed, and communicated to the ATA and task force members. Results: The revised guidelines for the management of thyroid nodules include recommendations regarding initial evaluation, clinical and ultrasound criteria for fine-needle aspiration biopsy, interpretation of fine-needle aspiration biopsy results, use of molecular markers, and management of benign thyroid nodules. Recommendations regarding the initial management of thyroid cancer include those relating to screening for thyroid cancer, staging and risk assessment, surgical management, radioiodine remnant ablation and therapy, and thyrotropin suppression therapy using levothyroxine. Recommendations related to long-term management of differentiated thyroid cancer include those related to surveillance for recurrent disease using imaging and serum thyroglobulin, thyroid hormone therapy, management of recurrent and metastatic disease, consideration for clinical trials and targeted therapy, as well as directions for future research. Conclusions: We have developed evidence-based recommendations to inform clinical decision-making in the management of thyroid nodules and differentiated thyroid cancer. They represent, in our opinion, contemporary optimal care for patients with these disorders. PMID:26462967
Haugen, Bryan R; Alexander, Erik K; Bible, Keith C; Doherty, Gerard M; Mandel, Susan J; Nikiforov, Yuri E; Pacini, Furio; Randolph, Gregory W; Sawka, Anna M; Schlumberger, Martin; Schuff, Kathryn G; Sherman, Steven I; Sosa, Julie Ann; Steward, David L; Tuttle, R Michael; Wartofsky, Leonard
2016-01-01
Thyroid nodules are a common clinical problem, and differentiated thyroid cancer is becoming increasingly prevalent. Since the American Thyroid Association's (ATA's) guidelines for the management of these disorders were revised in 2009, significant scientific advances have occurred in the field. The aim of these guidelines is to inform clinicians, patients, researchers, and health policy makers on published evidence relating to the diagnosis and management of thyroid nodules and differentiated thyroid cancer. The specific clinical questions addressed in these guidelines were based on prior versions of the guidelines, stakeholder input, and input of task force members. Task force panel members were educated on knowledge synthesis methods, including electronic database searching, review and selection of relevant citations, and critical appraisal of selected studies. Published English language articles on adults were eligible for inclusion. The American College of Physicians Guideline Grading System was used for critical appraisal of evidence and grading strength of recommendations for therapeutic interventions. We developed a similarly formatted system to appraise the quality of such studies and resultant recommendations. The guideline panel had complete editorial independence from the ATA. Competing interests of guideline task force members were regularly updated, managed, and communicated to the ATA and task force members. The revised guidelines for the management of thyroid nodules include recommendations regarding initial evaluation, clinical and ultrasound criteria for fine-needle aspiration biopsy, interpretation of fine-needle aspiration biopsy results, use of molecular markers, and management of benign thyroid nodules. Recommendations regarding the initial management of thyroid cancer include those relating to screening for thyroid cancer, staging and risk assessment, surgical management, radioiodine remnant ablation and therapy, and thyrotropin suppression therapy using levothyroxine. Recommendations related to long-term management of differentiated thyroid cancer include those related to surveillance for recurrent disease using imaging and serum thyroglobulin, thyroid hormone therapy, management of recurrent and metastatic disease, consideration for clinical trials and targeted therapy, as well as directions for future research. We have developed evidence-based recommendations to inform clinical decision-making in the management of thyroid nodules and differentiated thyroid cancer. They represent, in our opinion, contemporary optimal care for patients with these disorders.
Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng
2018-04-01
With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated. Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks. The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS. We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
Additional Security Considerations for Grid Management
NASA Technical Reports Server (NTRS)
Eidson, Thomas M.
2003-01-01
The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.
Proceedings of the FAA Inspection Program Area Review, Held in Ames, Iowa on April 5-7, 1994
1994-07-01
Colin Drury Mr. Locke Easton SUNY Buffalo ANE-1 00, Aircraft Certification Division, Engine and 342 Bell Mall Propeller Directorate Buffalo, NY 14260...and Tech Transfer Walter Validation: 13:10 MOI validation F. Spencer, SNL 13:30 Cost Benefit Analysis Protocol (with MOI example) V. Brechling, NWU 13...on the need for calibration of the instrument were briefly addressed. Cost -Benefit Analysis: ATA members took unexpected interest in the presentation
Traumatic Brain Injury and Hyperbaric Oxygen Therapy Dawn of a New Day
2017-09-07
Both used to test for differences between groups • No significant statistical difference between groups, but both groups improved • Relative...George Wolf, Laura M . Baugh, Christine M. Schubert Kabban, Michael F. Richards, Jennifer Prye • Individual test scores • ImPACT: • visual memory and...Stem cells collected prior to series, after 15 exposures. after 30 exposure series, and 6 weel< post series. • 13 subjects from 1.3 ATA air and 15
NRL 1989 Beam Propagation Studies in Support of the ATA Multi-Pulse Propagation Experiment
1990-08-31
papers presented here were all written prior to the completion of the experiment. The first of these papers presents simulation results which modeled ...beam stability and channel evolution for an entire five pulse burst. The second paper describes a new air chemistry model used in the SARLAC...Experiment: A new air chemistry model for use in the propagation codes simulating the MPPE was developed by making analytic fits to benchmark runs with
Targeting Epithelial Cell Migration to Accelerate Wound Healing
2012-02-01
the presence and absence of forskolin to stimulate PKA. As seen in figure 10 cells depleted of Rsu1 and PINCH1 exhibit elevated phospho-VASP(ser157)at...a site of PKA and PKC phosphorylation even in the absence of cAMP increase and PKA activation by forskolin treatment. This indicates that RIPP...transfection were harvested with or without a 15 minutes exposure to forskolin (20 M). Blots were reacted with anti- phosphoVASP specific for serine 157
Studies on Oxygen Toxicity in the Lungs.
1980-02-29
Health 22:450-453, 1971 . gins after about seven days At this time there is pro- 10. EVANS, M. J., R. J. ST-mnEs and C. FREEMAN: Effects of nitrogen...dioxide on cell renewal in the rat lung. Arch. liferation of endothelial cells in capillaries and Type 2 Intern. Med. 128:57-60, 1971 . alveolar cells...Atmospheres perature and humidity. Changes in these Absolute (ATA). Aerosp. Med 42:1262-1265 parameters occur when the number of ani- (December 1971
Chemical tests: Propellants, Gases, and Metals
1975-12-11
14 Determination of Chromium and Nickel in Stainless Steels by X-ray Spectroscopy 80 5. 15 Determination of Furfural in Furfuryl Alcohol by Infrared...and b for nickel. 81 TOP 5-2-5S5 11 December 1975 5. 15 l)eterminazocn of Furfural in Furfury iAlcohol by 1 nfrared Spectroscoov 5. 15. 1 Objective...To determine the furfural content of furfuryl alcohol. Fart. ryl alcohol is manufactured from furfural atA elevated pressure and temperatare; resi.dual
YC-15 Interior Noise Measurements. Technical Discussion.
1981-03-01
almost equal chord segments of the flap. The spoilers ahead of the flap are drooped as a function of flap motion to main- tain an effective slot...fan and primary exhaust air with freestream air to produce rapid temperature and velocity reduction and to spread the exhaust wake over a large span of...PRESSURESMAme Model AR- 200 Kulie Doglas14 Channel Mode XTE19010 D gital ataTape Transducer Signal Condition- INLET ACOUSTICS AND ~ odI ing Amplfiers
Effects of He-O2 Breathing during Experimental Decompression Sickness Following Air Dives
1987-03-01
sickness (DCS1 and venous air embolism were studied . Fifteen anestht zed dogs were mechanically ventilated and subjected to repeated air dives until...animals with He-0 2 during venous air embolism worsens pulmonary hypertension and hypoxemia (9). To test this hypothesis, we studied the effects of He...additional animals (air embolism group), gas switching was studied during venous air embolism at I ATA. These animals were anesthetized and instnmented as
Hyperbaric oxygen for mild traumatic brain injury: Design and baseline summary.
Weaver, Lindell K; Chhoeu, Austin; Lindblad, Anne S; Churchill, Susan; Wilson, Steffanie H
2016-01-01
The Brain Injury and Mechanisms of Action of Hyperbaric Oxygen for Persistent Post-Concussive Symptoms after Mild Traumatic Brain Injury (mTBI) (BIMA) study, sponsored by the Department of Defense, is a randomized double-blind, sham-controlled clinical trial that has a longer duration of follow-up and more comprehensive assessment battery compared to recent HBO₂ studies. BIMA randomized 71 participants from September 2012 to May 2014. Primary results are expected in 2017. Randomized military personnel received hyperbaric oxygen (HBO₂) at 1.5 atmospheres absolute (ATA) or sham chamber sessions at 1.2 ATA, air, for 60 minutes daily for 40 sessions. Outcomes include neuropsychological, neuroimaging, neurological, vestibular, autonomic function, electroencephalography, and visual systems evaluated at baseline, immediately following intervention at 13 weeks and six months with self-report symptom and quality of life questionnaires at 12 months, 24 months and 36 months. Characteristics include: median age 33 years (range 21-53); 99% male; 82% Caucasian; 49% diagnosed post-traumatic stress disorder; 28% with most recent injury three months to one year prior to enrollment; 32% blast injuries; and 73% multiple injuries. This manuscript describes the study design, outcome assessment battery, and baseline characteristics. Independent of a therapeutic role of HBO₂, results of BIMA will aid understanding of mTBI. ClinicalTrials.gov Identifier: NCT01611194; https://clinicaltrials.gov/show/NCT01611194. Copyright© Undersea and Hyperbaric Medical Society.
Börner, Tim; Grey, Carl; Adlercreutz, Patrick
2016-08-01
Methods for rapid and direct quantification of enzyme kinetics independent of the substrate stand in high demand for both fundamental research and bioprocess development. This study addresses the need for a generic method by developing an automated, standardizable HPLC platform monitoring reaction progress in near real-time. The method was applied to amine transaminase (ATA) catalyzed reactions intensifying process development for chiral amine synthesis. Autosampler-assisted pipetting facilitates integrated mixing and sampling under controlled temperature. Crude enzyme formulations in high and low substrate concentrations can be employed. Sequential, small (1 µL) sample injections and immediate detection after separation permits fast reaction monitoring with excellent sensitivity, accuracy and reproducibility. Due to its modular design, different chromatographic techniques, e.g. reverse phase and size exclusion chromatography (SEC) can be employed. A novel assay for pyridoxal 5'-phosphate-dependent enzymes is presented using SEC for direct monitoring of enzyme-bound and free reaction intermediates. Time-resolved changes of the different cofactor states, e.g. pyridoxal 5'-phosphate, pyridoxamine 5'-phosphate and the internal aldimine were traced in both half reactions. The combination of the automated HPLC platform with SEC offers a method for substrate-independent screening, which renders a missing piece in the assay and screening toolbox for ATAs and other PLP-dependent enzymes. Copyright © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Proposal for Definitive Survey for Fast Radio Bursts at the Allen Telescope Array
NASA Astrophysics Data System (ADS)
Harp, Gerald; Tarter, J. C.; Welch, W. J.; Allen Telescope Array Team
2014-01-01
The Allen Telescope Array, a 42-dish radio interferometer in Northern California is now being upgraded with new, more sensitive receivers covering 0.9-18 GHz continuously. Leveraging this frequency coverage and wide field of view, the ATA is a unique and ideal instrument for the discovery and characterization of fast radio bursts (FRBs, discovered at Parkes and Arecibo) and other short-time domain radio phenomena. The field of view (nearly 10 sq. deg. at 1 GHz) allows for a rapid search of 3π steradians with many lookbacks over a period of 2.5 years. The instantaneous wide-frequency range of the upgraded ATA receivers allows sensitive observations at 4 simultaneous frequency ranges (for example, 0.9 - 1.5 GHz, 1.6-2.2 GHz, 2.5-3.1 GHz, and 4.6-5.2 GHz, full Stokes); something not possible at any other major telescope. This enables very accurate dispersion measure and spectral index characterization of ms-timescale bursts (or other time-variable activity) with a localization accuracy ~20" for SNR > 10 (all FRBs discovered to date would meet this criterium). We discuss the new digital processing system required to perform this survey, with a plan to capture ~400 FRB events during the survey period of performance , based on current event-rate estimates of 10^4 events/sky/day.
Sabouri, Sepideh; Matene, Elhacene; Vinet, Alain; Richer, Louis-Philippe; Cardinal, René; Armour, J Andrew; Pagé, Pierre; Kus, Teresa; Jacquemet, Vincent
2014-01-01
Epicardial high-density electrical mapping is a well-established experimental instrument to monitor in vivo the activity of the atria in response to modulations of the autonomic nervous system in sinus rhythm. In regions that are not accessible by epicardial mapping, noncontact endocardial mapping performed through a balloon catheter may provide a more comprehensive description of atrial activity. We developed a computer model of the canine right atrium to compare epicardial and noncontact endocardial mapping. The model was derived from an experiment in which electroanatomical reconstruction, epicardial mapping (103 electrodes), noncontact endocardial mapping (2048 virtual electrodes computed from a 64-channel balloon catheter), and direct-contact endocardial catheter recordings were simultaneously performed in a dog. The recording system was simulated in the computer model. For simulations and experiments (after atrio-ventricular node suppression), activation maps were computed during sinus rhythm. Repolarization was assessed by measuring the area under the atrial T wave (ATa), a marker of repolarization gradients. Results showed an epicardial-endocardial correlation coefficients of 0.80 and 0.63 (two dog experiments) and 0.96 (simulation) between activation times, and a correlation coefficients of 0.57 and 0.46 (two dog experiments) and 0.92 (simulation) between ATa values. Despite distance (balloon-atrial wall) and dimension reduction (64 electrodes), some information about atrial repolarization remained present in noncontact signals.
Sabouri, Sepideh; Matene, Elhacene; Vinet, Alain; Richer, Louis-Philippe; Cardinal, René; Armour, J. Andrew; Pagé, Pierre; Kus, Teresa; Jacquemet, Vincent
2014-01-01
Epicardial high-density electrical mapping is a well-established experimental instrument to monitor in vivo the activity of the atria in response to modulations of the autonomic nervous system in sinus rhythm. In regions that are not accessible by epicardial mapping, noncontact endocardial mapping performed through a balloon catheter may provide a more comprehensive description of atrial activity. We developed a computer model of the canine right atrium to compare epicardial and noncontact endocardial mapping. The model was derived from an experiment in which electroanatomical reconstruction, epicardial mapping (103 electrodes), noncontact endocardial mapping (2048 virtual electrodes computed from a 64-channel balloon catheter), and direct-contact endocardial catheter recordings were simultaneously performed in a dog. The recording system was simulated in the computer model. For simulations and experiments (after atrio-ventricular node suppression), activation maps were computed during sinus rhythm. Repolarization was assessed by measuring the area under the atrial T wave (ATa), a marker of repolarization gradients. Results showed an epicardial-endocardial correlation coefficients of 0.80 and 0.63 (two dog experiments) and 0.96 (simulation) between activation times, and a correlation coefficients of 0.57 and 0.46 (two dog experiments) and 0.92 (simulation) between ATa values. Despite distance (balloon-atrial wall) and dimension reduction (64 electrodes), some information about atrial repolarization remained present in noncontact signals. PMID:24598778
Study on the early warning mechanism for the security of blast furnace hearths
NASA Astrophysics Data System (ADS)
Zhao, Hong-bo; Huo, Shou-feng; Cheng, Shu-sen
2013-04-01
The campaign life of blast furnace (BF) hearths has become the limiting factor for safety and high efficiency production of modern BFs. However, the early warning mechanism of hearth security has not been clear. In this article, based on heat transfer calculations, heat flux and erosion monitoring, the features of heat flux and erosion were analyzed and compared among different types of hearths. The primary detecting elements, mathematical models, evaluating standards, and warning methods were discussed. A novel early warning mechanism with the three-level quantificational standards was proposed for BF hearth security.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Clinton's Child Care Plan: Helping Families to Secure and Pay for Child Care. Family Review.
ERIC Educational Resources Information Center
Lindjord, Denise
1998-01-01
Reviews features of President Bill Clinton's proposed $22 billion child care plan, a set of spending measures and tax credits designed to make child care more affordable, available, and safe for low- and middle-income families. Features noted include Head Start and after-school programs, and business tax credits. (HTH)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-10
... Proposed Rule Change The Exchange proposes to adopt changes to its crossing mechanisms to adopt an auto... proposal is to add step-up-and-match functionality (the ``auto-match feature'') to both mechanisms for an...-side order specifies the auction start price. With the auto-match feature, the contra-side order will...
NASA Astrophysics Data System (ADS)
Liu, Zhi-Hao; Chen, Han-Wu
2018-02-01
As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.
An Example of Unsupervised Networks Kohonen's Self-Organizing Feature Map
NASA Technical Reports Server (NTRS)
Niebur, Dagmar
1995-01-01
Kohonen's self-organizing feature map belongs to a class of unsupervised artificial neural network commonly referred to as topographic maps. It serves two purposes, the quantization and dimensionality reduction of date. A short description of its history and its biological context is given. We show that the inherent classification properties of the feature map make it a suitable candidate for solving the classification task in power system areas like load forecasting, fault diagnosis and security assessment.
Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar
2018-05-04
The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).
Bootstrapping and Maintaining Trust in the Cloud
2016-12-01
proliferation and popularity of infrastructure-as-a- service (IaaS) cloud computing services such as Amazon Web Services and Google Compute Engine means...IaaS trusted computing system: • Secure Bootstrapping – the system should enable the tenant to securely install an initial root secret into each cloud ...elastically instantiated and terminated. Prior cloud trusted computing solutions address a subset of these features, but none achieve all. Excalibur [31] sup
Inclusive Security and Peaceful Societies: Exploring the Evidence
2016-03-01
655 mothers to deradicalize 1,024 young men and boys , rehabilitating INCLUSIVE SECURITY AND PEACEFUL SOCIETIES PRISM 6, no. 1 FEATURES | 23 The...approaches to breaking impasses dur- ing a stalled peace process, from nonviolent sit-ins to unorthodox tactics like blocking doors or even withholding sex ...Processes,” (New York: International Peace Institute, 2015). 9 Valerie Hudson, Bonnie Ballif-Spanvill, Mary Caprioli, and Chad F. Emmett, Sex and
Social problem-solving interventions in medium secure settings for women.
Long, C G; Fulton, B; Dolley, O; Hollin, C R
2011-10-01
Problem-solving interventions are a feature of overall medium secure treatment programmes. However, despite the relevance of such treatment to personality disorder there are few descriptions of such interventions for women. Beneficial effects for women who completed social problem-solving group treatment were evident on a number of psychometric assessments. A treatment non-completion rate of one-third raises questions of both acceptability and timing of cognitive behavioural interventions.
Derivative pricing with non-linear Fokker-Planck dynamics
NASA Astrophysics Data System (ADS)
Michael, Fredrick; Johnson, M. D.
2003-06-01
We examine how the Black-Scholes derivative pricing formula is modified when the underlying security obeys non-extensive statistics and Fokker-Planck dynamics. An unusual feature of such securities is that the volatility in the underlying Ito-Langevin equation depends implicitly on the actual market rate of return. This complicates most approaches to valuation. Here we show that progress is possible using variations of the Cox-Ross valuation technique.
Measuring the Fractal Dimensions of Empirical Cartographic Curves,
1982-01-01
SECURITY CLASSIFICATION OF THIS PAGE (URifu Detso".4 _________________ of REPRi CaM§ rtorp Cu S. GOTACSINN. RPIEMN’ CAOG HUPORu R 7. AUTNORrq...AgencyI.NMEROPAS St. Louis APS, MO 63118 ______________ 14. MONITORING AGENCY NAME & ADDRESS(It different bom Cmntrolling Office) Is. SECURITY CLASS. (of Oio~I...approximated. Potential applications for this todNtlqu Include a new means for curvilinear data compresion description of plankmetric feature boundary
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Holograms and authentication: meeting future demands
NASA Astrophysics Data System (ADS)
Lancaster, Ian M.
2004-06-01
The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.
Nevada National Security Site Environmental Report 2012 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy A
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2016, Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2013 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less