Sample records for baseline multi-level secure

  1. Food security among individuals experiencing homelessness and mental illness in the At Home/Chez Soi Trial.

    PubMed

    O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi

    2017-08-01

    Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.

  2. Smashing the Stovepipe: Leveraging the GMSEC Open Architecture and Advanced IT Automation to Rapidly Prototype, Develop and Deploy Next-Generation Multi-Mission Ground Systems

    NASA Technical Reports Server (NTRS)

    Swenson, Paul

    2017-01-01

    Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and allows components to aggregate data across multiple homogeneous or heterogeneous satellites or payloads - The highly-successful Goddard Science and Planetary Operations Control Center (SPOCC) utilizes GMSEC as the hub for it's automation and situational awareness capability Shifts focus towards getting GS to a final configuration-managed baseline, as well as multi-mission / big-picture capabilities that help increase situational awareness, promote cross-mission sharing and establish enhanced fleet management capabilities across all levels of the enterprise.

  3. Food security is related to adult type 2 diabetes control over time in a United States safety net primary care clinic population.

    PubMed

    Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E

    2017-05-15

    Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high health-care utilization and cost.

  4. GPs' role security and therapeutic commitment in managing alcohol problems: a randomised controlled trial of a tailored improvement programme.

    PubMed

    Keurhorst, Myrna; van Beurden, Ivonne; Anderson, Peter; Heinen, Maud; Akkermans, Reinier; Wensing, Michel; Laurant, Miranda

    2014-04-17

    General practitioners with more positive role security and therapeutic commitment towards patients with hazardous or harmful alcohol consumption are more involved and manage more alcohol-related problems than others. In this study we evaluated the effects of our tailored multi-faceted improvement implementation programme on GPs' role security and therapeutic commitment and, in addition, which professional related factors influenced the impact of the implementation programme. In a cluster randomised controlled trial, 124 GPs from 82 Dutch general practices were randomised to either the intervention or control group. The tailored, multi-faceted programme included combined physician, organisation, and patient directed alcohol-specific implementation strategies to increase role security and therapeutic commitment in GPs. The control group was mailed the national guideline and patients received feedback letters. Questionnaires were completed before and 12 months after start of the programme. We performed linear multilevel regression analysis to evaluate effects of the implementation programme. Participating GPs were predominantly male (63%) and had received very low levels of alcohol related education before start of the study (0.4 h). The programme increased therapeutic commitment (p = 0.005; 95%-CI 0.13 - 0.73) but not role security (p = 0.58; 95%-CI -0.31 - 0.54). How important GPs thought it was to improve their care for problematic alcohol consumption, and the GPs' reported proportion of patients asked about alcohol consumption at baseline, contributed to the effect of the programme on therapeutic commitment. A tailored, multi-faceted programme aimed at improving GP management of patients with hazardous and harmful alcohol consumption improved GPs' therapeutic commitment towards patients with alcohol-related problems, but failed to improve GPs' role security. How important GPs thought it was to improve their care for problematic alcohol consumption, and the GPs' reported proportion of patients asked about alcohol consumption at baseline, both increased the impact of the programme on therapeutic commitment. It might be worthwhile to monitor proceeding of role security and therapeutic commitment throughout the year after the implementation programme, to see whether the programme is effective on short term but faded out on the longer term. ClinicalTrials.gov Identifier: NCT00298220.

  5. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    States has never operated at a threat level lower than blue - guarded risk. The Homeland Security Advisory Council’s primary recommendations included...changing the alert level baseline to blue (guarded risk). Their rationale for resetting the threat level baseline includes acknowledging that a...accustomed to the guarded blue level indicative of a general threat of terrorist attack. To assume that public officials and citizens would ever

  6. Hard x-ray imager for the NeXT mission

    NASA Astrophysics Data System (ADS)

    Nakazawa, Kazuhiro; Fukazawa, Yasushi; Kamae, Tuneyoshi; Kataoka, Jun; Kokubun, Motohide; Makishima, Kazuo; Mizuno, Tsunefumi; Murakami, Toshio; Nomachi, Masaharu; Tajima, Hiroyasu; Takahashi, Tadayuki; Tashiro, Makoto; Tamagawa, Toru; Terada, Yukikatsu; Watanabe, Shin; Yamaoka, Kazutaka; Yonetoku, Daisuke

    2006-06-01

    The hard X-ray imager (HXI) is the primary detector of the NeXT mission, proposed to explore high-energy non-thermal phenomena in the universe. Combined with a novel hard X-ray mirror optics, the HXI is designed to provide better than arc-minutes imaging capability with 1 keV level spectroscopy, and more than 30 times higher sensitivity compared with any existing hard X-ray instruments. The base-line design of the HXI is improving to secure high sensitivity. The key is to reduce the detector background as far as possible. Based on the experience of the Suzaku satellite launched in July 2005, the current design has a well-type tight active shield and multi layered, multi material imaging detector made of Si and CdTe. Technology has been under development for a few years so that we have reached the level where a basic detector performance is satisfied. Design tuning to further improve the sensitivity and reliability is on-going.

  7. Effects of a Brief Psychoeducational Intervention for Family Conflict: Constructive Conflict, Emotional Insecurity and Child Adjustment.

    PubMed

    Miller-Graff, Laura E; Cummings, E Mark; Bergman, Kathleen N

    2016-10-01

    The role of emotional security in promoting positive adjustment following exposure to marital conflict has been identified in a large number of empirical investigations, yet to date, no interventions have explicitly addressed the processes that predict child adjustment after marital conflict. The current study evaluated a randomized controlled trial of a family intervention program aimed at promoting constructive marital conflict behaviors thereby increasing adolescent emotional security and adjustment. Families (n = 225) were randomized into 1 of 4 conditions: Parent-Adolescent (n = 75), Parent-Only (n = 75), Self-Study (n = 38) and No Treatment (n = 37). Multi-informant and multi-method assessments were conducted at baseline, post-treatment and 6-month follow-up. Effects of treatment on destructive and constructive conflict behaviors were evaluated using multilevel models where observations were nested within individuals over time. Process models assessing the impact of constructive and destructive conflict behaviors on emotional insecurity and adolescent adjustment were evaluated using path modeling. Results indicated that the treatment was effective in increasing constructive conflict behaviors (d = 0.89) and decreasing destructive conflict behaviors (d = -0.30). For the Parent-Only Group, post-test constructive conflict behaviors directly predicted lower levels of adolescent externalizing behaviors at 6-month follow-up. Post-test constructive conflict skills also indirectly affected adolescent internalizing behaviors through adolescent emotional security. These findings support the use of a brief psychoeducational intervention in improving post-treatment conflict and emotional security about interparental relationships.

  8. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  9. Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future

    NASA Astrophysics Data System (ADS)

    Missal, D.

    2012-09-01

    The Intelligence Reform and Terrorism Prevention Act, passed by Congress in 2004, established the expectation that the "vast intelligence enterprise" of the United States would become more unified, coordinated, and effective. This law charged the intelligence community and government agencies to integrate foreign intelligence and domestic US intelligence components to reduce gaps in understanding threats to our national security and to improve our reaction. This intelligence strategy — designed to provide more comprehensive and accurate intelligence analysis—substantially increases requirements for secure data sharing capabilities. An information system must be Certified & Accredited (C&A) by the appropriate Accreditation Authority in accordance with each Authority's prescribed compliance requirements and governance. Cross-Domain Solutions (CDSs) can provide the ability to share data between multiple operating domains (e.g. among users on Top Secret and Secret networks). However, sharing sensitive data across security domains and networks has been impeded by both technical and cultural challenges. A viable CDS requires a tremendous investment for initial C&A and many solutions are limited with respect to the integration of an organization's applications. As a result, most of today's highly secured systems have been designed to restrict access to entire user populations rather than implement data sharing on the basis of mandatory access controls and an individual's need-to-know. Most CDSs today are based on one-way replication through data transfer guards that copy data from one network to another. This model inherently builds in additional and extensive Operations and Maintenance (O&M) costs. Oracle's National Security Group challenged its top engineers and security architects to engineer the first Cross-Domain database providing a practical and robust solution to the Cross-Domain security problem. The result is the MLSpOC, which is deployed, fielded, and accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.

  10. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

    NASA Astrophysics Data System (ADS)

    Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.

  11. Effect of a multi-level education intervention model on knowledge and attitudes of accidental injuries in rural children in Zunyi, Southwest China.

    PubMed

    Cao, Bo-Ling; Shi, Xiu-Quan; Qi, Yong-Hong; Hui, Ya; Yang, Hua-Jun; Shi, Shang-Peng; Luo, Li-Rong; Zhang, Hong; Wang, Xin; Yang, Ying-Ping

    2015-04-08

    To explore the effect of a school-family-individual (SFI) multi-level education intervention model on knowledge and attitudes about accidental injuries among school-aged children to improve injury prevention strategies and reduce the incidence of pediatric injuries. The random sample of rural school-aged children were recruited by using a multistage, stratified, cluster sampling method in Zunyi, Southwest China from 2012 to 2014, and 2342 children were randomly divided into intervention and control groups. Then children answered a baseline survey to collect knowledge and attitude scores (KAS) of accidental injuries. In the intervention group, children, their parents/guardians and the school received a SFI multi-level education intervention, which included a children's injury-prevention poster at schools, an open letter about security instruction for parents/guardians and multiple-media health education (Microsoft PowerPoint lectures, videos, handbooks, etc.) to children. Children in the control group were given only handbook education. After 16 months, children answered a follow-up survey to collect data on accidental injury types and accidental injury-related KAS for comparing the intervention and control groups and baseline and follow-up data. The distribution of gender was not significantly different while age was different between the baseline and follow-up survey. At baseline, the mean KAS was lower for the intervention than control group (15.37 ± 3.40 and 18.35 ± 5.01; p < 0.001). At follow-up, the mean KAS was higher for the intervention than control group (21.16 ± 3.05 and 20.02 ± 3.40; p < 0.001). The increase in KAS in the intervention and control groups was significant (p < 0.001; KAS: 5.79 vs. 1.67) and suggested that children's injury-related KAS improved in the intervention group. Moreover, the KAS between the groups differed for most subtypes of incidental injuries (based on International Classification of Diseases 10, ICD-10) (p < 0.05). Before intervention, 350 children had reported their accident injury episodes, while after intervention 237 children had reported their accidental injury episodes in the follow-up survey. SFI multi-level education intervention could significantly increase KAS for accidental injuries, which should improve children's prevention-related knowledge and attitudes about such injuries. It should help children change their risk behaviors and reduce the incidence of accidental injuries. Our results highlight a new intervention model of injury prevention among school-aged children.

  12. Vitamin D in patients with intellectual and developmental disability in secure in-patient services in the North of England, UK.

    PubMed

    McKinnon, Iain; Lewis, Thomas; Mehta, Naomi; Imrit, Shahed; Thorp, Julie; Ince, Chris

    2018-02-01

    Aims and method To assess the benefits of the introduction of routine vitamin D serum sampling for all patients admitted to a secure in-patient hospital in the North of England providing medium security, low security and rehabilitation services for offenders with intellectual and developmental disability. The vitamin D levels of 100 patients were analysed at baseline. Those with insufficient or deficient levels were offered treatment and retested after 1 year. Vitamin D levels were analysed in the context of level of security, seasonality of test and co-prescription of psychotropic medications. Eighty-three per cent of patients had suboptimal vitamin D levels at initial test (41% deficient and 42% insufficient). This was seen among established patients and new admissions. Regression analysis of baseline vitamin D levels revealed no differences for levels of security, seasonality, whether patients were taking antipsychotic or anticonvulsant medication, or length of stay. Patients with deficiency or insufficiency were all offered supplementation. Those who opted in had significantly higher vitamin D levels at follow-up, compared with those who declined treatment. Clinical implications Established and newly admitted patients in our secure mental health services had substantial levels of vitamin D insufficiency. In the light of the morbidities that are associated with deficient vitamin D levels, routine screening and the offer of supplementation is advisable. Declaration of interest None.

  13. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    NASA Astrophysics Data System (ADS)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  14. Caspian Sea Environmental Security Game: 16-17 November 1998

    DTIC Science & Technology

    1999-07-01

    17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R . Shaw Environmental Baseline...threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY PALUSZKIEWICZ SUSAN A. THOMAS...Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include evaporation (E), and discharge of water

  15. Firewall systems: the next generation

    NASA Astrophysics Data System (ADS)

    McGhie, Lynda L.

    1996-01-01

    To be competitive in today's globally connected marketplace, a company must ensure that their internal network security methodologies and supporting policies are current and reflect an overall understanding of today's technology and its resultant threats. Further, an integrated approach to information security should ensure that new ways of sharing information and doing business are accommodated; such as electronic commerce, high speed public broadband network services, and the federally sponsored National Information Infrastructure. There are many challenges, and success is determined by the establishment of a solid and firm baseline security architecture that accommodate today's external connectivity requirements, provides transitional solutions that integrate with evolving and dynamic technologies, and ultimately acknowledges both the strategic and tactical goals of an evolving network security architecture and firewall system. This paper explores the evolution of external network connectivity requirements, the associated challenges and the subsequent development and evolution of firewall security systems. It makes the assumption that a firewall is a set of integrated and interoperable components, coming together to form a `SYSTEM' and must be designed, implement and managed as such. A progressive firewall model will be utilized to illustrates the evolution of firewall systems from earlier models utilizing separate physical networks, to today's multi-component firewall systems enabling secure heterogeneous and multi-protocol interfaces.

  16. Mixed-Method Quasi-Experimental Study of Outcomes of a Large-Scale Multilevel Economic and Food Security Intervention on HIV Vulnerability in Rural Malawi.

    PubMed

    Weinhardt, Lance S; Galvao, Loren W; Yan, Alice F; Stevens, Patricia; Mwenyekonde, Thokozani Ng'ombe; Ngui, Emmanuel; Emer, Lindsay; Grande, Katarina M; Mkandawire-Valhmu, Lucy; Watkins, Susan C

    2017-03-01

    The objective of the Savings, Agriculture, Governance, and Empowerment for Health (SAGE4Health) study was to evaluate the impact of a large-scale multi-level economic and food security intervention on health outcomes and HIV vulnerability in rural Malawi. The study employed a quasi-experimental non-equivalent control group design to compare intervention participants (n = 598) with people participating in unrelated programs in distinct but similar geographical areas (control, n = 301). We conducted participant interviews at baseline, 18-, and 36-months on HIV vulnerability and related health outcomes, food security, and economic vulnerability. Randomly selected households (n = 1002) were interviewed in the intervention and control areas at baseline and 36 months. Compared to the control group, the intervention led to increased HIV testing (OR 1.90; 95 % CI 1.29-2.78) and HIV case finding (OR = 2.13; 95 % CI 1.07-4.22); decreased food insecurity (OR = 0.74; 95 % CI 0.63-0.87), increased nutritional diversity, and improved economic resilience to shocks. Most effects were sustained over a 3-year period. Further, no significant differences in change were found over the 3-year study period on surveys of randomly selected households in the intervention and control areas. Although there were general trends toward improvement in the study area, only intervention participants' outcomes were significantly better. Results indicate the intervention can improve economic and food security and HIV vulnerability through increased testing and case finding. Leveraging the resources of economic development NGOs to deliver locally-developed programs with scientific funding to conduct controlled evaluations has the potential to accelerate the scientific evidence base for the effects of economic development programs on health.

  17. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    PubMed

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  18. Multicore Architectures for Multiple Independent Levels of Security Applications

    DTIC Science & Technology

    2012-09-01

    to bolster the MILS effort. However, current MILS operating systems are not designed for multi-core platforms. They do not have the hardware support...current MILS operating systems are not designed for multi‐core platforms. They do not have the hardware support to ensure that the separation...the availability of information at different security classification levels while increasing the overall security of the computing system . Due to the

  19. School Security and Student Misbehavior: A Multi-Level Examination

    ERIC Educational Resources Information Center

    Servoss, Timothy J.

    2017-01-01

    Despite a nationwide trend to increase security measures in schools, their effectiveness in reducing or preventing student misbehavior remains largely unexamined. In addition, there is concern that increased security may have unintended negative side effects and is applied inequitably across students of disparate racial/ethnic backgrounds. The…

  20. DEM generation in cloudy-rainy mountainous area with multi-baseline SAR interferometry

    NASA Astrophysics Data System (ADS)

    Wu, Hong'an; Zhang, Yonghong; Jiang, Decai; Kang, Yonghui

    2018-03-01

    Conventional singe baseline InSAR is easily affected by atmospheric artifacts, making it difficult to generate highprecision DEM. To solve this problem, in this paper, a multi-baseline interferometric phase accumulation method with weights fixed by coherence is proposed to generate higher accuracy DEM. The mountainous area in Kunming, Yunnan Province, China is selected as study area, which is characterized by cloudy weather, rugged terrain and dense vegetation. The multi-baseline InSAR experiments are carried out by use of four ALOS-2 PALSAR-2 images. The generated DEM is evaluated by Chinese Digital Products of Fundamental Geographic Information 1:50000 DEM. The results demonstrate that: 1) the proposed method can reduce atmospheric artifacts significantly; 2) the accuracy of InSAR DEM generated by six interferograms satisfies the standard of 1:50000 DEM Level Three and American DTED-1.

  1. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  2. Bio-mining for biomarkers with a multi-resolution block chain

    NASA Astrophysics Data System (ADS)

    Jenkins, Jeffrey; Kopf, Jarad; Tran, Binh Q.; Frenchi, Christopher; Szu, Harold

    2015-05-01

    In this paper, we discuss a framework for bridging the gap between security and medical Large Data Analysis (LDA) with functional- biomarkers. Unsupervised Learning for individual e-IQ & IQ relying on memory eliciting (i.e. scent, grandmother images) and IQ baseline profiles could further enhance the ability to uniquely identify and properly diagnose individuals. Sub-threshold changes in a common/probable biomedical biomarker (disorders) means that an individual remains healthy, while a martingale would require further investigation and more measurements taken to determine credibility. Empirical measurements of human actions can discover anomalies hidden in data, which point to biomarkers revealed through stimulus response. We review the approach for forming a single-user baseline having 1-d devices and a scale-invariant representation for N users each (i) having N*d(i) total devices. Such a fractal representation of human-centric data provides self-similar levels information and relationships which are useful for diagnosis and identification causality anywhere from a mental disorder to a DNA match. Biomarkers from biomedical devices offer a robust way to collect data. Biometrics could be envisioned as enhanced and personalized biomedical devices (e.g. typing fist), but used for security. As long as the devices have a shared context origin, useful information can be found by coupling the sensors. In the case of the electroencephalogram (EEG), known patterns have emerged in low frequency Delta Theta Alpha Beta-Gamma (DTAB-G) waves when an individual views a familiar picture in the visual cortex which is shown on EEGs as a sharp peak. Using brainwaves as a functional biomarker for security can lead the industry to create more secure sessions by allowing not only passwords but also visual stimuli and/or keystrokes coupled with EEG to capture and stay informed about real time user e-IQ/IQ data changes. This holistic Computer Science (CS) Knowledge Discovery in Databases, Data Mining (KDD, DM) approach seeks to merge the fields having a shared data origin - biomarkers revealed through stimulus response.

  3. Secure distribution for high resolution remote sensing images

    NASA Astrophysics Data System (ADS)

    Liu, Jin; Sun, Jing; Xu, Zheng Q.

    2010-09-01

    The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.

  4. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    PubMed

    Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G

    2012-07-13

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.

  5. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20

    PubMed Central

    2012-01-01

    Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'. PMID:22794187

  6. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    DTIC Science & Technology

    2006-05-04

    policy violation with respect to: Security Safety Financial Posture Infrastructure The IATF identifies five levels: V1: Negligible effect V2: Minimal...MLS) Infrastructure Step 2: Determine Threat Levels Best practices also in the IATF Threats are ranked by assessing: Capability Resources Motivation...Risk Willingness The IATF identifies seven levels: T1: Inadvertent or accidental events Tripping over a power cord T2: Minimal resources – willing to

  7. Essential Resources for Implementation and Sustainability of Evidence-Based Health Promotion Programs: A Mixed Methods Multi-Site Case Study.

    PubMed

    Dattalo, M; Wise, M; Ford Ii, J H; Abramson, B; Mahoney, J

    2017-04-01

    As of October 2016, use of federal Older Americans Act funds for health promotion and disease prevention will be restricted to the Administration on Aging's criteria for high-level evidence-based health promotion programs. Dissemination of these programs to rural communities remains limited. Therefore a strong need exists to identify strategies that facilitate program implementation and sustainability. The objective of this study was to compare organizational readiness and implementation strategies used by rural communities that achieved varying levels of success in sustaining evidence-based health promotion programs for older adults. We utilized a qualitative multi-site case study design to analyze the longitudinal experiences of eight rural sites working to implement evidence-based health promotion program over 3 years (8/2012-7/2015). Multiple sources of data (interviews, documents, reports, surveys) from each site informed the analysis. We used conventional content analysis to conduct a cross-case comparison to identify common features of rural counties that successfully implemented and sustained their target evidence-based health promotion program. Readiness to implement evidence-based programs as low at baseline as all site leaders described needing to secure additional resources for program implementation. Sites that successfully utilized six essential resources implemented and sustained greater numbers of workshops: (1) External Partnerships, (2) Agency Leadership Commitment, (3) Ongoing Source of Workshop Leaders, (4) Health Promotion Coordination Tasks Assigned to Specific Staff, (5) Organizational Stability, and (6) Change Team Engagement. The six essential resources described in this study can help rural communities assess their readiness to implement health promotion programs and work secure the resources necessary for successful implementation.

  8. Caspian Sea International Environmental Security Game. Held at Carlisle Barracks, Pennsylvania on 16-17 November 1998

    DTIC Science & Technology

    1999-07-01

    Environmental Security . . . . . . . . . . . . . . . . . . . . 17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R ...choke point near Baku, posing a threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY...up to 70% of the seasonal Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include

  9. Links between early baseline cortisol, attachment classification, and problem behaviors: A test of differential susceptibility versus diathesis-stress.

    PubMed

    Fong, Michelle C; Measelle, Jeffrey; Conradt, Elisabeth; Ablow, Jennifer C

    2017-02-01

    The purpose of the current study was to predict concurrent levels of problem behaviors from young children's baseline cortisol and attachment classification, a proxy for the quality of caregiving experienced. In a sample of 58 children living at or below the federal poverty threshold, children's baseline cortisol levels, attachment classification, and problem behaviors were assessed at 17 months of age. We hypothesized that an interaction between baseline cortisol and attachment classification would predict problem behaviors above and beyond any main effects of baseline cortisol and attachment. However, based on limited prior research, we did not predict whether or not this interaction would be more consistent with diathesis-stress or differential susceptibility models. Consistent with diathesis-stress theory, the results indicated no significant differences in problem behavior levels among children with high baseline cortisol. In contrast, children with low baseline cortisol had the highest level of problem behaviors in the context of a disorganized attachment relationship. However, in the context of a secure attachment relationship, children with low baseline cortisol looked no different, with respect to problem behavior levels, then children with high cortisol levels. These findings have substantive implications for the socioemotional development of children reared in poverty. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  11. 77 FR 71431 - New Agency Information Collection Activity Under OMB Review: Highway Baseline Assessment for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Collection Activity Under OMB Review: Highway Baseline Assessment for Security Enhancement (BASE) Program... Assessment for Security Enhancement (BASE) Program. Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Highway Baseline Assessment for Security Enhancement (BASE). Affected Public...

  12. Evaluation of multi-level social learning for sustainable landscapes: perspective of a development initiative in Bergslagen, Sweden.

    PubMed

    Axelsson, Robert; Angelstam, Per; Myhrman, Lennart; Sädbom, Stefan; Ivarsson, Milis; Elbakidze, Marine; Andersson, Kenneth; Cupa, Petr; Diry, Christian; Doyon, Frederic; Drotz, Marcus K; Hjorth, Arne; Hermansson, Jan Olof; Kullberg, Thomas; Lickers, F Henry; McTaggart, Johanna; Olsson, Anders; Pautov, Yurij; Svensson, Lennart; Törnblom, Johan

    2013-03-01

    To implement policies about sustainable landscapes and rural development necessitates social learning about states and trends of sustainability indicators, norms that define sustainability, and adaptive multi-level governance. We evaluate the extent to which social learning at multiple governance levels for sustainable landscapes occur in 18 local development initiatives in the network of Sustainable Bergslagen in Sweden. We mapped activities over time, and interviewed key actors in the network about social learning. While activities resulted in exchange of experiences and some local solutions, a major challenge was to secure systematic social learning and make new knowledge explicit at multiple levels. None of the development initiatives used a systematic approach to secure social learning, and sustainability assessments were not made systematically. We discuss how social learning can be improved, and how a learning network of development initiatives could be realized.

  13. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  14. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    PubMed

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  15. Video calls from lay bystanders to dispatch centers - risk assessment of information security

    PubMed Central

    2011-01-01

    Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387

  16. Improved Topographic Mapping Through Multi-Baseline SAR Interferometry with MAP Estimation

    NASA Astrophysics Data System (ADS)

    Dong, Yuting; Jiang, Houjun; Zhang, Lu; Liao, Mingsheng; Shi, Xuguo

    2015-05-01

    There is an inherent contradiction between the sensitivity of height measurement and the accuracy of phase unwrapping for SAR interferometry (InSAR) over rough terrain. This contradiction can be resolved by multi-baseline InSAR analysis, which exploits multiple phase observations with different normal baselines to improve phase unwrapping accuracy, or even avoid phase unwrapping. In this paper we propose a maximum a posteriori (MAP) estimation method assisted by SRTM DEM data for multi-baseline InSAR topographic mapping. Based on our method, a data processing flow is established and applied in processing multi-baseline ALOS/PALSAR dataset. The accuracy of resultant DEMs is evaluated by using a standard Chinese national DEM of scale 1:10,000 as reference. The results show that multi-baseline InSAR can improve DEM accuracy compared with single-baseline case. It is noteworthy that phase unwrapping is avoided and the quality of multi-baseline InSAR DEM can meet the DTED-2 standard.

  17. The governance dimensions of water security: a review.

    PubMed

    Bakker, Karen; Morinville, Cynthia

    2013-11-13

    Water governance is critical to water security, and to the long-term sustainability of the Earth's freshwater systems. This review examines recent debates regarding the governance dimensions of water security, including adaptive governance, polycentric governance, social learning and multi-level governance. The analysis emphasizes the political and institutional dimensions of water governance, and explores the relevance of social power-an overlooked yet important aspect of the water security debate. In addition, the review explores the intersection and potential synergies between water governance perspectives and risk-based approaches to water security, and offers critiques and suggestions for further research questions and agendas.

  18. Associations of Neighborhood Crime and Safety and With Changes in Body Mass Index and Waist Circumference: The Multi-Ethnic Study of Atherosclerosis.

    PubMed

    Powell-Wiley, Tiffany M; Moore, Kari; Allen, Norrina; Block, Richard; Evenson, Kelly R; Mujahid, Mahasin; Diez Roux, Ana V

    2017-08-01

    Using data from the Multi-Ethnic Study of Atherosclerosis (MESA), we evaluated associations of neighborhood crime and safety with changes in adiposity (body mass index (BMI) and waist circumference). MESA is a longitudinal study of cardiovascular disease among adults aged 45-84 years at baseline in 2000-2002, from 6 US sites, with follow-up for MESA participants until 2012. Data for this study were limited to Chicago, Illinois, participants in the MESA Neighborhood Ancillary Study, for whom police-recorded crime data were available, and who had complete baseline data (n = 673). We estimated associations of individual-level safety, aggregated neighborhood-level safety, and police-recorded crime with baseline levels and trajectories of BMI and waist circumference over time using linear mixed modeling with random effects. We also estimated how changes in these factors related to changes in BMI and waist circumference using econometric fixed-effects models. At baseline, greater individual-level safety was associated with more adiposity. Increasing individual- and neighborhood-level safety over time were associated with decreasing BMI over the 10-year period, with a more pronounced effect observed in women for individual-level safety and men for neighborhood-level safety. Police-recorded crime was not associated with adiposity. Neighborhood-level safety likely influences adiposity change and subsequent cardiovascular risk in multiethnic populations. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  19. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    PubMed

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  20. School Security Measures and Extracurricular Participation: An Exploratory Multi-Level Analysis

    ERIC Educational Resources Information Center

    Mowen, Thomas J.; Manierre, Matthew J.

    2017-01-01

    Although delinquency in US schools is near historic lows, concern over delinquency in US schools remains a pressing issue among school officials, parents, and policy-makers. Many scholars argue that the current approach to discipline in the United States is highly punitive. While some projects have assessed the effect of punitive security on…

  1. Construction of Covariance Functions with Variable Length Fields

    NASA Technical Reports Server (NTRS)

    Gaspari, Gregory; Cohn, Stephen E.; Guo, Jing; Pawson, Steven

    2005-01-01

    This article focuses on construction, directly in physical space, of three-dimensional covariance functions parametrized by a tunable length field, and on an application of this theory to reproduce the Quasi-Biennial Oscillation (QBO) in the Goddard Earth Observing System, Version 4 (GEOS-4) data assimilation system. These Covariance models are referred to as multi-level or nonseparable, to associate them with the application where a multi-level covariance with a large troposphere to stratosphere length field gradient is used to reproduce the QBO from sparse radiosonde observations in the tropical lower stratosphere. The multi-level covariance functions extend well-known single level covariance functions depending only on a length scale. Generalizations of the first- and third-order autoregressive covariances in three dimensions are given, providing multi-level covariances with zero and three derivatives at zero separation, respectively. Multi-level piecewise rational covariances with two continuous derivatives at zero separation are also provided. Multi-level powerlaw covariances are constructed with continuous derivatives of all orders. Additional multi-level covariance functions are constructed using the Schur product of single and multi-level covariance functions. A multi-level powerlaw covariance used to reproduce the QBO in GEOS-4 is described along with details of the assimilation experiments. The new covariance model is shown to represent the vertical wind shear associated with the QBO much more effectively than in the baseline GEOS-4 system.

  2. Changes in the Built Environment and Changes in the Amount of Walking Over Time: Longitudinal Results From the Multi-Ethnic Study of Atherosclerosis

    PubMed Central

    Hirsch, Jana A.; Moore, Kari A.; Clarke, Philippa J.; Rodriguez, Daniel A.; Evenson, Kelly R.; Brines, Shannon J.; Zagorski, Melissa A.; Diez Roux, Ana V.

    2014-01-01

    Lack of longitudinal research hinders causal inference on the association between the built environment and walking. In the present study, we used data from 6,027 adults in the Multi-Ethnic Study of Atherosclerosis who were 45–84 years of age at baseline to investigate the association of neighborhood built environment with trends in the amount of walking between 2000 and 2012. Walking for transportation and walking for leisure were assessed at baseline and at 3 follow-up visits (median follow-up = 9.15 years). Time-varying built environment measures (measures of population density, land use, number of destinations, bus access, and street connectivity) were created using geographic information systems. We used linear mixed models to estimate the associations between baseline levels of and a change in each built environment feature and a change in the frequency of walking. After adjustment for potential confounders, we found that higher baseline levels of population density, area zoned for retail, social destinations, walking destinations, and street connectivity were associated with greater increases in walking for transportation over time. Higher baseline levels of land zoned for residential use and distance to buses were associated with less pronounced increases (or decreases) in walking for transportation over time. Increases in the number of social destinations, the number of walking destinations, and street connectivity over time were associated with greater increases in walking for transportation. Higher baseline levels of both land zoned for retail and walking destinations were associated with greater increases in leisure walking, but no changes in built environment features were associated with leisure walking. The creation of mixed-use, dense developments may encourage adults to incorporate walking for transportation into their everyday lives. PMID:25234431

  3. Securing support for eye health policy in low- and middle-income countries: identifying stakeholders through a multi-level analysis.

    PubMed

    Morone, Piergiuseppe; Camacho Cuena, Eva; Kocur, Ivo; Banatvala, Nicholas

    2014-05-01

    This article empirically evaluates advocacy in low- and middle-income countries as a key tool for raising policy priority and securing high-level decision maker support in eye health. We used a unique data set based on a survey conducted by World Health Organization in 2011 on eye care and prevention of blindness in 82 low- and middle-income countries. The theoretical framework derives from the idea that a plethora of stakeholders at local and global level pressure national governments, acting in economic and the political spheres. Previously, eye care has not been investigated in such a framework. We found structural differences across countries with different income levels and proposed policy recommendations to secure high-level decision makers' support for promoting eye health. Three case studies suggest that, in order to secure more support and resources for eye health, domestic and international stakeholders must strengthen their engagement with ministries of health at political and above all economic levels.

  4. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  5. Using Multi-Component Consultation to Increase the Integrity with Which Teachers Implement Behavioral Classroom Interventions: A Pilot Study

    ERIC Educational Resources Information Center

    Owens, Julie Sarno; Coles, Erika K.; Evans, Steven W.; Himawan, Lina K.; Girio-Herrera, Erin; Holdaway, Alex S.; Zoromski, Allison K.; Schamberg, Terah; Schulte, Ann

    2017-01-01

    The goal of this pilot study was to evaluate the effectiveness of a multi-component consultation package in improving teachers' classroom management skills, particularly among teachers with lower baseline levels of knowledge, skills, and intervention-supportive beliefs. Participants were 58 elementary school teachers (93% female; 50% Non-Hispanic…

  6. In vivo optimisation study for multi-baseline MR-based thermometry in the context of hyperthermia using MR-guided high intensity focused ultrasound for head and neck applications.

    PubMed

    Pichardo, Samuel; Köhler, Max; Lee, Justin; Hynnyen, Kullervo

    2014-12-01

    In this in vivo study, the feasibility to perform hyperthermia treatments in the head and neck using magnetic resonance image-guided high intensity focused ultrasound (MRgHIFU) was established using a porcine acute model. Porcine specimens with a weight between 17 and 18 kg were treated in the omohyoid muscle in the neck. Hyperthermia was applied with a target temperature of 41 °C for 30 min using a Sonalleve MRgHIFU system. MR-based thermometry was calculated using water-proton resonance frequency shift and multi-baseline look-up tables indexed by peak-to-peak displacement (Dpp) measurements using a pencil-beam navigator. Three hyperthermia experiments were conducted at different Dpp values of 0.2, 1.0 and 3.0 mm. An optimisation study was carried out to establish the optimal parameters controlling the multi-baseline method that ensured a minimisation of spatial-average peak-to-peak temperature (TSA-pp) and temperature direct current bias (TSA-DC). The multi-baseline technique reduced considerably the noise on both TSA-pp and TSA-DC. The reduction of noise was more important when Dpp was higher. For Dpp = 3 mm the average (±standard deviation (SD)) of TSA-pp and TSA-DC was reduced from 4.5 (± 2.5) and 2.5 (±0.6) °C, respectively, to 0.8 (± 0.7) and 0.09 (± 0.2) °C. This in vivo study showed the level of noise in PRFS-based thermometry introduced by respiratory motion in the context of MRgHIFU hyperthermia treatment for head and neck and the feasibility of reducing this noise using a multi-baseline technique.

  7. Epithelial perturbation by inhaled chlorine: Multi-scale mechanistic modeling in rats and humans

    EPA Science Inventory

    Chlorine is a high-production volume, hazardous air pollutant and irritant gas of interest to homeland security. Thus, scenarios of interest for risk characterization range from acute high-level exposures to lower-level chronic exposures. Risk assessment approaches to estimate ...

  8. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  9. Assessment on security system of radioactive sources used in hospitals of Thailand

    NASA Astrophysics Data System (ADS)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  10. Association of baseline sex hormone levels with baseline and longitudinal changes in waist-to-hip ratio: Multi-Ethnic Study of Atherosclerosis.

    PubMed

    Vaidya, D; Dobs, A; Gapstur, S M; Golden, S H; Cushman, M; Liu, K; Ouyang, P

    2012-12-01

    Waist-to-hip ratio (WHR) is strongly associated with prevalent atherosclerosis. We analyzed the associations of baseline serum levels of testosterone (T), estradiol (E2), sex-hormone-binding globulin (SHBG) and dehydroepiandrosterone (DHEA) with WHR in the Multi-Ethnic Study of Atherosclerosis (MESA) cohort. Baseline data was available for 3144 men and 2038 postmenopausal women, who were non-users of hormone therapy, who were 45-84 years of age, and of White, Chinese, Black or Hispanic racial/ethnic groups. Of these, 2708 men and 1678 women also had longitudinal measurements of WHR measured at the second and/or the third study visits (median follow-up 578 days and 1135 days, respectively). In cross-sectional analyses adjusted for age, race and cardiovascular disease risk factors, T was negatively associated with baseline WHR in men, whereas in both sexes, E2 was positively associated and SHBG was negatively associated with WHR (all P<0.001). In longitudinal analyses, further adjusted for follow-up time and baseline WHR, baseline T was negatively associated with WHR at follow-up (P=0.001) in men, whereas in both sexes, E2 was positively associated (P=0.004) and SHBG was negatively associated with WHR (P<0.001). The longitudinal association of E2, but not T, was independent of SHBG. In cross-sectional or longitudinal analyses, there were no associations between DHEA and WHR in either men or women. Sex hormones are associated with WHR at baseline and also during follow-up above and beyond their baseline association. Future research is needed to determine if manipulation of hormones is associated with changes in central obesity.

  11. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    PubMed

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.

  12. Design of shared unit-dose drug distribution network using multi-level particle swarm optimization.

    PubMed

    Chen, Linjie; Monteiro, Thibaud; Wang, Tao; Marcon, Eric

    2018-03-01

    Unit-dose drug distribution systems provide optimal choices in terms of medication security and efficiency for organizing the drug-use process in large hospitals. As small hospitals have to share such automatic systems for economic reasons, the structure of their logistic organization becomes a very sensitive issue. In the research reported here, we develop a generalized multi-level optimization method - multi-level particle swarm optimization (MLPSO) - to design a shared unit-dose drug distribution network. Structurally, the problem studied can be considered as a type of capacitated location-routing problem (CLRP) with new constraints related to specific production planning. This kind of problem implies that a multi-level optimization should be performed in order to minimize logistic operating costs. Our results show that with the proposed algorithm, a more suitable modeling framework, as well as computational time savings and better optimization performance are obtained than that reported in the literature on this subject.

  13. Morphing Wing Weight Predictors and Their Application in a Template-Based Morphing Aircraft Sizing Environment II. Part 2; Morphing Aircraft Sizing via Multi-level Optimization

    NASA Technical Reports Server (NTRS)

    Skillen, Michael D.; Crossley, William A.

    2008-01-01

    This report presents an approach for sizing of a morphing aircraft based upon a multi-level design optimization approach. For this effort, a morphing wing is one whose planform can make significant shape changes in flight - increasing wing area by 50% or more from the lowest possible area, changing sweep 30 or more, and/or increasing aspect ratio by as much as 200% from the lowest possible value. The top-level optimization problem seeks to minimize the gross weight of the aircraft by determining a set of "baseline" variables - these are common aircraft sizing variables, along with a set of "morphing limit" variables - these describe the maximum shape change for a particular morphing strategy. The sub-level optimization problems represent each segment in the morphing aircraft's design mission; here, each sub-level optimizer minimizes fuel consumed during each mission segment by changing the wing planform within the bounds set by the baseline and morphing limit variables from the top-level problem.

  14. Analyzing the requirements for a robust security criteria and management of multi-level security in the clouds

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2011-06-01

    The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.

  15. Multimodal biometric approach for cancelable face template generation

    NASA Astrophysics Data System (ADS)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  16. Recalibrating Baseline Evidence in Burundi, Malawi, Senegal and Uganda: Exploring the Potential of Multi-Site, National-Level Stakeholder Engagement in Participatory Evaluation

    ERIC Educational Resources Information Center

    Edge, Karen; Marphatia, Akanksha A.

    2015-01-01

    This paper details our collaborative work on the Improving Learning Outcomes in Primary Schools (ILOPS) project in Burundi, Malawi, Uganda and Senegal. ILOPS set out to establish an innovative template for multi-stakeholder, multinational participatory evaluation (PE) and examine the fundamental roles, relationships and evidence that underpin the…

  17. VLBI-resolution radio-map algorithms: Performance analysis of different levels of data-sharing on multi-socket, multi-core architectures

    NASA Astrophysics Data System (ADS)

    Tabik, S.; Romero, L. F.; Mimica, P.; Plata, O.; Zapata, E. L.

    2012-09-01

    A broad area in astronomy focuses on simulating extragalactic objects based on Very Long Baseline Interferometry (VLBI) radio-maps. Several algorithms in this scope simulate what would be the observed radio-maps if emitted from a predefined extragalactic object. This work analyzes the performance and scaling of this kind of algorithms on multi-socket, multi-core architectures. In particular, we evaluate a sharing approach, a privatizing approach and a hybrid approach on systems with complex memory hierarchy that includes shared Last Level Cache (LLC). In addition, we investigate which manual processes can be systematized and then automated in future works. The experiments show that the data-privatizing model scales efficiently on medium scale multi-socket, multi-core systems (up to 48 cores) while regardless of algorithmic and scheduling optimizations, the sharing approach is unable to reach acceptable scalability on more than one socket. However, the hybrid model with a specific level of data-sharing provides the best scalability over all used multi-socket, multi-core systems.

  18. The Pregnancy in Polycystic Ovary Syndrome Study II: Baseline Characteristics and Effects of Obesity from a Multi-Center Randomized Clinical Trial

    PubMed Central

    Legro, Richard S.; Brzyski, Robert G.; Diamond, Michael P.; Coutifaris, Christos; Schlaff, William D.; Alvero, Ruben; Casson, Peter; Christman, Gregory M.; Huang, Hao; Yan, Qingshang; Haisenleder, Daniel J.; Barnhart, Kurt T.; Bates, G. Wright; Usadi, Rebecca; Lucidi, Richard; Baker, Valerie; Trussell, J.C.; Krawetz, Stephen A.; Snyder, Peter; Ohl, Dana; Santoro, Nanette; Eisenberg, Esther; Zhang, Heping

    2014-01-01

    Objective To summarize baseline characteristics from a large multi-center infertility clinical trial. Design Cross-sectional baseline data from a double-blind randomized trial of 2 treatment regimens (letrozole vs. clomiphene). Setting Academic Health Centers throughout the U.S. Interventions None Main Outcome Measure(s) Historical, biometric, biochemical and questionnaire parameters. Participants 750 women with PCOS and their male partners took part in the study. Results Females averaged ~30 years old and were obese (BMI 35) with ~20% from a racial/ethnic minority. Most (87%) were hirsute and nulligravid (63%). . Most of the females had an elevated antral follicle count and enlarged ovarian volume on ultrasound. Women had elevated mean circulating androgens, LH:FSH ratio (~2), and AMH levels (8.0 ng/mL). Additionally, women had evidence for metabolic dysfunction with elevated mean fasting insulin and dyslipidemia. Increasing obesity was associated with decreased LH:FSH levels, AMH levels and antral follicle counts but increasing cardiovascular risk factors, including prevalence of the metabolic syndrome. Males were obese (BMI 30) and had normal mean semen parameters. Conclusions The treatment groups were well-matched at baseline. Obesity exacerbates select female reproductive and most metabolic parameters. We have also established a database and sample repository that will eventually be accessible to investigators. PMID:24156957

  19. EFFICACY OF THE 20-WEEK CIRCLE OF SECURITY INTERVENTION: CHANGES IN CAREGIVER REFLECTIVE FUNCTIONING, REPRESENTATIONS, AND CHILD ATTACHMENT IN AN AUSTRALIAN CLINICAL SAMPLE.

    PubMed

    Huber, Anna; McMahon, Catherine A; Sweller, Naomi

    2015-01-01

    Circle of Security is an attachment theory based intervention that aims to promote secure parent-child attachment relationships. Despite extensive uptake of the approach, there is limited empirical evidence regarding efficacy. The current study examined whether participation in the 20-week Circle of Security intervention resulted in positive caregiver-child relationship change in four domains: caregiver reflective functioning; caregiver representations of the child and the relationship with the child; child attachment security, and attachment disorganization. Archived pre- and postintervention data were analyzed from 83 clinically referred caregiver-child dyads (child age: 13-88 months) who completed the Circle of Security intervention in sequential cohorts and gave permission for their data to be included in the study. Caregivers completed the Circle of Security Interview, and dyads were filmed in the Strange Situation Procedure before and after the intervention. Results supported all four hypotheses: Caregiver reflective functioning, caregiving representations, and level of child attachment security increased after the intervention, and level of attachment disorganization decreased for those with high baseline levels. Those whose scores were least optimal prior to intervention showed the greatest change in all domains. This study adds to the evidence suggesting that the 20-week Circle of Security intervention results in significant relationship improvements for caregivers and their children. © 2015 Michigan Association for Infant Mental Health.

  20. Expanding the role of unattended ground sensors to multi-tiered systems

    NASA Astrophysics Data System (ADS)

    Garrison, David R., II

    2009-05-01

    Unattended Ground Sensors (UGS) have recently gained momentum in surveillance and protection applications. Many of these Unattended Ground Sensors are deployed in current operations today across the Department of Defense (DoD) and Department of Homeland Security (DHS). In addition to UGS needs, there is a growing desire to leverage existing UGS for incorporation into higher level systems for a broadening role in defense and homeland security applications. The architecture to achieve this goal and examples of non-traditional scenarios that leverage higher level systems are discussed in this paper.

  1. Understanding Response Rates to Surveys About Family Members' Psychological Symptoms After Patients' Critical Illness.

    PubMed

    Long, Ann C; Downey, Lois; Engelberg, Ruth A; Nielsen, Elizabeth; Ciechanowski, Paul; Curtis, J Randall

    2017-07-01

    Achieving adequate response rates from family members of critically ill patients can be challenging, especially when assessing psychological symptoms. To identify factors associated with completion of surveys about psychological symptoms among family members of critically ill patients. Using data from a randomized trial of an intervention to improve communication between clinicians and families of critically ill patients, we examined patient-level and family-level predictors of the return of usable surveys at baseline, three months, and six months (n = 181, 171, and 155, respectively). Family-level predictors included baseline symptoms of psychological distress, decisional independence preference, and attachment style. We hypothesized that family with fewer symptoms of psychological distress, a preference for less decisional independence, and secure attachment style would be more likely to return questionnaires. We identified several predictors of the return of usable questionnaires. Better self-assessed family member health status was associated with a higher likelihood and stronger agreement with a support-seeking attachment style with a lower likelihood, of obtaining usable baseline surveys. At three months, family-level predictors of return of usable surveys included having usable baseline surveys, status as the patient's legal next of kin, and stronger agreement with a secure attachment style. The only predictor of receipt of surveys at six months was the presence of usable surveys at three months. We identified several predictors of the receipt of surveys assessing psychological symptoms in family of critically ill patients, including family member health status and attachment style. Using these characteristics to inform follow-up mailings and reminders may enhance response rates. Copyright © 2017 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  2. Assessment on security system of radioactive sources used in hospitals of Thailand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources usedmore » in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.« less

  3. Changes in the built environment and changes in the amount of walking over time: longitudinal results from the multi-ethnic study of atherosclerosis.

    PubMed

    Hirsch, Jana A; Moore, Kari A; Clarke, Philippa J; Rodriguez, Daniel A; Evenson, Kelly R; Brines, Shannon J; Zagorski, Melissa A; Diez Roux, Ana V

    2014-10-15

    Lack of longitudinal research hinders causal inference on the association between the built environment and walking. In the present study, we used data from 6,027 adults in the Multi-Ethnic Study of Atherosclerosis who were 45-84 years of age at baseline to investigate the association of neighborhood built environment with trends in the amount of walking between 2000 and 2012. Walking for transportation and walking for leisure were assessed at baseline and at 3 follow-up visits (median follow-up = 9.15 years). Time-varying built environment measures (measures of population density, land use, number of destinations, bus access, and street connectivity) were created using geographic information systems. We used linear mixed models to estimate the associations between baseline levels of and a change in each built environment feature and a change in the frequency of walking. After adjustment for potential confounders, we found that higher baseline levels of population density, area zoned for retail, social destinations, walking destinations, and street connectivity were associated with greater increases in walking for transportation over time. Higher baseline levels of land zoned for residential use and distance to buses were associated with less pronounced increases (or decreases) in walking for transportation over time. Increases in the number of social destinations, the number of walking destinations, and street connectivity over time were associated with greater increases in walking for transportation. Higher baseline levels of both land zoned for retail and walking destinations were associated with greater increases in leisure walking, but no changes in built environment features were associated with leisure walking. The creation of mixed-use, dense developments may encourage adults to incorporate walking for transportation into their everyday lives. © The Author 2014. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. National INFOSEC technical baseline: multi-level secure systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, J P

    1998-09-28

    The purpose of this report is to provide a baseline description of the state of multilevel processor/processing to the INFOSEC Research Council and at their discretion to the R&D community at large. From the information in the report, it is hoped that the members of the IRC will be aware of gaps in MLS research. A primary purpose is to bring IRC and the research community members up to date on what is happening in the MLS arena. The review will attempt to cover what MLS products are still available, and to identify companies who still offer MLS products. Wemore » have also attempted to identify requirements for MLS by interviewing senior officers of the Intelligence community as well as those elements of DoD and DOE who are or may be interested in procuring MLS products for various applications. The balance of the report consists of the following sections; a background review of the highlights of the developments of MLS, a quick summary of where we are today in terms of products, installations, and companies who are still in the business of supplying MLS systems [or who are developing MLS system], the requirements as expressed by senior members of the Intelligence community and DoD and DOE, issues and unmet R&D challenges surrounding MLS, and finally a set of recommended research topics.« less

  5. Securely and Flexibly Sharing a Biomedical Data Management System

    PubMed Central

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2011-01-01

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285

  6. Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application

    PubMed Central

    Zhang, Ping; Li, Wenjun; Sun, Hua

    2016-01-01

    Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. PMID:27551747

  7. Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application.

    PubMed

    Zhang, Ping; Li, Wenjun; Sun, Hua

    2016-01-01

    Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy.

  8. Survey of Collaboration Technologies in Multi-level Security Environments

    DTIC Science & Technology

    2014-04-28

    infrastructure or resources. In this research program, the security implications of the US Air Force GeoBase (the US The problem is that in many cases...design structure. ORA uses a Java interface for ease of use, and a C++ computational backend . The current version ORA1.2 software is available on the...information: culture, policy, governance, economics and resources, and technology and infrastructure . This plan, the DoD Information Sharing

  9. Candidate Sequence Variants and Fetal Hemoglobin in Children with Sickle Cell Disease Treated with Hydroxyurea

    PubMed Central

    Green, Nancy S.; Ender, Katherine L.; Pashankar, Farzana; Driscoll, Catherine; Giardina, Patricia J.; Mullen, Craig A.; Clark, Lorraine N.; Manwani, Deepa; Crotty, Jennifer; Kisselev, Sergey; Neville, Kathleen A.; Hoppe, Carolyn; Barral, Sandra

    2013-01-01

    Background Fetal hemoglobin level is a heritable complex trait that strongly correlates swith the clinical severity of sickle cell disease. Only few genetic loci have been identified as robustly associated with fetal hemoglobin in patients with sickle cell disease, primarily adults. The sole approved pharmacologic therapy for this disease is hydroxyurea, with effects largely attributable to induction of fetal hemoglobin. Methodology/Principal Findings In a multi-site observational analysis of children with sickle cell disease, candidate single nucleotide polymorphisms associated with baseline fetal hemoglobin levels in adult sickle cell disease were examined in children at baseline and induced by hydroxyurea therapy. For baseline levels, single marker analysis demonstrated significant association with BCL11A and the beta and epsilon globin loci (HBB and HBE, respectively), with an additive attributable variance from these loci of 23%. Among a subset of children on hydroxyurea, baseline fetal hemoglobin levels explained 33% of the variance in induced levels. The variant in HBE accounted for an additional 13% of the variance in induced levels, while variants in the HBB and BCL11A loci did not contribute beyond baseline levels. Conclusions/Significance These findings clarify the overlap between baseline and hydroxyurea-induced fetal hemoglobin levels in pediatric disease. Studies assessing influences of specific sequence variants in these and other genetic loci in larger populations and in unusual hydroxyurea responders are needed to further understand the maintenance and therapeutic induction of fetal hemoglobin in pediatric sickle cell disease. PMID:23409025

  10. Secure coherent optical multi-carrier system with four-dimensional modulation space and Stokes vector scrambling.

    PubMed

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun

    2015-06-15

    A secure enhanced coherent optical multi-carrier system based on Stokes vector scrambling is proposed and experimentally demonstrated. The optical signal with four-dimensional (4D) modulation space has been scrambled intra- and inter-subcarriers, where a multi-layer logistic map is adopted as the chaotic model. An experiment with 61.71-Gb/s encrypted multi-carrier signal is successfully demonstrated with the proposed method. The results indicate a promising solution for the physical secure optical communication.

  11. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less

  12. Multi-band transmission color filters for multi-color white LEDs based visible light communication

    NASA Astrophysics Data System (ADS)

    Wang, Qixia; Zhu, Zhendong; Gu, Huarong; Chen, Mengzhu; Tan, Qiaofeng

    2017-11-01

    Light-emitting diodes (LEDs) based visible light communication (VLC) can provide license-free bands, high data rates, and high security levels, which is a promising technique that will be extensively applied in future. Multi-band transmission color filters with enough peak transmittance and suitable bandwidth play a pivotal role for boosting signal-noise-ratio in VLC systems. In this paper, multi-band transmission color filters with bandwidth of dozens nanometers are designed by a simple analytical method. Experiment results of one-dimensional (1D) and two-dimensional (2D) tri-band color filters demonstrate the effectiveness of the multi-band transmission color filters and the corresponding analytical method.

  13. Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carilli, Jhon T.; Krenzien, Susan K.

    2013-07-01

    The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)

  14. Information security concepts and practices: the case of a provincial multi-specialty hospital.

    PubMed

    Cavalli, Enrico; Mattasoglio, Andrea; Pinciroli, Francesco; Spaggiari, Piergiorgio

    2004-03-31

    In recent years, major and widely accepted information security understandings and achievements confirm that the problem is complex. They clarify that technologies are fundamental tools, but management processes have even bigger relevance, as also prestigious international magazines dossier clearly explained recently. Such a magazine attention outlines the wide impact that the subject has on watchful decision makers. ISO17799 is an emerging standard in information security. In principle there are no reasons for considering it not applicable to the health care sector. In practice, because of both the just conceptual level of the standard and the peculiarities of the health care data and institutions, a lot of analysis and design work need to be invested any time a health care institution decides to deal with the subject. CEN/ENV 12924 is another emerging standard certainly more on the spot of the health care. Nevertheless, it also asks for evident further investigation. The practical case of information security design, implementation, management, and auditing inside a multi-specialty provincial Italian hospital will be described.

  15. A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-02-01

    In this paper, we propose a multi-proxy blind signature scheme based on controlled teleportation. Genuine four-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security analysis shows the scheme satisfies the security features of multi-proxy signature, unforgeability, undeniability, blindness and unconditional security.

  16. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  17. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  18. Exchanging large data object in multi-agent systems

    NASA Astrophysics Data System (ADS)

    Al-Yaseen, Wathiq Laftah; Othman, Zulaiha Ali; Nazri, Mohd Zakree Ahmad

    2016-08-01

    One of the Business Intelligent solutions that is currently in use is the Multi-Agent System (MAS). Communication is one of the most important elements in MAS, especially for exchanging large low level data between distributed agents (physically). The Agent Communication Language in JADE has been offered as a secure method for sending data, whereby the data is defined as an object. However, the object cannot be used to send data to another agent in a different location. Therefore, the aim of this paper was to propose a method for the exchange of large low level data as an object by creating a proxy agent known as a Delivery Agent, which temporarily imitates the Receiver Agent. The results showed that the proposed method is able to send large-sized data. The experiments were conducted using 16 datasets ranging from 100,000 to 7 million instances. However, for the proposed method, the RAM and the CPU machine had to be slightly increased for the Receiver Agent, but the latency time was not significantly different compared to the use of the Java Socket method (non-agent and less secure). With such results, it was concluded that the proposed method can be used to securely send large data between agents.

  19. The Monitoring, Detection, Isolation and Assessment of Information Warfare Attacks Through Multi-Level, Multi-Scale System Modeling and Model Based Technology

    DTIC Science & Technology

    2004-01-01

    login identity to the one under which the system call is executed, the parameters of the system call execution - file names including full path...Anomaly detection COAST-EIMDT Distributed on target hosts EMERALD Distributed on target hosts and security servers Signature recognition Anomaly...uses a centralized architecture, and employs an anomaly detection technique for intrusion detection. The EMERALD project [80] proposes a

  20. Methodology development for quantitative optimization of security enhancement in medical information systems -Case study in a PACS and a multi-institutional radiotherapy database-.

    PubMed

    Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari

    2002-01-01

    The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.

  1. Secure content objects

    DOEpatents

    Evans, William D [Cupertino, CA

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  2. Web vulnerability study of online pharmacy sites.

    PubMed

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  3. Change Detection via Cross-Borehole and VSP Seismic Surveys for the Source Physics Experiments (SPE) at the Nevada National Security Site (NNSS)

    NASA Astrophysics Data System (ADS)

    Knox, H. A.; Abbott, R. E.; Bonal, N. D.; Aldridge, D. F.; Preston, L. A.; Ober, C.

    2012-12-01

    In support of the Source Physics Experiment (SPE) at the Nevada National Security Site (NNSS), we have conducted two cross-borehole seismic experiments in the Climax Stock. The first experiment was conducted prior to the third shot in this multi-detonation program using two available boreholes and the shot hole, while the second experiment was conducted after the shot using four of the available boreholes. The first study focused on developing a well-characterized 2D pre-explosion Vp model including two VSPs and a seismic refraction survey, as well as quantifying baseline waveform similarity at reoccupied sites. This was accomplished by recording both "sparker" and accelerated weight drop sources on a hydrophone string and surface geophones. In total more than 18,500 unique source-receiver pairs were acquired during this testing. In the second experiment, we reacquired aproximately 8,800 source-receiver pairs and performed a cross-line survey allowing for a 3D post-explosion Vp model. The data acquired from the reoccupied sites was processed using cross-correlation methods and change detection methodologies, including comparison of the tomographic images. The survey design and subsequent processing provided an opportunity to investigate seismic wave propagation through damaged rock. We also performed full waveform forward modelling for a granitic body hosting a perched aquifer. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  4. Politics of innovation in multi-level water governance systems

    NASA Astrophysics Data System (ADS)

    Daniell, Katherine A.; Coombes, Peter J.; White, Ian

    2014-11-01

    Innovations are being proposed in many countries in order to support change towards more sustainable and water secure futures. However, the extent to which they can be implemented is subject to complex politics and powerful coalitions across multi-level governance systems and scales of interest. Exactly how innovation uptake can be best facilitated or blocked in these complex systems is thus a matter of important practical and research interest in water cycle management. From intervention research studies in Australia, China and Bulgaria, this paper seeks to describe and analyse the behind-the-scenes struggles and coalition-building that occurs between water utility providers, private companies, experts, communities and all levels of government in an effort to support or block specific innovations. The research findings suggest that in order to ensure successful passage of the proposed innovations, champions for it are required from at least two administrative levels, including one with innovation implementation capacity, as part of a larger supportive coalition. Higher governance levels can play an important enabling role in facilitating the passage of certain types of innovations that may be in competition with currently entrenched systems of water management. Due to a range of natural biases, experts on certain innovations and disciplines may form part of supporting or blocking coalitions but their evaluations of worth for water system sustainability and security are likely to be subject to competing claims based on different values and expertise, so may not necessarily be of use in resolving questions of "best courses of action". This remains a political values-based decision to be negotiated through the receiving multi-level water governance system.

  5. OVoG Inversion for the Retrieval of Agricultural Crop Structure by Means of Multi-Baseline Polarimetric SAR Interferometry

    NASA Astrophysics Data System (ADS)

    Pichierri, Manuele; Hajnsek, Irena

    2015-04-01

    In this work, the potential of multi-baseline Pol-InSAR for crop parameter estimation (e.g. crop height and extinction coefficients) is explored. For this reason, a novel Oriented Volume over Ground (OVoG) inversion scheme is developed, which makes use of multi-baseline observables to estimate the whole stack of model parameters. The proposed algorithm has been initially validated on a set of randomly-generated OVoG scenarios, to assess its stability over crop structure changes and its robustness against volume decorrelation and other decorrelation sources. Then, it has been applied to a collection of multi-baseline repeat-pass SAR data, acquired over a rural area in Germany by DLR's F-SAR.

  6. PKPass

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adamson, Ryan M.

    Password management solutions exist, but few are designed for enterprise systems administrators sharing oncall rotations. Due to the Multi-Factor Level of Assurance 4 effort, DOE is now distributing PIV cards with cryptographically signed certificate and private key pairs to administrators and other security-significant users. We utilize this public key infrastructure (PKI) to encrypt passwords for other recipients in a secure way. This is cross platform (works on OSX and Linux systems), and has already been adopted internally by the NCCS systems administration staff to replace their old password book system.

  7. Enhanced secure 4-D modulation space optical multi-carrier system based on joint constellation and Stokes vector scrambling.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2018-03-19

    This paper proposes and demonstrates an enhanced secure 4-D modulation optical generalized filter bank multi-carrier (GFBMC) system based on joint constellation and Stokes vector scrambling. The constellation and Stokes vectors are scrambled by using different scrambling parameters. A multi-scroll Chua's circuit map is adopted as the chaotic model. Large secure key space can be obtained due to the multi-scroll attractors and independent operability of subcarriers. A 40.32Gb/s encrypted optical GFBMC signal with 128 parallel subcarriers is successfully demonstrated in the experiment. The results show good resistance against the illegal receiver and indicate a potential way for the future optical multi-carrier system.

  8. Hot spots of crop production changes at 1.5°C and 2°C

    NASA Astrophysics Data System (ADS)

    Schleussner, C. F.; Deryng, D.; Mueller, C.; Elliott, J. W.; Saeed, F.; Folberth, C.; Liu, W.; Wang, X.; Pugh, T.

    2017-12-01

    Studying changes in global and regional crop production is central for assessing the benefits of limiting global average temperature below 1.5ºC versus 2ºC. Projections of future climatic impacts on crop production are commonly focussed on focussing on mean changes. However, substantial risks are posed by extreme weather events such as heat waves and droughts that are of great relevance for imminent policy relevant questions such as price shocks or food security. Preliminary research on the benefits of keeping global average temperature increase below 1.5ºC versus 2ºC above pre-industrial levels has indicated that changes in extreme weather event occurrences will be more pronounced than changes in the mean climate. Here we will present results of crop yield projections for a set of global gridded crop models (GGCMs) for four major staple crops at 1.5°C and 2°C warming above pre-industrial levels using climate forcing data from the Half a degree Additional warming, Prognosis and Projected Impacts (HAPPI) project. We will assess changes in crop production on the global and regional level, and identify hot spots of change. The unique multi-ensemble setup allows to identify changes in extreme yield losses with multi-year to multi-decadal return periods, and thus elucidate the consequences for global and regional food security.

  9. Multi-Level Anomaly Detection on Time-Varying Graph Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bridges, Robert A; Collins, John P; Ferragut, Erik M

    This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models describing coarse subgraphs are built by aggregating probabilities at finer levels, and these closely related hierarchical models simultaneously detect deviations from expectation. This technique provides insight into a graph's structure and internal context that may shed light on a detected event. Additionally, thismore » multi-scale analysis facilitates intuitive visualizations by allowing users to narrow focus from an anomalous graph to particular subgraphs or nodes causing the anomaly. For evaluation, two hierarchical anomaly detectors are tested against a baseline Gaussian method on a series of sampled graphs. We demonstrate that our graph statistics-based approach outperforms both a distribution-based detector and the baseline in a labeled setting with community structure, and it accurately detects anomalies in synthetic and real-world datasets at the node, subgraph, and graph levels. To illustrate the accessibility of information made possible via this technique, the anomaly detector and an associated interactive visualization tool are tested on NCAA football data, where teams and conferences that moved within the league are identified with perfect recall, and precision greater than 0.786.« less

  10. [Efficacy and safety of deferasirox in aplastic anemia patients with iron overload: a single arm, multi-center,prospective study in China].

    PubMed

    Shi, Jun; Chang, Hong; Zhang, Li; Shao, Yinqi; Nie, Neng; Zhang, Jing; Huang, Jinbo; Zhang, Li; Tang, Xudong; Quan, Richeng; Zheng, Chunmei; Xiao, Haiyan; Hu, Dengming; Hu, Lingyan; Liu, Feng; Zhou, Yongming; Zheng, Yizhou; Zhang, Fengkui

    2016-01-01

    To explore the efficacy and safety of deferasirox in aplastic anemia (AA)patients with iron overload. A single arm, multi- center, prospective, open- label study was conducted to evaluate absolute change in serum ferritin (SF)from baseline to 12 months of deferasirox administration, initially at a dose of 20 mg·kg(-1)·d(-1), and the safety in 64 AA patients with iron overload. All patients started their deferasirox treatment with a daily dose of 20 mg · kg(-1) ·d(-1). The mean actual dose was (18.6±3.60) mg · kg(-1)·d(-1). The median SF decreased from 4 924 (2 718- 6 765)μg/L at baseline (n=64) to 3 036 (1 474- 5 551)μg/L at 12 months (n=23) with the percentage change from baseline as 38%. A median SF decrease of 651 (126-2 125)μg/L was observed at the end of study in 23 patients who completed 12 months' treatment, the median SF level decreased by 1 167(580-4 806)μg/L [5 271(3 420-8 278)μg/L at baseline; 3 036(1 474-5 551)μg/L after 12 months' treatment; the percentage change from baseline as 42% ] after 12 months of deferasirox treatment. The most common adverse events (AEs) were increased serum creatinine levels (40.98%), gastrointestinal discomfort (40.98%), elevated liver transaminase (ALT: 21.31%; AST: 13.11%)and proteinuria (24.59%). The increased serum creatinine levels were reversible and non-progressive. Of 38 patients with concomitant cyclosporine use, 12(31.8%)patients had two consecutive values >ULN, 10(26.3%)patients had two consecutive values >1.33 baseline values, but only 1(2.6%)patient's serum creatinine increased more than 1.33 baseline values and exceeded ULN. For both AST and ALT, no patients experienced two post- baseline values >5 ×ULN or >10 × ULN during the whole study. In AA patients with low baseline PLT count (less than 50 × 10(9)/L), there was no decrease for median PLT level during 12 months' treatment period. AA patients with iron overload could achieve satisfactory efficacy of iron chelation by deferasirox treatment. The drug was well tolerated with a clinically manageable safety profile and no major adverse events.

  11. Cigarette Smoking Outcomes at Four Years of Follow-Up, Psychosocial Factors, and Reactions to Group Intervention.

    ERIC Educational Resources Information Center

    Benfari, Robert C.; Eaker, Elaine

    1984-01-01

    Studied male smokers (N=182) at high risk of coronary heart disease to determine variables that discriminated between successful and nonsuccessful quitters. Analysis revealed that baseline level of smoking, life events, personal security, and selected group process variables were predictive of success or failure in the intervention program.…

  12. Unconditionally secure multi-party quantum commitment scheme

    NASA Astrophysics Data System (ADS)

    Wang, Ming-Qiang; Wang, Xue; Zhan, Tao

    2018-02-01

    A new unconditionally secure multi-party quantum commitment is proposed in this paper by encoding the committed message to the phase of a quantum state. Multi-party means that there are more than one recipient in our scheme. We show that our quantum commitment scheme is unconditional hiding and binding, and hiding is perfect. Our technique is based on the interference of phase-encoded coherent states of light. Its security proof relies on the no-cloning theorem of quantum theory and the properties of quantum information.

  13. Securing Information with Complex Optical Encryption Networks

    DTIC Science & Technology

    2015-08-11

    Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military

  14. Identifying seasonal mobility profiles from anonymized and aggregated mobile phone data. Application in food security.

    PubMed

    Zufiria, Pedro J; Pastor-Escuredo, David; Úbeda-Medina, Luis; Hernandez-Medina, Miguel A; Barriales-Valbuena, Iker; Morales, Alfredo J; Jacques, Damien C; Nkwambi, Wilfred; Diop, M Bamba; Quinn, John; Hidalgo-Sanchís, Paula; Luengo-Oroz, Miguel

    2018-01-01

    We propose a framework for the systematic analysis of mobile phone data to identify relevant mobility profiles in a population. The proposed framework allows finding distinct human mobility profiles based on the digital trace of mobile phone users characterized by a Matrix of Individual Trajectories (IT-Matrix). This matrix gathers a consistent and regularized description of individual trajectories that enables multi-scale representations along time and space, which can be used to extract aggregated indicators such as a dynamic multi-scale population count. Unsupervised clustering of individual trajectories generates mobility profiles (clusters of similar individual trajectories) which characterize relevant group behaviors preserving optimal aggregation levels for detailed and privacy-secured mobility characterization. The application of the proposed framework is illustrated by analyzing fully anonymized data on human mobility from mobile phones in Senegal at the arrondissement level over a calendar year. The analysis of monthly mobility patterns at the livelihood zone resolution resulted in the discovery and characterization of seasonal mobility profiles related with economic activities, agricultural calendars and rainfalls. The use of these mobility profiles could support the timely identification of mobility changes in vulnerable populations in response to external shocks (such as natural disasters, civil conflicts or sudden increases of food prices) to monitor food security.

  15. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    NASA Astrophysics Data System (ADS)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  16. Deterministic secure quantum communication using a single d-level system

    PubMed Central

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557

  17. Organizational Legitimacy of International Research Collaborations: Crossing Boundaries in the Middle East

    ERIC Educational Resources Information Center

    Oleksiyenko, Anatoly

    2013-01-01

    Cross-border academic collaborations in conflict zones are vulnerable to escalated turbulence, liability concerns and flagging support. Multi-level stakeholder engagement at home and abroad is essential for securing the political and financial sustainability of such collaborations. This study examines the multilayered stakeholder arrangements…

  18. Sustaining Software-Intensive Systems

    DTIC Science & Technology

    2006-05-01

    2.2 Multi- Service Operational Test and Evaluation .......................................4 2.3 Stable Software Baseline...or equivalent document • completed Multi- Service Operational Test and Evaluation (MOT&E) for the potential production software package (or OT&E if...not multi- service ) • stable software production baseline • complete and current software documentation • Authority to Operate (ATO) for an

  19. Sleep Duration and Quality in Relation to Autonomic Nervous System Measures: The Multi-Ethnic Study of Atherosclerosis (MESA)

    PubMed Central

    Castro-Diehl, Cecilia; Diez Roux, Ana V.; Redline, Susan; Seeman, Teresa; McKinley, Paula; Sloan, Richard; Shea, Steven

    2016-01-01

    Study Objectives: Short sleep duration and poor sleep quality are associated with adverse cardiovascular outcomes. Potential pathophysiological mechanisms include sleep-associated alterations in the autonomic nervous system. The objective of this study was to examine the associations of shorter sleep duration and poorer sleep quality with markers of autonomic tone: heart rate (HR), high-frequency HR variability (HF-HRV) and salivary amylase. Methods: Cross-sectional analysis of data from actigraphy-based measures of sleep duration and efficiency and responses to a challenge protocol obtained from 527 adult participants in the Multi-Ethnic Study of Atherosclerosis. Results: Participants who slept fewer than 6 h per night (compared to those who slept 7 h or more per night) had higher baseline HR (fully adjusted model 0.05 log beats/min, 95% confidence interval [CI] 0.01, 0.09) and greater HR orthostatic reactivity (fully adjusted model 0.02 log beats/min, 95% CI 0.002, 0.023). Participants who slept 6 to less than 7 h/night (compared to those who slept 7 h or more per night) had lower baseline HF-HRV (fully adjusted model −0.31 log msec2, 95% CI −0.60, −0.14). Participants with low sleep efficiency had lower baseline HF-HRV than those with higher sleep efficiency (fully adjusted model −0.59 log msec2, 95% CI −1.03, −0.15). Participants with low sleep efficiency had higher baseline levels of amylase than those with higher sleep efficiency (fully adjusted model 0.45 log U/mL, 95% CI 0.04, 0.86). Conclusions: Short sleep duration, low sleep efficiency, and insomnia combined with short sleep duration were associated with markers of autonomic tone that indicate lower levels of cardiac parasympathetic (vagal) tone and/or higher levels of sympathetic tone. Citation: Castro-Diehl C, Roux AV, Redline S, Seeman T, McKinley P, Sloan R, Shea S. Sleep duration and quality in relation to autonomic nervous system measures: the Multi-Ethnic Study of Atherosclerosis (MESA). SLEEP 2016;39(11):1927–1940. PMID:27568797

  20. Two-year effects of a school-based prevention programme on adolescent cigarette smoking in Guangzhou, China: a cluster randomized trial

    PubMed Central

    Wen, Xiaozhong; Chen, Weiqing; Gans, Kim M; Colby, Suzanne M; Lu, Ciyong; Liang, Caihua; Ling, Wenhua

    2010-01-01

    Background The prevalence of adolescent smoking has been increasing rapidly in China. Theory-based smoking prevention programmes in schools may be an effective approach in preventing smoking among Chinese adolescents. Methods A school-level cluster randomized controlled trial was conducted among 7th and 8th grade students (N = 2343) in four junior high schools in southern China during 2004–06. The theory-based, multi-level intervention was compared with the standard health curriculum. Outcome measures comprised changes in students’ smoking-related knowledge, attitudes and behaviour. Results The mean knowledge scores from baseline to the 1- and 2-year follow-ups increased more in the intervention group than in the control group, whereas there was little change in attitude scores. At the 1-year follow-up (the total sample), the interventions reduced the probability of baseline experimental smokers’ escalating to regular smoker [7.9 vs 18.3%; adjusted odds ratio (OR) 0.34, 95% confidence interval (CI) 0.12–0.97, P = 0.043], but did not reduce the probability of baseline non-smokers’ initiating smoking (7.9 vs 10.6%; adjusted OR 0.86, 95% CI 0.54–1.38, P = 0.538). At the 2-year follow-up (only 7th grade students), similar proportions of baseline non-smokers initiated smoking in the intervention group and the control group (13.5 vs 13.1%), while a possibly lower proportion of baseline experimental smokers escalated to regular smoking in the intervention group than the control group (22.6 vs 40.0%; adjusted OR 0.43, 95% CI 0.12–1.57, P = 0.199). Conclusions This multi-level intervention programme had a moderate effect on inhibiting the escalation from experimental to regular smoking among Chinese adolescents, but had little effect on the initiation of smoking. The programme improved adolescents’ smoking-related knowledge, but did not change their attitudes towards smoking. PMID:20236984

  1. High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan

    2016-11-01

    Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.

  2. Understanding Cortisol Reactivity across the Day at Child Care: The Potential Buffering Role of Secure Attachments to Caregivers

    PubMed Central

    Badanes, Lisa S.; Dmitrieva, Julia; Watamura, Sarah Enos

    2011-01-01

    Full-day center-based child care has been repeatedly associated with rising cortisol across the child care day. This study addressed the potential buffering role of attachment to mothers and lead teachers in 110 preschoolers while at child care. Using multi-level modeling and controlling for a number of child, family, and child care factors, children with more secure attachments to teachers were more likely to show falling cortisol across the child care day. Attachment to mothers interacted with child care quality, with buffering effects found for children with secure attachments attending higher quality child care. Implications for early childhood educators are discussed. PMID:22408288

  3. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  5. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    NASA Astrophysics Data System (ADS)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    Our work focuses on development of a multi-agent, hydroeconomic model for water policy evaluation in Jordan. Jordan ranks among the most water-scarce countries in the world, a situation exacerbated due to a recent influx of refugees escaping the ongoing civil war in neighboring Syria. The modular, multi-agent model is used to evaluate interventions for enhancing Jordan's water security, integrating biophysical modules that simulate natural and engineered phenomena with human modules that represent behavior at multiple levels of decision making. The hydrologic modules are developed using spatially-distributed groundwater and surface water models, which are translated into compact simulators for efficient integration into the multi-agent model. For the multi-agent model, we explicitly account for human agency at multiple levels of decision making, with agents representing riparian, management, supplier, and water user groups. Human agents are implemented as autonomous entities in the model that make decisions in relation to one another and in response to hydrologic and socioeconomic conditions. The integrated model is programmed in Python using Pynsim, a generalizable, open-source object-oriented software framework for modeling network-based water resource systems. The modeling time periods include historical (2006-2014) and future (present-2050) time spans. For the historical runs, the model performance is validated against historical data for several observations that reflect the interacting dynamics of both the hydrologic and human components of the system. A historical counterfactual scenario is also constructed to isolate and identify the impacts of the recent Syrian civil war and refugee crisis on Jordan's water system. For the future period, model runs are conducted to evaluate potential supply, demand, and institutional interventions over a wide range of plausible climate and socioeconomic scenarios. In addition, model sensitivity analysis is conducted revealing the hydrologic and human aspects of the system that most strongly influence water security outcomes, providing insight into coupled human-water system dynamics as well as priority areas of focus for continued model improvement.

  6. Multi-Level Secure Information Sharing Between Smart Cloud Systems of Systems

    DTIC Science & Technology

    2014-03-01

    implementation of virtual hardware (VMWare), along with a commercial implementation of virtual networking (VPN), such as OpenVPN . 1. VMWare Virtualization...en.wikipedia.org/wiki/MongoDB. Wikipedia. 2014b. Accessed February 26. s.v. “Open VPN,” http://en.wikipedia.org/wiki/ OpenVPN . Wikipedia. 2014c. Accessed

  7. Implications of Multi-Core Architectures on the Development of Multiple Independent Levels of Security (MILS) Compliant Systems

    DTIC Science & Technology

    2012-10-01

    REPORT 3. DATES COVERED (From - To) MAR 2010 – APR 2012 4 . TITLE AND SUBTITLE IMPLICATIONS OF MULT-CORE ARCHITECTURES ON THE DEVELOPMENT OF...Framework for Multicore Information Flow Analysis ...................................... 23 4 4.1 A Hypothetical Reference Architecture... 4 Figure 2: Pentium II Block Diagram

  8. MODIS. Volume 1: MODIS level 1A software baseline requirements

    NASA Technical Reports Server (NTRS)

    Masuoka, Edward; Fleig, Albert; Ardanuy, Philip; Goff, Thomas; Carpenter, Lloyd; Solomon, Carl; Storey, James

    1994-01-01

    This document describes the level 1A software requirements for the moderate resolution imaging spectroradiometer (MODIS) instrument. This includes internal and external requirements. Internal requirements include functional, operational, and data processing as well as performance, quality, safety, and security engineering requirements. External requirements include those imposed by data archive and distribution systems (DADS); scheduling, control, monitoring, and accounting (SCMA); product management (PM) system; MODIS log; and product generation system (PGS). Implementation constraints and requirements for adapting the software to the physical environment are also included.

  9. Association of albumin-creatinine ratio and cystatin C with change in ankle-brachial index: the Multi-Ethnic Study of Atherosclerosis (MESA).

    PubMed

    Garimella, Pranav S; Ix, Joachim H; Katz, Ronit; Shlipak, Michael G; Criqui, Michael H; Siscovick, David S; Kramer, Holly; Sibley, Christopher T; Sarnak, Mark J

    2015-01-01

    Low ankle-brachial index (ABI) is a reflection of atherosclerotic disease, and high ABI is an indicator of calcified vessels. The associations of albuminuria and cystatin C level with incidence of either low or high ABI are unknown. Prospective longitudinal cohort study. MESA (Multi-Ethnic Study of Atherosclerosis) enrolled community-dwelling adults (N=6,814) aged 45-84 years who were free of clinical cardiovascular disease at baseline. Baseline albumin-creatinine ratio (ACR) and serum cystatin C level. Development of low (<0.90), and high (>1.40) ABI using multinomial regression among persons with ABI of 0.90-1.40 at baseline. During 9.8 years of follow-up, 221 and 89 participants progressed to low and high ABIs, respectively. Baseline ACR and cystatin C level were higher among progressors compared with nonprogressors. In multivariable analyses, doubling of ACR was associated with increased risk of progression to low (OR, 1.08; 95% CI, 0.99-1.20) and high (OR, 1.16; 95% CI, 1.01-1.32) ABIs. Compared to the lowest quintile, the highest quintile of ACR had a significantly increased risk of progression to low (OR, 1.79; 95% CI, 1.03-3.12) and high (OR, 2.76; 95% CI, 1.32-5.77) ABIs. Higher cystatin C levels were associated with progression to low (OR per 1-SD greater, 1.12; 95% CI, 1.00-1.26) but not high (OR per 1-SD greater, 1.01; 95% CI, 0.81-1.25) ABI, but the highest quintile of cystatin C was not associated independently with either outcome. Single measure of albuminuria and low number of progressors to high ABI. In adults free of clinical cardiovascular disease, albuminuria was a strong independent risk factor for the development of both high and low ABIs, important and different measures of peripheral artery disease. Copyright © 2014 National Kidney Foundation, Inc. Published by Elsevier Inc. All rights reserved.

  10. Relationship of fibroblast growth factor 21 with kidney function and albuminuria: multi-ethnic study of atherosclerosis.

    PubMed

    Anuwatmatee, Sahapab; Allison, Matthew A; Shlipak, Michael G; McClelland, Robyn L; Kramer, Holly; Tang, Shudi; Hou, Liming; Rye, Kerry-Anne; Ong, Kwok Leung

    2018-05-15

    Fibroblast growth factor 21 (FGF21) may play a role in the development of chronic kidney disease (CKD). We therefore investigated the relationship of plasma FGF21 levels with kidney function and albuminuria in the Multi-Ethnic Study of Atherosclerosis (MESA). The analysis included 5724 MESA participants ages 45-84 years between 2000 and 2002, free of clinically apparent cardiovascular disease (CVD). Participants were followed up in person at four additional clinic visits over 10 years. Plasma FGF21 levels were measured at baseline examination by enzyme-linked immunosorbent assay. Kidney function was assessed by estimated glomerular filtration rate (eGFR). Outcomes were urinary albumin:creatinine ratio (UACR) progression, incident CKD by eGFR (reaching eGFR <60 mL/min/1.73 m2 with eGFR loss rate ≥1 mL/min/1.73 m2 per year) and rapid kidney function decline (eGFR decline >5%/year). At baseline, higher FGF21 levels, assessed as both continuous and categorical quartile variables, were significantly associated with lower eGFR and higher UACR, after adjusting for demographic, socioeconomic and other confounding factors [adjusted mean differences of -2.63 mL/min/1.73 m2 in eGFR and 0.134 in log normally transformed UACR (mg/g) for the highest FGF21 quartile compared with the lowest quartile, all P < 0.001]. However, in longitudinal analyses, baseline FGF21 levels did not predict incident CKD by eGFR, rapid kidney function decline or UACR progression. No significant interaction with sex and race/ethnicity was found (all P > 0.05). Our study does not support a role of FGF21 as a biomarker for predicting kidney function decline or albuminuria in adults free of clinically apparent CVD at baseline.

  11. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  12. School Security Measures and Longitudinal Trends in Adolescents' Experiences of Victimization.

    PubMed

    Fisher, Benjamin W; Mowen, Thomas J; Boman, John H

    2018-06-01

    Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  14. Poverty and perceived stress: Evidence from two unconditional cash transfer programs in Zambia.

    PubMed

    Hjelm, Lisa; Handa, Sudhanshu; de Hoop, Jacobus; Palermo, Tia

    2017-03-01

    Poverty is a chronic stressor that can lead to poor physical and mental health. This study examines whether two similar government poverty alleviation programs reduced the levels of perceived stress and poverty among poor households in Zambia. Secondary data from two cluster randomized controlled trials were used to evaluate the impacts of two unconditional cash transfer programs in Zambia. Participants were interviewed at baseline and followed over 36 months. Perceived stress among female caregivers was assessed using the Cohen Perceived Stress Scale (PSS). Poverty indicators assessed included per capita expenditure, household food security, and (nonproductive) asset ownership. Fixed effects and ordinary least squares regressions were run, controlling for age, education, marital status, household demographics, location, and poverty status at baseline. Cash transfers did not reduce perceived stress but improved economic security (per capita consumption expenditure, food insecurity, and asset ownership). Among these poverty indicators, only food insecurity was associated with perceived stress. Age and education showed no consistent association with stress, whereas death of a household member was associated with higher stress levels. In this setting, perceived stress was not reduced by a positive income shock but was correlated with food insecurity and household deaths, suggesting that food security is an important stressor in this context. Although the program did reduce food insecurity, the size of the reduction was not enough to generate a statistically significant change in stress levels. The measure used in this study appears not to be correlated with characteristics to which it has been linked in other settings, and thus, further research is needed to examine whether this widely used perceived stress measure appropriately captures the concept of perceived stress in this population. Copyright © 2017 UNICEF. Published by Elsevier Ltd.. All rights reserved.

  15. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  16. Multi-baseline bootstrapping at the Navy precision optical interferometer

    NASA Astrophysics Data System (ADS)

    Armstrong, J. T.; Schmitt, H. R.; Mozurkewich, D.; Jorgensen, A. M.; Muterspaugh, M. W.; Baines, E. K.; Benson, J. A.; Zavala, Robert T.; Hutter, D. J.

    2014-07-01

    The Navy Precision Optical Interferometer (NPOI) was designed from the beginning to support baseline boot- strapping with equally-spaced array elements. The motivation was the desire to image the surfaces of resolved stars with the maximum resolution possible with a six-element array. Bootstrapping two baselines together to track fringes on a third baseline has been used at the NPOI for many years, but the capabilities of the fringe tracking software did not permit us to bootstrap three or more baselines together. Recently, both a new backend (VISION; Tennessee State Univ.) and new hardware and firmware (AZ Embedded Systems and New Mexico Tech, respectively) for the current hybrid backend have made multi-baseline bootstrapping possible.

  17. Modeling global yield growth of major crops under multiple socioeconomic pathways

    NASA Astrophysics Data System (ADS)

    Iizumi, T.; Kim, W.; Zhihong, S.; Nishimori, M.

    2016-12-01

    Global gridded crop models (GGCMs) are a key tool in deriving global food security scenarios under climate change. However, it is difficult for GGCMs to reproduce the reported yield growth patterns—rapid growth, yield stagnation and yield collapse. Here, we propose a set of parameterizations for GGCMs to capture the contributions to yield from technological improvements at the national and multi-decadal scales. These include country annual per capita gross domestic product (GDP)-based parameterizations for the nitrogen application rate and crop tolerance to stresses associated with high temperature, low temperature, water deficit and water excess. Using a GGCM combined with the parameterizations, we present global 140-year (1961-2100) yield growth simulations for maize, soybean, rice and wheat under multiple shared socioeconomic pathways (SSPs) and no climate change. The model reproduces the major characteristics of reported global and country yield growth patterns over the 1961-2013 period. Under the most rapid developmental pathway SSP5, the simulated global yields for 2091-2100, relative to 2001-2010, are the highest (1.21-1.82 times as high, with variations across the crops), followed by SSP1 (1.14-1.56 times as high), SSP2 (1.12-1.49 times as high), SSP4 (1.08-1.38 times as high) and SSP3 (1.08-1.36 times as high). Future country yield growth varies substantially by income level as well as by crop and by SSP. These yield pathways offer a new baseline for addressing the interdisciplinary questions related to global agricultural development, food security and climate change.

  18. Multi-channeled single chain variable fragment (scFv) based microfluidic device for explosives detection.

    PubMed

    Charles, Paul T; Davis, Jasmine; Adams, André A; Anderson, George P; Liu, Jinny L; Deschamps, Jeffrey R; Kusterbeck, Anne W

    2015-11-01

    The development of explosives detection technologies has increased significantly over the years as environmental and national security agencies implement tighter pollution control measures and methods for improving homeland security. 2, 4, 6-Trinitrotoluene (TNT), known primarily as a component in munitions, has been targeted for both its toxicity and carcinogenic properties that if present at high concentrations can be a detriment to both humans, marine and plant ecosystems. Enabling end users with environmental detection and monitoring systems capable of providing real-time, qualitative and quantitative chemical analysis of these toxic compounds would be extremely beneficial. Reported herein is the development of a multi-channeled microfluidic device immobilized with single chain fragment variable (scFv) recombinant proteins specific for the explosive, TNT. Fluorescence displacement immunoassays performed under constant flow demonstrated trace level sensitivity and specificity for TNT. The utility of three multi-channeled devices immobilized with either (1) scFv recombinant protein, (2) biotinylated-scFv (bt-scFv) and (3) monoclonal anti-TNT (whole IgG molecule) were investigated and compared. Fluorescence dose response curves, crossreactivity measurements and limits of detection (LOD) for TNT were determined. Fluorescence displacement immunoassays for TNT in natural seawater demonstrated detection limits at sub-parts-per-billion levels (0.5 ppb) utilizing the microfluidic device with immobilized bt-scFv. Published by Elsevier B.V.

  19. A feasibility study of evaluating transportation security systems and associated multi-modal efficiency impacts

    DOT National Transportation Integrated Search

    2006-08-01

    The overall purpose of this research project is to conduct a feasibility study and development of a general methodology to determine the impacts on multi-modal and system efficiency of alternative freight security measures. The methodology to be exam...

  20. Homeland security: sharing and managing critical incident information

    NASA Astrophysics Data System (ADS)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  1. Relation of Sex Hormone Levels With Prevalent and 10-Year Change in Aortic Distensibility Assessed by MRI: The Multi-Ethnic Study of Atherosclerosis.

    PubMed

    Subramanya, Vinita; Ambale-Venkatesh, Bharath; Ohyama, Yoshiaki; Zhao, Di; Nwabuo, Chike C; Post, Wendy S; Guallar, Eliseo; Ouyang, Pamela; Shah, Sanjiv J; Allison, Matthew A; Ndumele, Chiadi E; Vaidya, Dhananjay; Bluemke, David A; Lima, Joao A; Michos, Erin D

    2018-06-11

    Women experience a steeper decline in aortic elasticity related to aging compared to men. We examined whether sex hormone levels were associated with ascending aortic distensibility (AAD) in the Multi-Ethnic Study of Atherosclerosis. We studied 1,345 postmenopausal women and 1,532 men aged 45-84 years, who had serum sex hormone levels, AAD measured by phase-contrast cardiac magnetic resonance imaging, and ejection fraction>50% at baseline. Among these participants, 457 women and 548 men returned for follow-up magnetic resonance imaging 10-years later. Stratified by sex, and using mixed effects linear regression methods, we examined associations of sex hormones (as tertiles) with baseline and annual change in log-transformed AAD (mm Hg-110-3), adjusting for demographics, body size, lifestyle factors, mean arterial pressure, heart rate, hypertensive medication use (and in women, for hormone therapy use and years since menopause). The mean (SD) age was 65 (9) for women and 62 (10) years for men. AAD was lower in women than men (P < 0.001). In adjusted cross-sectional analysis, the highest tertile of free testosterone (compared to lowest) in women was significantly associated with lower AAD [-0.10 (-0.19, -0.01)] and the highest tertile of estradiol in men was associated with greater AAD [0.12 (0.04, 0.20)]. There were no associations of sex hormones with change in AAD over 10 years, albeit in a smaller sample size. Lower free testosterone in women and higher estradiol in men were associated with greater aortic distensibility at baseline, but not longitudinally. Sex hormone levels may account for differences in AAD between women and men.

  2. Forest Structure Characterization Using JPL's UAVSAR Multi-Baseline Polarimetric SAR Interferometry and Tomography

    NASA Technical Reports Server (NTRS)

    Neumann, Maxim; Hensley, Scott; Lavalle, Marco; Ahmed, Razi

    2013-01-01

    This paper concerns forest remote sensing using JPL's multi-baseline polarimetric interferometric UAVSAR data. It presents exemplary results and analyzes the possibilities and limitations of using SAR Tomography and Polarimetric SAR Interferometry (PolInSAR) techniques for the estimation of forest structure. Performance and error indicators for the applicability and reliability of the used multi-baseline (MB) multi-temporal (MT) PolInSAR random volume over ground (RVoG) model are discussed. Experimental results are presented based on JPL's L-band repeat-pass polarimetric interferometric UAVSAR data over temperate and tropical forest biomes in the Harvard Forest, Massachusetts, and in the La Amistad Park, Panama and Costa Rica. The results are partially compared with ground field measurements and with air-borne LVIS lidar data.

  3. Forest Structure Characterization Using Jpl's UAVSAR Multi-Baseline Polarimetric SAR Interferometry and Tomography

    NASA Technical Reports Server (NTRS)

    Neumann, Maxim; Hensley, Scott; Lavalle, Marco; Ahmed, Razi

    2013-01-01

    This paper concerns forest remote sensing using JPL's multi-baseline polarimetric interferometric UAVSAR data. It presents exemplary results and analyzes the possibilities and limitations of using SAR Tomography and Polarimetric SAR Interferometry (PolInSAR) techniques for the estimation of forest structure. Performance and error indicators for the applicability and reliability of the used multi-baseline (MB) multi-temporal (MT) PolInSAR random volume over ground (RVoG) model are discussed. Experimental results are presented based on JPL's L-band repeat-pass polarimetric interferometric UAVSAR data over temperate and tropical forest biomes in the Harvard Forest, Massachusetts, and in the La Amistad Park, Panama and Costa Rica. The results are partially compared with ground field measurements and with air-borne LVIS lidar data.

  4. Multi-Level Risk Factors for Suicidal Ideation Among at-Risk Adolescent Females: The Role of Hypothalamic-Pituitary-Adrenal Axis Responses to Stress

    PubMed Central

    Calhoun, Casey D.; Hastings, Paul D.; Rudolph, Karen D.; Nock, Matthew K.; Prinstein, Mitchell J.

    2014-01-01

    Adopting a multi-level approach, this study examined risk factors for adolescent suicidal ideation, with specific attention to (a) hypothalamic-pituitary-adrenal (HPA) axis stress responses and (b) the interplay between HPA-axis and other risk factors from multiple domains (i.e., psychological, interpersonal and biological). Participants were 138 adolescent females (Mage=14.13 years, SD=1.40) at risk for suicidal behaviors. At baseline, lifetime suicidal ideation and a number of risk factors were assessed (i.e., depressive symptoms, impulsiveness, pubertal status and peer stress). Participants were exposed to a psychosocial stress task and HPA-axis responses were assessed by measuring cortisol levels pre- and post-stressor. At 3 months post-baseline, suicidal ideation again was assessed. Using group-based trajectory modeling, three groups of cortisol stress-response patterns were identified (i.e., hyporesponsive, normative, and hyperresponsive). As compared to females in the normative and hyporesponsive group, females in the hyperresponsive group were more likely to report a lifetime history of suicidal ideation at baseline, above and beyond the effects of the other predictors. Moreover, as compared to females in the normative group, females in the hyperresponsive group were at increased risk for reporting suicidal ideation 3 months later, after controlling for prior ideation. No interactions between cortisol group and the other risk factors were significant, with the exception of a non-significant trend between impulsiveness and cortisol group on lifetime suicidal ideation. Findings highlight the importance of HPA-axis responses to acute stressors as a risk factor for suicidal ideation among adolescents. PMID:24958308

  5. Initiating change locally in bullying and aggression through the school environment (INCLUSIVE) trial: update to cluster randomised controlled trial protocol.

    PubMed

    Bonell, Chris; Mathiot, Anne; Allen, Elizabeth; Bevilacqua, Leonardo; Christie, Deborah; Elbourne, Diana; Fletcher, Adam; Grieve, Richard; Legood, Rosa; Scott, Stephen; Warren, Emily; Wiggins, Meg; Viner, Russell M

    2017-05-25

    Systematic reviews suggest that multi-component interventions are effective in reducing bullying victimisation and perpetration. We are undertaking a phase III randomised trial of the INCLUSIVE multi-component intervention. This trial aims to assess the effectiveness and cost-effectiveness of the INCLUSIVE intervention in reducing aggression and bullying victimisation in English secondary schools. This paper updates the original trial protocol published in 2014 (Trials 15:381, 2014) and presents the changes in the process evaluation protocol and the secondary outcome data collection. The methods are summarised as follows. cluster randomised trial. 40 state secondary schools. Outcomes assessed among the cohort of students at the end of year 7 (n = 6667) at baseline. INCLUSIVE is a multi-component school intervention including a social and emotional learning curriculum, changes to school environment (an action group comprising staff and students reviews local data on needs to review rules and policies and determine other local actions) and staff training in restorative practice. The intervention will be delivered by schools supported in the first two years by educational facilitators independent of the research team, with a third intervention year involving no external facilitation but all other elements. Comparator: normal practice. Primary: Two primary outcomes at student level assessed at baseline and at 36 months: 1. Aggressive behaviours in school: Edinburgh Study of Youth Transitions and Crime school misbehaviour subscale (ESYTC) 2. Bullying and victimisation: Gatehouse Bullying Scale (GBS) Secondary outcomes assessed at baseline, 24 and 36 months will include measures relating to the economic evaluation, psychosocial outcomes in students and staff and school-level truancy and exclusion rates. 20 schools per arm will provide 90% power to identify an effect size of 0.25 SD with a 5% significance level. Randomisation: eligible consenting schools were randomised stratified for single-sex versus mixed-sex schools, school-level deprivation and measures of school attainment. The trial involves independent research and intervention teams and is supervised by a Trial Steering Committee and a Data Monitoring Committee. Current Controlled Trials, ISRCTN10751359 . Registered on 11 March 2014.

  6. Design of Xen Hybrid Multiple Police Model

    NASA Astrophysics Data System (ADS)

    Sun, Lei; Lin, Renhao; Zhu, Xianwei

    2017-10-01

    Virtualization Technology has attracted more and more attention. As a popular open-source virtualization tools, XEN is used more and more frequently. Xsm, XEN security model, has also been widespread concern. The safety status classification has not been established in the XSM, and it uses the virtual machine as a managed object to make Dom0 a unique administrative domain that does not meet the minimum privilege. According to these questions, we design a Hybrid multiple police model named SV_HMPMD that organically integrates multiple single security policy models include DTE,RBAC,BLP. It can fullfill the requirement of confidentiality and integrity for security model and use different particle size to different domain. In order to improve BLP’s practicability, the model introduce multi-level security labels. In order to divide the privilege in detail, we combine DTE with RBAC. In order to oversize privilege, we limit the privilege of domain0.

  7. Injection of Contaminants into a Simulated Water Distribution System Equipped with Continuous Multi-Parameter Water Monitors

    EPA Science Inventory

    The U.S. EPA’s Technology Testing and Evaluation Program has been charged by EPA to evaluate the performance of commercially available water security-related technologies. Multi-parameter water monitors for distributions systems have been evaluated as such a water security techn...

  8. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Witzke, Edward L.

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process,more » this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.« less

  10. Increased risk of coronary artery calcification progression in subjects with high baseline Lp(a) levels: The Kangbuk Samsung Health Study.

    PubMed

    Cho, Jung Hwan; Lee, Da Young; Lee, Eun Seo; Kim, Jihyun; Park, Se Eun; Park, Cheol-Young; Lee, Won-Young; Oh, Ki-Won; Park, Sung-Woo; Rhee, Eun-Jung

    2016-11-01

    Results from previous studies support the association of lipoprotein(a) [Lp(a)] levels and coronary artery disease risk. In this study, we analyzed the association between baseline Lp(a) levels and future progression of coronary artery calcification (CAC) in apparently healthy Korean adults. A total of 2611 participants (mean age: 41years, 92% mend) who underwent a routine health check-up in 2010 and 2014 were enrolled. Coronary artery calcium score (CACS) were measured by multi-detector computed tomography. Baseline Lp(a) was measured by high-sensitivity immunoturbidimetric assay. Progression of CAC was defined as a change in CACS >0 over four years. Bivariate correlation analyses with baseline Lp(a) and other metabolic parameters revealed age, total cholesterol, HDL-C, LDL-C and CACS to have a significant positive correlation, while body weight, fasting glucose level, blood pressure and triglyceride level were negatively correlated with baseline Lp(a) level. After four years of follow-up, 635 subjects (24.3%) had CAC progression. The participants who had CAC progression were older, composed of more men, more obese, and had higher fasting glucose levels and worse baseline lipid profiles compared to those who did not have CAC progression. The mean serum Lp(a) level was significantly higher in subjects who had CAC progression compared to those who did not (32.5 vs. 28.9mg/dL, p<0.01). When the risk for CAC progression according to baseline Lp(a) was calculated, those with Lp(a) level≥50mg/dL had an odds ratio of 1.333 (95% CI 1.027-1.730) for CAC progression compared to those with Lp(a)<50mg/dL after adjusting for confounding factors. In this study, the subjects who had higher Lp(a) were at significantly higher risk for CAC progression after four years of follow-up, suggesting the role of high Lp(a) in CAC progression. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Molecular transport network security using multi-wavelength optical spins.

    PubMed

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  12. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  13. Very low food security predicts obesity predominantly in California Hispanic men and women.

    PubMed

    Leung, Cindy W; Williams, David R; Villamor, Eduardo

    2012-12-01

    A high prevalence of food insecurity has persisted in the USA for the past two decades. Previous studies suggest that the association between food insecurity and obesity may vary by gender and race/ethnicity. We examined whether food insecurity was associated with BMI and obesity within gender and racial/ethnic groups in a large, diverse sample of low-income adults. A cross-sectional analysis of a large population-based health survey. We compared the distribution of BMI and obesity by food security levels within gender and racial/ethnic categories. Data were derived from the 2003-2009 waves of the California Health Interview Survey. The study sample included 35 747 non-elderly adults with households ≤200 % of the federal poverty level. Among Hispanic men, very low food security was associated with a 1.0 kg/m2 higher BMI (95 % CI 0.3, 1.7 kg/m2) and a 36 % higher prevalence of obesity (95 % CI 17, 58 %) after multivariate adjustment. Among Hispanic women, very low food security was associated with a 1.1 kg/m2 higher BMI (95 % CI 0.4, 1.9 kg/m2) and a 22 % higher prevalence of obesity (95 % CI 8, 38 %). Positive associations were also observed for Asian women and multi-racial men. No significant associations were observed for non-Hispanic whites, African Americans, Asian men or multi-racial women. Our results suggest that the association of food insecurity and obesity is limited to individuals of certain low-income, minority racial/ethnic groups. Whether targeted interventions to address food insecurity in these individuals may also decrease obesity risk deserves further investigation.

  14. Assessment of global water security: moving beyond water scarcity assessment

    NASA Astrophysics Data System (ADS)

    Wada, Y.; Gain, A. K.; Giupponi, C.

    2015-12-01

    Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).

  15. Evaluating options for balancing the water-electricity nexus in California: Part 2--greenhouse gas and renewable energy utilization impacts.

    PubMed

    Tarroja, Brian; AghaKouchak, Amir; Sobhani, Reza; Feldman, David; Jiang, Sunny; Samuelsen, Scott

    2014-11-01

    A study was conducted to compare the technical potential and effectiveness of different water supply options for securing water availability in a large-scale, interconnected water supply system under historical and climate-change augmented inflow and demand conditions. Part 2 of the study focused on determining the greenhouse gas and renewable energy utilization impacts of different pathways to stabilize major surface reservoir levels. Using a detailed electric grid model and taking into account impacts on the operation of the water supply infrastructure, the greenhouse gas emissions and effect on overall grid renewable penetration level was calculated for each water supply option portfolio that successfully secured water availability from Part 1. The effects on the energy signature of water supply infrastructure were found to be just as important as that of the fundamental processes for each option. Under historical (baseline) conditions, many option portfolios were capable of securing surface reservoir levels with a net neutral or negative effect on emissions and a benefit for renewable energy utilization. Under climate change augmented conditions, however, careful selection of the water supply option portfolio was required to prevent imposing major emissions increases for the system. Overall, this analysis provided quantitative insight into the tradeoffs associated with choosing different pathways for securing California's water supply. Copyright © 2014 Elsevier B.V. All rights reserved.

  16. Influence of maternal depression on household food insecurity for low-income families.

    PubMed

    Garg, Arvin; Toy, Sarah; Tripodis, Yorghos; Cook, John; Cordella, Nick

    2015-01-01

    To examine whether maternal depression predicts future household food insecurity for low-income families. This was a secondary data analysis using data from the Early Childhood Longitudinal Study, Birth Cohort (ECLS-B). The study cohort consisted of 2917 low-income mothers, defined as <185% federal poverty level, who were food secure at baseline. Maternal data collected when children were 9 and 24 months of age were used. Data at 9 months were considered baseline, and data at 24 months were considered follow-up. Baseline maternal depressive symptoms were measured by a 12-item abbreviated version of the Center for Epidemiologic Studies Depression Scale. Household food insecurity at follow-up was measured by the US Department of Agriculture Household Food Security Scale. At baseline, 16% of mothers were depressed (raw score >9). Most mothers were white, unemployed, and born in the United States. The majority received Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) (86%); 39% received Supplemental Nutrition Assistance Program (SNAP). At follow-up, 11.8% of mothers reported household food insecurity. In multivariable analysis, maternal depression at baseline was significantly associated with food insecurity at follow-up (adjusted odds ratio 1.50; 95% confidence interval 1.06-2.12). Our results suggest that maternal depression is an independent risk factor for household food insecurity in low-income families with young children. Multidisciplinary interventions embedded within and outside the pediatric medical home should be developed to identify depressed mothers and link them to community-based mental health and food resources. Further longitudinal and interventional studies are needed to understand and address the complex relationship between poverty, maternal depression, social safety nets, and food insecurity. Copyright © 2015 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  17. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  18. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.

    PubMed

    Miao, Yinbin; Ma, Jianfeng; Liu, Ximeng; Wei, Fushan; Liu, Zhiquan; Wang, Xu An

    2016-11-01

    Online personal health record (PHR) is more inclined to shift data storage and search operations to cloud server so as to enjoy the elastic resources and lessen computational burden in cloud storage. As multiple patients' data is always stored in the cloud server simultaneously, it is a challenge to guarantee the confidentiality of PHR data and allow data users to search encrypted data in an efficient and privacy-preserving way. To this end, we design a secure cryptographic primitive called as attribute-based multi-keyword search over encrypted personal health records in multi-owner setting to support both fine-grained access control and multi-keyword search via Ciphertext-Policy Attribute-Based Encryption. Formal security analysis proves our scheme is selectively secure against chosen-keyword attack. As a further contribution, we conduct empirical experiments over real-world dataset to show its feasibility and practicality in a broad range of actual scenarios without incurring additional computational burden.

  19. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  20. Together We STRIDE: A quasi-experimental trial testing the effectiveness of a multi-level obesity intervention for Hispanic children in rural communities.

    PubMed

    Ko, Linda K; Rillamas-Sun, Eileen; Bishop, Sonia; Cisneros, Oralia; Holte, Sarah; Thompson, Beti

    2018-04-01

    Hispanic children are disproportionally overweight and obese compared to their non-Hispanic white counterparts in the US. Community-wide, multi-level interventions have been successful to promote healthier nutrition, increased physical activity (PA), and weight loss. Using community-based participatory approach (CBPR) that engages community members in rural Hispanic communities is a promising way to promote behavior change, and ultimately weight loss among Hispanic children. Led by a community-academic partnership, the Together We STRIDE (Strategizing Together Relevant Interventions for Diet and Exercise) aims to test the effectiveness of a community-wide, multi-level intervention to promote healthier diets, increased PA, and weight loss among Hispanic children. The Together We STRIDE is a parallel quasi-experimental trial with a goal of recruiting 900 children aged 8-12 years nested within two communities (one intervention and one comparison). Children will be recruited from their respective elementary schools. Components of the 2-year multi-level intervention include comic books (individual-level), multi-generational nutrition and PA classes (family-level), teacher-led PA breaks and media literacy education (school-level), family nights, a farmer's market and a community PA event (known as ciclovia) at the community-level. Children from the comparison community will receive two newsletters. Height and weight measures will be collected from children in both communities at three time points (baseline, 6-months, and 18-months). The Together We STRIDE study aims to promote healthier diet and increased PA to produce healthy weight among Hispanic children. The use of CBPR approach and the engagement of the community will springboard strategies for intervention' sustainability. Clinical Trials Registration Number: NCT02982759 Retrospectively registered. Copyright © 2018 Elsevier Inc. All rights reserved.

  1. Distress Tolerance and Social Support in Adolescence: Predicting Risk for Internalizing and Externalizing Symptoms Following a Natural Disaster

    PubMed Central

    Cohen, Joseph R.; Danielson, Carla Kmett; Adams, Zachary W.; Ruggiero, Kenneth J.

    2016-01-01

    The purpose of the multi-measure, multi-wave, longitudinal study was to examine the interactive relation between behavioral distress tolerance (DT) and perceived social support (PSS) in 352 tornado-exposed adolescents aged 12–17 years (M=14.44; SD=1.74). At baseline, adolescents completed a computer-based task for DT, and self-report measures of PSS, depressed mood, posttraumatic stress disorder (PTSD), substance use, and interpersonal conflict. Symptoms also were assessed 4 and 12 months after baseline. Findings showed that lower levels of DT together with lower levels of PSS conferred risk for elevated symptoms of prospective depression (t(262)= −2.04, p=.04; reffect size=0.13) and PTSD (t(195)= −2.08, p=.04; reffect size=0.15) following a tornado. However, only PSS was significant in substance use t(139)=2.20, p=.03; reffect size=0.18) and conflict (t(138)=−4.05, p<.0001; reffect size=0.33) in our sample. Implications regarding adolescent DT, the transdiagnostic nature of PSS, and the clinical applications of our findings in the aftermath of a natural disaster are discussed. PMID:28163364

  2. Positive Socialization Mechanisms in Secure and Insecure Parent-Child Dyads: Two Longitudinal Studies

    ERIC Educational Resources Information Center

    Kochanska, Grazyna; Woodard, Jarilyn; Kim, Sanghag; Koenig, Jamie L.; Yoon, Jeung Eun; Barry, Robin A.

    2010-01-01

    Background: Implications of early attachment have been extensively studied, but little is known about its long-term indirect sequelae, where early security organization moderates future parent-child relationships, serving as a catalyst for adaptive and maladaptive processes. Two longitudinal multi-trait multi-method studies examined whether early…

  3. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  4. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  5. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  6. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  7. 7 CFR 3560.610 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  8. Secure optical generalized filter bank multi-carrier system based on cubic constellation masked method.

    PubMed

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun

    2015-06-15

    A secure optical generalized filter bank multi-carrier (GFBMC) system with carrier-less amplitude-phase (CAP) modulation is proposed in this Letter. The security is realized through cubic constellation-masked method. Large key space and more flexibility masking can be obtained by cubic constellation masking aligning with the filter bank. An experiment of 18 Gb/s encrypted GFBMC/CAP system with 25-km single-mode fiber transmission is performed to demonstrate the feasibility of the proposed method.

  9. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  10. Farm Management Support on Cloud Computing Platform: A System for Cropland Monitoring Using Multi-Source Remotely Sensed Data

    NASA Astrophysics Data System (ADS)

    Coburn, C. A.; Qin, Y.; Zhang, J.; Staenz, K.

    2015-12-01

    Food security is one of the most pressing issues facing humankind. Recent estimates predict that over one billion people don't have enough food to meet their basic nutritional needs. The ability of remote sensing tools to monitor and model crop production and predict crop yield is essential for providing governments and farmers with vital information to ensure food security. Google Earth Engine (GEE) is a cloud computing platform, which integrates storage and processing algorithms for massive remotely sensed imagery and vector data sets. By providing the capabilities of storing and analyzing the data sets, it provides an ideal platform for the development of advanced analytic tools for extracting key variables used in regional and national food security systems. With the high performance computing and storing capabilities of GEE, a cloud-computing based system for near real-time crop land monitoring was developed using multi-source remotely sensed data over large areas. The system is able to process and visualize the MODIS time series NDVI profile in conjunction with Landsat 8 image segmentation for crop monitoring. With multi-temporal Landsat 8 imagery, the crop fields are extracted using the image segmentation algorithm developed by Baatz et al.[1]. The MODIS time series NDVI data are modeled by TIMESAT [2], a software package developed for analyzing time series of satellite data. The seasonality of MODIS time series data, for example, the start date of the growing season, length of growing season, and NDVI peak at a field-level are obtained for evaluating the crop-growth conditions. The system fuses MODIS time series NDVI data and Landsat 8 imagery to provide information of near real-time crop-growth conditions through the visualization of MODIS NDVI time series and comparison of multi-year NDVI profiles. Stakeholders, i.e., farmers and government officers, are able to obtain crop-growth information at crop-field level online. This unique utilization of GEE in combination with advanced analytic and extraction techniques provides a vital remote sensing tool for decision makers and scientists with a high-degree of flexibility to adapt to different uses.

  11. The Application of Security Concepts to the Personnel Database for the Indonesian Navy.

    DTIC Science & Technology

    1983-09-01

    Postgraduate School, lionterey, California, June 1982. Since 1977, the Indonesian Navy Data Center (DISPULAHTAL) has collected and processed pa-sonnel data to...zel dlta Processing in the Indonesian Navy. 4 -a "o ’% ’." 5. ’S 1 1’S~. . . II. THE _IIIT_ IPR2ES1D PERSONSEL DATABASE SYSTEM The present Database...LEVEL *USER PROCESSING :CONCURRENT MULTI USER/LEVEL Ulf, U 3 , U 3 . . . users S. .. ...... secret C. .. ...... classified U .. .. ..... unclassified

  12. Family, Community and Clinic Collaboration to Treat Overweight and Obese Children: Stanford GOALS -- a Randomized Controlled Trial of a Three-Year, Multi-Component, Multi-Level, Multi-Setting Intervention

    PubMed Central

    Robinson, Thomas N.; Matheson, Donna; Desai, Manisha; Wilson, Darrell M.; Weintraub, Dana L.; Haskell, William L.; McClain, Arianna; McClure, Samuel; Banda, Jorge; Sanders, Lee M.; Haydel, K. Farish; Killen, Joel D.

    2013-01-01

    Objective To test the effects of a three-year, community-based, multi-component, multi-level, multi-setting (MMM) approach for treating overweight and obese children. Design Two-arm, parallel group, randomized controlled trial with measures at baseline, 12, 24, and 36 months after randomization. Participants Seven through eleven year old, overweight and obese children (BMI ≥ 85th percentile) and their parents/caregivers recruited from community locations in low-income, primarily Latino neighborhoods in Northern California. Interventions Families are randomized to the MMM intervention versus a community health education active-placebo comparison intervention. Interventions last for three years for each participant. The MMM intervention includes a community-based after school team sports program designed specifically for overweight and obese children, a home-based family intervention to reduce screen time, alter the home food/eating environment, and promote self-regulatory skills for eating and activity behavior change, and a primary care behavioral counseling intervention linked to the community and home interventions. The active-placebo comparison intervention includes semi-annual health education home visits, monthly health education newsletters for children and for parents/guardians, and a series of community-based health education events for families. Main Outcome Measure Body mass index trajectory over the three-year study. Secondary outcome measures include waist circumference, triceps skinfold thickness, accelerometer-measured physical activity, 24-hour dietary recalls, screen time and other sedentary behaviors, blood pressure, fasting lipids, glucose, insulin, hemoglobin A1c, C-reactive protein, alanine aminotransferase, and psychosocial measures. Conclusions The Stanford GOALS trial is testing the efficacy of a novel community-based multi-component, multi-level, multi-setting treatment for childhood overweight and obesity in low-income, Latino families. PMID:24028942

  13. Family, community and clinic collaboration to treat overweight and obese children: Stanford GOALS-A randomized controlled trial of a three-year, multi-component, multi-level, multi-setting intervention.

    PubMed

    Robinson, Thomas N; Matheson, Donna; Desai, Manisha; Wilson, Darrell M; Weintraub, Dana L; Haskell, William L; McClain, Arianna; McClure, Samuel; Banda, Jorge A; Sanders, Lee M; Haydel, K Farish; Killen, Joel D

    2013-11-01

    To test the effects of a three-year, community-based, multi-component, multi-level, multi-setting (MMM) approach for treating overweight and obese children. Two-arm, parallel group, randomized controlled trial with measures at baseline, 12, 24, and 36 months after randomization. Seven through eleven year old, overweight and obese children (BMI ≥ 85th percentile) and their parents/caregivers recruited from community locations in low-income, primarily Latino neighborhoods in Northern California. Families are randomized to the MMM intervention versus a community health education active-placebo comparison intervention. Interventions last for three years for each participant. The MMM intervention includes a community-based after school team sports program designed specifically for overweight and obese children, a home-based family intervention to reduce screen time, alter the home food/eating environment, and promote self-regulatory skills for eating and activity behavior change, and a primary care behavioral counseling intervention linked to the community and home interventions. The active-placebo comparison intervention includes semi-annual health education home visits, monthly health education newsletters for children and for parents/guardians, and a series of community-based health education events for families. Body mass index trajectory over the three-year study. Secondary outcome measures include waist circumference, triceps skinfold thickness, accelerometer-measured physical activity, 24-hour dietary recalls, screen time and other sedentary behaviors, blood pressure, fasting lipids, glucose, insulin, hemoglobin A1c, C-reactive protein, alanine aminotransferase, and psychosocial measures. The Stanford GOALS trial is testing the efficacy of a novel community-based multi-component, multi-level, multi-setting treatment for childhood overweight and obesity in low-income, Latino families. © 2013 Elsevier Inc. All rights reserved.

  14. Cardiovascular risk factors in multi-ethnic middle school students: the HEALTHY primary prevention trial.

    PubMed

    Willi, S M; Hirst, K; Jago, R; Buse, J; Kaufman, F; El Ghormli, L; Bassin, S; Elliot, D; Hale, D E

    2012-06-01

    The objective of this study was to examine the effects of an integrated, multi-component, school-based intervention programme on cardiovascular disease (CVD) risk factors among a multi-ethnic cohort of middle school students. HEALTHY was a cluster randomized, controlled, primary prevention trial. Middle school was the unit of randomization and intervention. Half of the schools were assigned to an intervention programme consisting of changes in the total school food environment and physical education classes, enhanced by educational outreach and behaviour change activities and promoted by a social marketing campaign consisting of reinforcing messages and images. Outcome data reported (anthropometrics, blood pressure and fasting lipid levels) were collected on a cohort of students enrolled at the start of 6th grade (∼11-12 years old) and followed to end of 8th grade (∼13-14 years old). Forty-two middle schools were enrolled at seven field centres; 4363 students provided both informed consent and CVD data at baseline and end of study. The sample was 52.7% female, 54.5% Hispanic, 17.6% non-Hispanic Black, 19.4% non-Hispanic White and 8.5% other racial/ethnic combinations, and 49.6% were categorized as overweight or obese (body mass index ≥ 85th percentile) at baseline. A significant intervention effect was detected in the prevalence of hypertension in non-Hispanic Black and White males. The intervention produced no significant changes in lipid levels. The prevalence of some CVD risk factors is high in minority middle school youth, particularly males. A multi-component, school-based programme achieved only modest reductions in these risk factors; however, promising findings occurred in non-Hispanic Black and White males with hypertension. © 2012 The Authors. Pediatric Obesity © 2012 International Association for the Study of Obesity.

  15. Secure satellite communication using multi-photon tolerant quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.

    2015-09-01

    This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.

  16. Using semantic technologies and the OSU ontology for modelling context and activities in multi-sensory surveillance systems

    NASA Astrophysics Data System (ADS)

    Gómez A, Héctor F.; Martínez-Tomás, Rafael; Arias Tapia, Susana A.; Rincón Zamorano, Mariano

    2014-04-01

    Automatic systems that monitor human behaviour for detecting security problems are a challenge today. Previously, our group defined the Horus framework, which is a modular architecture for the integration of multi-sensor monitoring stages. In this work, structure and technologies required for high-level semantic stages of Horus are proposed, and the associated methodological principles established with the aim of recognising specific behaviours and situations. Our methodology distinguishes three semantic levels of events: low level (compromised with sensors), medium level (compromised with context), and high level (target behaviours). The ontology for surveillance and ubiquitous computing has been used to integrate ontologies from specific domains and together with semantic technologies have facilitated the modelling and implementation of scenes and situations by reusing components. A home context and a supermarket context were modelled following this approach, where three suspicious activities were monitored via different virtual sensors. The experiments demonstrate that our proposals facilitate the rapid prototyping of this kind of systems.

  17. Control Systems Cyber Security:Defense in Depth Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less

  18. Control Systems Cyber Security: Defense-in-Depth Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less

  19. A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bridges, Robert A.; Collins, John P.; Ferragut, Erik M.

    This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models describing coarse subgraphs are built by aggregating node probabilities, and these related hierarchical models simultaneously detect deviations from expectation. This technique provides insight into a graph's structure and internal context that may shed light on a detected event. Additionally, this multi-scale analysis facilitatesmore » intuitive visualizations by allowing users to narrow focus from an anomalous graph to particular subgraphs or nodes causing the anomaly. For evaluation, two hierarchical anomaly detectors are tested against a baseline Gaussian method on a series of sampled graphs. We demonstrate that our graph statistics-based approach outperforms both a distribution-based detector and the baseline in a labeled setting with community structure, and it accurately detects anomalies in synthetic and real-world datasets at the node, subgraph, and graph levels. Furthermore, to illustrate the accessibility of information made possible via this technique, the anomaly detector and an associated interactive visualization tool are tested on NCAA football data, where teams and conferences that moved within the league are identified with perfect recall, and precision greater than 0.786.« less

  20. A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization

    DOE PAGES

    Bridges, Robert A.; Collins, John P.; Ferragut, Erik M.; ...

    2016-01-01

    This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models describing coarse subgraphs are built by aggregating node probabilities, and these related hierarchical models simultaneously detect deviations from expectation. This technique provides insight into a graph's structure and internal context that may shed light on a detected event. Additionally, this multi-scale analysis facilitatesmore » intuitive visualizations by allowing users to narrow focus from an anomalous graph to particular subgraphs or nodes causing the anomaly. For evaluation, two hierarchical anomaly detectors are tested against a baseline Gaussian method on a series of sampled graphs. We demonstrate that our graph statistics-based approach outperforms both a distribution-based detector and the baseline in a labeled setting with community structure, and it accurately detects anomalies in synthetic and real-world datasets at the node, subgraph, and graph levels. Furthermore, to illustrate the accessibility of information made possible via this technique, the anomaly detector and an associated interactive visualization tool are tested on NCAA football data, where teams and conferences that moved within the league are identified with perfect recall, and precision greater than 0.786.« less

  1. A prospective cohort study of acute kidney injury in multi-stage ultramarathon runners: the Biochemistry in Endurance Runner Study (BIERS).

    PubMed

    Lipman, Grant S; Krabak, Brian J; Waite, Brandee L; Logan, Sarah B; Menon, Anil; Chan, Garrett K

    2014-01-01

    The purpose of the study was to evaluate the prevalence of acute kidney injury (AKI) during a multi-stage ultramarathon foot race. A prospective observational study was taken during the Gobi 2008; Sahara 2008; and Namibia 2009 RacingThePlanet 7-day, 6-stage, 150-mile foot ultramarathons. Blood was analyzed before, and immediately after stage 1 (25 miles), 3 (75 miles), and 5 (140 miles). Creatinine (Cr), glomerular filtration rate (GFR), and incidence of AKI were calculated and defined by RIFLE criteria. Thirty participants (76% male, mean age 40 + 11 years) were enrolled. There were significant declines in GFR after each stage compared with the pre-race baseline (p < 0.001), with the majority of participants (55-80%) incurring AKI. The majority of study participants encountered significant renal impairment; however, no apparent cumulative effect was observed, with resolution of renal function to near baseline levels between stages.

  2. Changes in N-terminal pro-B-type natriuretic peptide and incidence of diabetes: The Multi-Ethnic Study of Atherosclerosis (MESA)

    PubMed Central

    Sanchez, O.A.; Duprez, D.A.; Bahrami, H.; Peralta, C.A.; Daniels, L.B.; Lima, J.A.; Maisel, A.; Folsom, A.R.; Jacobs, D.R.

    2016-01-01

    Aims This study looked at whether the inverse association of circulating N-terminal pro-B-type natriuretic peptide (NT-proBNP) with incident diabetes is modified by changes in NT-proBNP (ΔNT-proBNP) levels. Methods lasma NT-proBNP was assayed at baseline and 3.2 years later (visit 3) in the Multi-Ethnic Study of Atherosclerosis (MESA).ΔNT-proBNP was calculated as NT-proBNPvisit3 − NT-proBNPbaseline. A Poisson distribution was fitted to determine the incidence density of diabetes, adjusted for age, race, gender, educational attainment, antihypertensive medication, total intentional exercise and plasma IL-6 levels. In the primary analysis (n = 3236 without diabetes up to visit 3, followed for a mean of 6.3 years), incidence density was regressed for the following categories of baseline NT-proBNP: (1) <54.4 pg/mL; (2) 54.4–85.9 pg/mL; and (3) 86–54.2 pg/mL. This was crossed with categories of ΔNT-proBNP as medians (ranges): (1) −6.2 (−131–11.7) pg/mL; (2) 19.8 (11.8–30.1) pg/mL; (3) 44.0 (30.2–67.9) pg/mL; and (4) 111.2 (68.0–3749.9) pg/mL. Results The incidence density of diabetes followed a U-shaped association across categories of ΔNT-proBNP within categories of baseline NT-proBNP after adjusting for other covariates (P = 0.02). At each level of baseline NT-proBNP, the incidence density of diabetes was lowest for small-to-moderate increases in NT-proBNP. Conclusion This analysis suggests that NT-proBNP has a biphasic association with diabetes in which the risk of incident diabetes decreases within a ‘physiological range’ of ΔNT-proBNP, and plateaus or increases as NT-proBNP concentrations increase, probably in response to pathophysiological conditions leading to high levels of NT-proBNP. PMID:26047677

  3. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  4. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  5. Baseline Suitability Analysis

    DTIC Science & Technology

    2013-07-18

    VA) • DFAS • Human Resources - HR Shared Services (Indianapolis, IN) • Personnel Security - HR Shared Services (Indianapolis, IN) DHRA...Security (Camp Lejeune) No Yes Yes AAFES Human Resources No No No Force Protection Yes Yes Yes DFAS Human Resources - HR Shared Services No...No No Personnel Security - HR Shared Services Yes Yes Yes DLA Human Resources No No Yes Personnel Security Yes Yes Yes DoDEA Human

  6. Do descriptive norms related to parents and friends predict fruit and vegetable intake similarly among 11-year-old girls and boys?

    PubMed

    Lehto, Elviira; Ray, Carola; Haukkala, Ari; Yngve, Agneta; Thorsdottir, Inga; Roos, Eva

    2016-01-14

    We examined whether there are sex differences in children's fruit and vegetable (FV) intake and in descriptive norms (i.e. perceived FV intake) related to parents and friends. We also studied whether friends' impact is as important as that of parents on children's FV intake. Data from the PRO GREENS project in Finland were obtained from 424 children at the age 11 years at baseline. At baseline, 2009 children filled in a questionnaire about descriptive norms conceptualised as perceived FV intake of their parents and friends. They also filled in a validated FFQ that assessed their FV intake both at baseline and in the follow-up in 2010. The associations were examined with multi-level regression analyses with multi-group comparisons. Girls reported higher perceived FV intake of friends and higher own fruit intake at baseline, compared with boys, and higher vegetable intake both at baseline and in the follow-up. Perceived FV intake of parents and friends was positively associated with both girls' and boys' FV intake in both study years. The impact of perceived fruit intake of the mother was stronger among boys. The change in children's FV intake was affected only by perceived FV intake of father and friends. No large sex differences in descriptive norms were found, but the impact of friends on children's FV intake can generally be considered as important as that of parents. Future interventions could benefit from taking into account friends' impact as role models on children's FV intake.

  7. The role of child and parental mentalizing for the development of conduct problems over time.

    PubMed

    Ha, Carolyn; Sharp, Carla; Goodyer, Ian

    2011-06-01

    The current study aimed to investigate the role of parental and child mentalizing in the development of conduct problems over time in a community sample of 7- to 11-year-olds (N = 659). To measure child mentalizing, children were asked to complete a social vignettes task at baseline as a measure of distorted mentalizing. Parents (primarily mothers) were asked to complete the same task, guessing their child's responses in the social scenarios as a measure of maternal mentalizing. Conduct problems were evaluated using repeated measures from multi-informant (self-, teacher-, and parent-report) questionnaires completed at baseline and 1-year follow-up. As expected, children who had an overly positive mentalizing style were more likely to be reported by teachers as having conduct problems at 1-year follow-up. These findings held when controlling for baseline conduct problems, IQ, SES, and sex. Findings for maternal mentalizing were significant for follow-up parent-report conduct problem symptoms at the bivariate level of analyses, but not at the multivariate level when controlling for baseline conduct problems and age. These findings extend previous reports by providing predictive validity for distorted mentalizing in the development of conduct problems.

  8. 7 CFR 3560.560 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  9. 7 CFR 3560.560 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 15 2011-01-01 2011-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  10. 7 CFR 3560.560 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  11. 7 CFR 3560.560 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 15 2014-01-01 2014-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  12. 7 CFR 3560.560 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  13. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    PubMed

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  14. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America

    PubMed Central

    Baird, Theodore

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601

  15. Adjusting to Social Change - A Multi-Level Analysis in Three Cultures

    DTIC Science & Technology

    2013-08-01

    including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and completing and reviewing the...presence is often associated with the large-scale movement of civilian populations, and who need to better understand the Distribution A: Approved for...valuing openness to change (self-direction, stimulation and sometimes hedonism values) with valuing conservation (conformity, tradition and security

  16. Understanding Cortisol Reactivity across the Day at Child Care: The Potential Buffering Role of Secure Attachments to Caregivers

    ERIC Educational Resources Information Center

    Badanes, Lisa S.; Dmitrieva, Julia; Watamura, Sarah Enos

    2012-01-01

    Full-day center-based child care has been repeatedly associated with rising cortisol across the child care day. This study addressed the potential buffering role of attachment to mothers and lead teachers in 110 preschoolers while at child care. Using multi-level modeling and controlling for a number of child, family, and child care factors,…

  17. Enhancing physical and social environments to reduce obesity among public housing residents: rationale, trial design, and baseline data for the Healthy Families study.

    PubMed

    Quintiliani, Lisa M; DeBiasse, Michele A; Branco, Jamie M; Bhosrekar, Sarah Gees; Rorie, Jo-Anna L; Bowen, Deborah J

    2014-11-01

    Intervention programs that change environments have the potential for greater population impact on obesity compared to individual-level programs. We began a cluster randomized, multi-component multi-level intervention to improve weight, diet, and physical activity among low-socioeconomic status public housing residents. Here we describe the rationale, intervention design, and baseline survey data. After approaching 12 developments, ten were randomized to intervention (n=5) or assessment-only control (n=5). All residents in intervention developments are welcome to attend any intervention component: health screenings, mobile food bus, walking groups, cooking demonstrations, and a social media campaign; all of which are facilitated by community health workers who are residents trained in health outreach. To evaluate weight and behavioral outcomes, a subgroup of female residents and their daughters age 8-15 were recruited into an evaluation cohort. In total, 211 households completed the survey (RR=46.44%). Respondents were Latino (63%), Black (24%), and had ≤ high school education (64%). Respondents reported ≤2 servings of fruits & vegetables/day (62%), visiting fast food restaurants 1+ times/week (32%), and drinking soft drinks daily or more (27%). The only difference between randomized groups was race/ethnicity, with more Black residents in the intervention vs. control group (28% vs. 19%, p=0.0146). Among low-socioeconomic status urban public housing residents, we successfully recruited and randomized families into a multi-level intervention targeting obesity. If successful, this intervention model could be adopted in other public housing developments or entities that also employ community health workers, such as food assistance programs or hospitals. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Scanning confocal slit photon counter measurements of post-PRK haze in two-year study

    NASA Astrophysics Data System (ADS)

    Taboada, John; Gaines, David; Perez, Mary A.; Waller, Steve G.; Ivan, Douglas J.; Baldwin, J. Bruce; LoRusso, Frank; Tutt, Ronald C.; Thompson, B.; Perez, Jose; Tredici, Thomas; Johnson, Dan A.

    2001-06-01

    In our study, a group of 80 United States Air Force, non- flying personnel will undergo photorefractive corneal surgery for moderate levels of myopia (< 6 diopters) and 20 will serve as controls. As of this report, approximately 56 have had the treatment. Of these, only about 59% of the treated eyes showed even a trace (.5) level of clinically assessed haze at any time. We report on the use of a recently developed instrument designed for the objective measurement of these low levels of haze in treated corneas. The sensitivity of the instrument is derived from the use of a scanning confocal slit photon counter. The use of a physical standard for calibration secures accuracy and reproducibility over an extensive period of time. Our haze measurements in this study revealed a very low level increase from baseline values for these patients. The typical increase over baseline was of the same magnitude as the variability in the observations, although the inherent variability in the measurements was approximately 0.25 times the value of the patient's haze variability.

  19. Children's thoughts and feelings about their donor and security of attachment to their solo mothers in middle childhood.

    PubMed

    Zadeh, S; Jones, C M; Basi, T; Golombok, S

    2017-04-01

    What is the relationship between children's thoughts and feelings about their donor and their security of attachment to their solo mothers in middle childhood? Children with higher levels of secure-autonomous attachment to their mothers were more likely to have positive perceptions of the donor, and those with higher levels of insecure-disorganized attachment to their mothers were more likely to perceive him negatively. There is limited understanding of the factors that contribute to children's thoughts and feelings about their donor in solo mother families. In adolescence, an association was found between adolescents' curiosity about donor conception and their security of attachment to their mothers. 19 children were administered the Friends and Family Interview and Donor Conception Interview between December 2015 and March 2016 as part of the second phase of a longitudinal, multi-method, multi-informant study of solo mother families. All children were aged between 7 and 13 years and had been conceived by donor insemination to solo mothers. Interviews were conducted in participants' homes. The Friends and Family Interview was rated according to a standardized coding scheme designed to measure security of attachment in terms of secure-autonomous, insecure-dismissing, insecure-preoccupied and insecure-disorganized attachment patterns. Quantitative analyses of the Donor Conception Interview yielded two factors: interest in the donor and perceptions of the donor. Qualitative analyses of the Donor Conception Interview were conducted using qualitative content analysis and thematic analysis. Statistically significant associations were found between the perception of the donor scale and the secure-autonomous and insecure-disorganized attachment ratings. Children with higher levels of secure-autonomous attachment to their mothers were more likely to have positive perceptions of the donor (r = 0.549, P = 0.015), and those with higher levels of insecure-disorganized attachment to their mothers were more likely to perceive him negatively (r = -0.632, P = 0.004). Children's narratives about the donor depicted him as a stranger (n = 8), a biological father (n = 4), a social parent (n = 3), or in ambivalent terms (n = 4). Findings are limited by the wide age range of children within a small overall sample size. Participants were those willing and able to take part in research on donor conception families. The statistical significance of correlation coefficients was not corrected for multiple comparisons. Findings highlight the importance of situating children's ideas about the donor within family contexts. It is recommended that those working with donor conception families consider this when advising parents about whether, what and how to tell children about donor conception. This study was funded by the Wellcome Trust [097857/Z/11/Z]. The authors have no conflicts of interest to declare. © The Author 2017. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology.

  20. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    DTIC Science & Technology

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  1. Simulation Data Management - Requirements and Design Specification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clay, Robert L.; Friedman-Hill, Ernest J.; Gibson, Marcus J.

    Simulation Data Management (SDM), the ability to securely organize, archive, and share analysis models and the artifacts used to create them, is a fundamental requirement for modern engineering analysis based on computational simulation. We have worked separately to provide secure, network SDM services to engineers and scientists at our respective laboratories for over a decade. We propose to leverage our experience and lessons learned to help develop and deploy a next-generation SDM service as part of a multi-laboratory team. This service will be portable across multiple sites and platforms, and will be accessible via a range of command-line tools andmore » well-documented APIs. In this document, we’ll review our high-level and low-level requirements for such a system, review one existing system, and briefly discuss our proposed implementation.« less

  2. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  3. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  4. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  5. High Efficiency mm-Wave Transmitter Array

    DTIC Science & Technology

    2016-09-01

    SECURITY CLASSIFICATION OF: High efficiency, high power transmitters integrated in silicon at 45, 94 and 138 GHz were developed. Our approach...employs CMOS-SOI and SiGe HBT unit amplifiers, power -combined in free-space using antenna arrays to attain high power levels. In the baseline approach...the-art were made. At 45GHz, a single CMOS chip produced an RF power of 630mW, which yielded an EIRP of 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND

  6. Security Policy and Infrastructure in the Context of a Multi-Centeric Information System Dedicated to Autism Spectrum Disorder.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.

  7. 7 CFR 3560.61 - Loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Loan security. 3560.61 Section 3560.61 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Direct Loan and Grant Origination § 3560.61 Loan security... collateral. (2) The amount of the loan against the collateral does not exceed its estimated security value...

  8. Experiments in Globalisation, Food Security and Land Use Decision Making

    PubMed Central

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H.; Rounsevell, Mark D.

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels. PMID:25437010

  9. Experiments in globalisation, food security and land use decision making.

    PubMed

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H; Rounsevell, Mark D

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels.

  10. National Security Challenges: Insights from Social, Neurobiological, and Complexity Sciences. Topical Strategic Multi-Layer Assessment (SMA) and U.S. Army ERDC Multi-Agency/Multi-Disciplinary White Papers in Support of National Security Challenges

    DTIC Science & Technology

    2012-07-01

    population. The amount of information on Facebook doubles every 6 months. This under- scores the nation’s need to understand what is happening on a ...QL—Russia: Emerging Insight Into Muslim Populations (October 2011) • QL— A Trend Toward Increased Information Communication Technol- ogy (ICT...Hendrix ( College of William & Mary), Mr. Eric A . Knudson (PACOM), Mr. Joseph T. Lee (PACOM), Mr. Kalev Leetaru (University of Illinois at Urbana), Lt

  11. Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states

    NASA Astrophysics Data System (ADS)

    Zhao-Xu, Ji; Tian-Yu, Ye

    2017-07-01

    In this paper, a novel multi-party quantum private comparison protocol with a semi-honest third party (TP) is proposed based on the entanglement swapping of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own, but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol. Our protocol can withstand both the outside attacks and the participant attacks on the condition that none of the QKD methods is adopted to generate keys for security. One party cannot obtain other parties' secrets except for the case that their secrets are identical. The semi-honest TP cannot learn any information about these parties' secrets except the end comparison result on whether all private secrets from n parties are equal.

  12. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    PubMed

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  13. Future Irrigation Requirement of Rice Under Irrigated Area - Uncertainty through GCMs and Crop Models : A Case Study of Indo-Gangetic Plains of India

    NASA Astrophysics Data System (ADS)

    Pillai, S. N.; Singh, H.; Ruane, A. C.; Boote, K. G.; Porter, C.; Rosenzweig, C.; Panwar, A. S.

    2017-12-01

    Indo-Gangetic Plains (IGP), the food basket of South Asia, characterised by predominantly cereal-based farming systems where livestock is an integral part of farm economy. Climate change is projected to have significant effects on agriculture production and hence on food and livelihood security because more than 90 per cent farmers fall under small and marginal category. The rising temperatures and uncertainties in rainfall associated with global warming may have serious direct and indirect impacts on crop production. A loss of 10-40% crop production is predicted in different crops in India by the end of this century by different researchers. Cereal crops (mainly rice and wheat) are crucial to ensuring the food security in the region, but sustaining their productivity has become a major challenge due to climate variability and uncertainty. Under AgMIP Project, we have analysed the climate change impact on farm level productivity of rice at Meerut District, Uttar Pradesh using 29 GCMs under RCP4.5 and RCP8.5 during mid-century period 2041-2070. Two crop simulation models DSSAT4.6 and APSIM7.7 were used for impact study. There is lot of uncertainty in yield level by different GCMs and crop models. Under RCP4.5, APSIM showed a declining yield up to 14.5 % while DSSAT showed a declining yield level of 6.5 % only compared to the baseline (1980-2010). However, out of 29 GCMs, 15 GCMs showed negative impact and 14 showed positive impact under APSIM while it showed 21 and 8 GCMs, respectively in the case of DSSAT. DSSAT and APSIM simulated irrigation water requirement in future of the order of 645±75 mm and 730±107 mm, respectively under RCP4.5. However, the same will be of the order of 626 ± 99 mm and 749 ± 147 mm, respectively under RCP8.5. Projected irrigation water productivity showed a range of 4.87-12.15 kg ha-1 mm-1 and 6.77-12.63 kg ha-1 mm-1 through APSIM and DSSAT, respectively under RCP4.5, which stands an average of 7.81 and 8.53 kg ha-1 mm-1 during the baseline period. It reduced to 4.22-10.64 and 6.37-12.56 kg ha-1 mm-1 through APSIM and DSSAT, respectively under RCP8.5. This showed the uncertainty of GCMs as well as the Crop models for future projection. A multi-model approach with optimistic and pessimistic projections should be used for scenario analysis and policy planning in future rather than single model projections.

  14. Performance of Variable Capacity Heat Pumps in a Mixed Humid Climate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Munk, Jeffrey D; Gehl, Anthony C; Jackson, Roderick K

    2012-04-01

    Variable capacity heat pumps represent the next wave of technology for heat pumps. In this report, the performance of two variable capacity heat pumps (HPs) is compared to that of a single or two stage baseline system. The units were installed in two existing research houses located in Knoxville, TN. These houses were instrumented to collect energy use and temperature data while both the baseline systems and variable capacity systems were installed. The homes had computer controlled simulated occupancy, which provided consistent schedules for hot water use and lighting. The temperature control and energy use of the systems were comparedmore » during both the heating and cooling seasons. Multiple linear regression models were used along with TMY3 data for Knoxville, TN in order to normalize the effect that the outdoor air temperature has on energy use. This enables a prediction of each system's energy use over a year with the same weather. The first system was a multi-split system consisting of 8 indoor units and a single outdoor unit. This system replaced a 16 SEER single stage HP with a zoning system, which served as the baseline. Data was collected on the baseline system from August 2009 to December 2010 and on the multi-split system from January 2011 to January 2012. Soon after the installation of the multi-split system, some of the smaller rooms began over-conditioning. This was determined to be caused by a small amount of continuous refrigerant flow to all of the indoor units when the outdoor unit was running regardless of whether they were calling for heat. This, coupled with the fact that the indoor fans run continuously, was providing enough heat in some rooms to exceed the set point. In order to address this, the indoor fans were disabled when not actively heating per the manufacturer's recommendation. Based on the measured data, the multi-split system was predicted to use 40% more energy in the heating season and 16% more energy in the cooling season than the baseline system, for the typical meteorological year weather data. The AHRI ratings indicated that the baseline system would perform slightly better than the multi-split system, but not by as large of a margin as seen in this study. The multi-split system was able to maintain more consistent temperature throughout the house than the baseline system, but it did allow relative humidity levels to increase above 60% in the summer. The second system was a split system with an inverter driven compressor and a single ducted air handler. This unit replaced a 16 SEER two stage HP with a zoning system. Data was collected on the baseline system from July 2009 to November 2010 and on the ducted inverter system from December 2010 to January 2012. The ducted inverter system did not offer a zone controller, so it functioned as a single zone system. Due to this fact, the registers had to be manually adjusted in order to better maintain consistent temperatures between the two levels of the house. The predicted heating season energy use for the ducted inverter system, based on the measured energy use, was 30% less than that of the baseline system for the typical meteorological year. However, the baseline system was unable to operate in its high stage due to a wiring issue with the zone controller. This resulted in additional resistance heat use during the winter and therefore higher energy use than would be expected in a properly performing unit. The AHRI ratings would indicate that the baseline system would use less energy than the ducted inverter system, which is opposite to the results of this study. During the cooling season, the ducted inverter system was predicted to use 23% more energy than the baseline system during the typical meteorological year. This is also opposite of the results expected by comparing the AHRI ratings. After a detailed comparison of the ducted inverter system's power use compared to that of a recently installed identical system at a retro-fit study house, there is concern that the unit is not operating as intended. The power use and cycles indicate that the unit is performing more like a single stage unit than a variable capacity unit. Analysis of the data indicates that a change in operating behavior occurred during a service call shortly after the installation of the unit. The logbook only indicates that refrigerant charge was added, but does not indicate any other change. This is being investigated further. While the energy comparison results of these two variable capacity heat pumps is generally underwhelming, it is difficult to draw any hard conclusions about the maximum attainable efficiency of these units when optimally installed. Both units appear to have undesirable conditions associated with the installation or operation, which could have had an adverse effect on their energy use.« less

  15. Parental Management of Peers and Autonomic Nervous System Reactivity in Predicting Adolescent Peer Relationships

    PubMed Central

    Tu, Kelly M.; Erath, Stephen A.; El-Sheikh, Mona

    2016-01-01

    The present study examined sympathetic and parasympathetic indices of autonomic nervous system reactivity as moderators of the prospective association between parental management of peers via directing of youths’ friendships and peer adjustment in a sample of typically developing adolescents. Participants included 246 adolescents at Time 1 (T1) [47% boys; 66% European American (EA), 34% African American (AA)] and 226 adolescents at Time 2 (T2; 45% boys; 67% EA, 33% AA). Adolescents were approximately 16 and 17 years old at T1 and T2, respectively. To address study aims, a multi-informant, multi-method longitudinal design was utilized. Skin conductance level (SCL) and respiratory sinus arrhythmia (RSA) were measured during a baseline period and challenge task (star-tracing). Reactivity was computed as a difference score between the task and baseline period. Results from path models revealed that higher levels of mother-reported parental directing predicted decreases in adolescent-reported peer rejection and friends’ deviant behavior from T1 to T2 at relatively low levels of physiological arousal in response to challenge (i.e., low SCL reactivity, RSA augmentation). Further, exploratory analyses indicated that directing was associated with decreases in friends’ deviant behavior and peer rejection particularly among boys who exhibited lower levels of physiological arousal, but increases in friends’ deviant behavior among boys who exhibited higher levels of arousal reflected in RSA withdrawal only. Overall, findings are consistent with prior studies revealing the benefits of parental behavioral control for under-aroused youth, contributing to the growing literature on the interplay of parenting and physiological factors in the adolescent peer domain. PMID:27854467

  16. Baseline process description for simulating plutonium oxide production for precalc project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pike, J. A.

    Savannah River National Laboratory (SRNL) started a multi-year project, the PreCalc Project, to develop a computational simulation of a plutonium oxide (PuO 2) production facility with the objective to study the fundamental relationships between morphological and physicochemical properties. This report provides a detailed baseline process description to be used by SRNL personnel and collaborators to facilitate the initial design and construction of the simulation. The PreCalc Project team selected the HB-Line Plutonium Finishing Facility as the basis for a nominal baseline process since the facility is operational and significant model validation data can be obtained. The process boundary as wellmore » as process and facility design details necessary for multi-scale, multi-physics models are provided.« less

  17. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  18. Review of Data Integrity Models in Multi-Level Security Environments

    DTIC Science & Technology

    2011-02-01

    2: (E-1 extension) Only executions described in a (User, TP, (CDIs)) relation are allowed • E-3: Users must be authenticated before allowing TP... authentication and verification procedures for upgrading the integrity of certain objects. The mechanism used to manage access to objects is primarily...that is, the self-consistency of interdependent data and the consistency of real-world environment data. The prevention of authorised users from making

  19. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    PubMed

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  20. Ultra-Wideband Multi-Dye-Sensitized Upconverting Nanoparticles for Information Security Application.

    PubMed

    Lee, Jongha; Yoo, Byeongjun; Lee, Hakyong; Cha, Gi Doo; Lee, Hee-Su; Cho, Youngho; Kim, Sang Yeon; Seo, Hyunseon; Lee, Woongchan; Son, Donghee; Kang, Myungjoo; Kim, Hyung Min; Park, Yong Il; Hyeon, Taeghwan; Kim, Dae-Hyeong

    2017-01-01

    Multi-dye-sensitized upconverting nanoparticles (UCNPs), which harvest photons of wide wavelength range (450-975 nm) are designed and synthesized. The UCNPs embedded in a photo-acid generating layer are integrated on destructible nonvolatile resistive memory device. Upon illumination of light, the system permanently erases stored data, achieving enhanced information security. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Multi-objective Optimization of Departure Procedures at Gimpo International Airport

    NASA Astrophysics Data System (ADS)

    Kim, Junghyun; Lim, Dongwook; Monteiro, Dylan Jonathan; Kirby, Michelle; Mavris, Dimitri

    2018-04-01

    Most aviation communities have increasing concerns about the environmental impacts, which are directly linked to health issues for local residents near the airport. In this study, the environmental impact of different departure procedures using the Aviation Environmental Design Tool (AEDT) was analyzed. First, actual operational data were compiled at Gimpo International Airport (March 20, 2017) from an open source. Two modifications were made in the AEDT to model the operational circumstances better and the preliminary AEDT simulations were performed according to the acquired operational procedures. Simulated noise results showed good agreements with noise measurement data at specific locations. Second, a multi-objective optimization of departure procedures was performed for the Boeing 737-800. Four design variables were selected and AEDT was linked to a variety of advanced design methods. The results showed that takeoff thrust had the greatest influence and it was found that fuel burn and noise had an inverse relationship. Two points representing each fuel burn and noise optimum on the Pareto front were parsed and run in AEDT to compare with the baseline. The results showed that the noise optimum case reduced Sound Exposure Level 80-dB noise exposure area by approximately 5% while the fuel burn optimum case reduced total fuel burn by 1% relative to the baseline for aircraft-level analysis.

  2. Longitudinal Differences in Spirituality and Religiousness between Men and Women in Treatment for Alcohol Use Disorders

    PubMed Central

    Krentzman, Amy R.

    2016-01-01

    This study compares men and women with alcohol use disorders on levels and trajectories of spirituality and religiousness over 30 months while controlling for critical covariates. Men (n=92) and women (n=65) entering abstinence-based treatment were assessed for drinking behavior, spirituality, and psychosocial variables in a longitudinal panel study. Multiple regression tested for baseline differences and multi-level models tested for differences from baseline to 6 months (early recovery) and from 6 to 30 months (later recovery) in seven dimensions of spirituality/religiousness. Between baseline and 6 months, women had higher scores than men for forgiveness of others and lower scores than men for negative religious coping. Between 6 and 30 months, the acceleration of positive change in self forgiveness was significantly greater for women than men. Differences in negative religious coping and forgiveness might relate to differences in shame and guilt and their resolution by gender. Future research should examine whether gender differences in spirituality serve as an asset to women as they pursue addiction recovery. PMID:29250216

  3. Longitudinal Differences in Spirituality and Religiousness between Men and Women in Treatment for Alcohol Use Disorders.

    PubMed

    Krentzman, Amy R

    2017-01-01

    This study compares men and women with alcohol use disorders on levels and trajectories of spirituality and religiousness over 30 months while controlling for critical covariates. Men (n=92) and women (n=65) entering abstinence-based treatment were assessed for drinking behavior, spirituality, and psychosocial variables in a longitudinal panel study. Multiple regression tested for baseline differences and multi-level models tested for differences from baseline to 6 months (early recovery) and from 6 to 30 months (later recovery) in seven dimensions of spirituality/religiousness. Between baseline and 6 months, women had higher scores than men for forgiveness of others and lower scores than men for negative religious coping. Between 6 and 30 months, the acceleration of positive change in self forgiveness was significantly greater for women than men. Differences in negative religious coping and forgiveness might relate to differences in shame and guilt and their resolution by gender. Future research should examine whether gender differences in spirituality serve as an asset to women as they pursue addiction recovery.

  4. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

    PubMed

    Shi, Yang; Fan, Hongfei; Xiong, Guoyue

    2015-01-01

    With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.

  5. Secure information display with limited viewing zone by use of multi-color visual cryptography.

    PubMed

    Yamamoto, Hirotsugu; Hayasaki, Yoshio; Nishida, Nobuo

    2004-04-05

    We propose a display technique that ensures security of visual information by use of visual cryptography. A displayed image appears as a completely random pattern unless viewed through a decoding mask. The display has a limited viewing zone with the decoding mask. We have developed a multi-color encryption code set. Eight colors are represented in combinations of a displayed image composed of red, green, blue, and black subpixels and a decoding mask composed of transparent and opaque subpixels. Furthermore, we have demonstrated secure information display by use of an LCD panel.

  6. Multi-view Decision Making (MVDM) Workshop

    DTIC Science & Technology

    2009-02-01

    reflect the realities of system-of-systems development, acquisition, fielding and support: multi-view decision making (MVDM). MVDM addresses the...including mission risk, interoperable acquisition, and operational security and survivability. Hence, a multi-view approach to decision making is

  7. Single incision device (TVT Secur) versus retropubic tension-free vaginal tape device (TVT) for the management of stress urinary incontinence in women: a randomized clinical trial.

    PubMed

    Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali

    2014-12-22

    In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research on new licensed devices in a rapidly changing surgical specialty, and further highlights the need for research before licensing if surgeons and their patients are to be confident in the effectiveness and safety of new surgical devices. ClinicalTrials.gov NCT00685217, 22 May 2008.

  8. Predicting child maltreatment among Puerto Rican children from migrant and non-migrant families

    PubMed Central

    Sledjeski, Eve M.; Dierker, Lisa C.; Bird, Hector R.; Canino, Glorisa

    2009-01-01

    Objective The objectives of the present study were to 1) describe the prevalence of child maltreatment among migrant and non-migrant Puerto Rican families and 2) identify socio-demographic and cultural (i.e. acculturation pattern, familismo) predictors of maltreatment within these two samples. Method Representative community samples of Puerto Rican children (ages 5-13 at baseline) and their adult caretakers were interviewed at two sites: the South Bronx in New York City (n=631 families) and the Standard Metropolitan Areas of San Juan and Caguas in Puerto Rico (n=859 families). Participants were re-interviewed one and two years following the baseline assessment. Results While prevalence rates of maltreatment (physical abuse, 10%; sexual abuse 1 %; neglect, 10%; and multi-type, 6%) did not differ between the two sites at baseline assessment, site differences emerged over time. Rates of physical abuse at follow-up were significantly higher in the Bronx compared to Puerto Rico. Further, for families living in the Bronx, living in poverty predicted chronic maltreatment, whereas living above the poverty line predicted new cases of maltreatment at follow-up. For families living in Puerto Rico, those who experienced physical abuse or multi-type maltreatment at baseline were more likely to report chronic maltreatment at follow-up regardless of poverty level. Cultural factors were not related to baseline or follow-up maltreatment at either site. Conclusion Findings suggest that while rates of child maltreatment may be similar in migrant and non-migrant Puerto Rican families and when compared to prevalence rates in the US, predictors of maltreatment may differ. Practice Implications Since predictors of maltreatment may vary across population subgroups, studying homogenous samples will lead to more effective and targeted interventions. PMID:19457554

  9. Minimal impact of response shift for SF-12 mental and physical health status in homeless and vulnerably housed individuals: an item-level multi-group analysis.

    PubMed

    Gadermann, Anne M; Sawatzky, Richard; Palepu, Anita; Hubley, Anita M; Zumbo, Bruno D; Aubry, Tim; Farrell, Susan; Hwang, Stephen W

    2017-06-01

    The purpose of this study was to examine whether homeless or vulnerably housed individuals experienced response shift over a 12-month time period in their self-reported physical and mental health status. Data were obtained from the Health and Housing in Transition study, a longitudinal multi-site cohort study in Canada (N = 1190 at baseline). Multi-group confirmatory factor analysis (MG-CFA) and methods for response shift detection at the item level, based on the approach by Oort, were used to test for reconceptualization, reprioritization, and recalibration response shift on the SF-12 in four groups of individuals who were homeless (n = 170), housed (n = 437), or who reported a change in their housing status [from homeless to housed (n = 285) or housed to homeless (n = 73)] over a 12-month time period. Mean and variance adjusted weighted-least squares estimation was used to accommodate the ordinal and binary distributions of the SF-12 items. Using MG-CFA, a strict invariance model showed that the measurement model was equivalent for the four groups at baseline. Although we found small but statistically significant response shift for several measurement model parameters, the impact on the predicted average mental and physical health scores within each of the groups was small. Response shift does not appear to be a significant concern when using the SF-12 to obtain change scores over a 12-month period in this population.

  10. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  11. Building capacity to secure healthier and safer working conditions for healthcare workers: A South African-Canadian collaboration.

    PubMed

    Yassi, Annalee; Nophale, Letshego E; Dybka, Lyndsay; Bryce, Elizabeth; Kruger, Willem; Spiegel, Jerry

    2009-01-01

    Healthcare workers face difficult working conditions, particularly where HIV and tuberculosis add to understaffing. Questionnaires, workplace assessments, and discussion groups were conducted at a regional hospital in South Africa to obtain baseline data and input from the workforce in designing interventions. Findings highlighted weaknesses in knowledge, for example regarding the use of N95 respirators and safe handling of sharps, and suggested the need for improved training. Access to supplies and personal protective equipment was the major reported reason for failure to follow proper procedures; this was confirmed by workplace assessments. Discussion groups highlighted the important role for worker Health and Safety Committees (HSC), including in combating stigma and encouraging reporting. Interest in data to support decision-making resulted in development of the Occupational Health and Safety Information System (OHASIS); further training of HSCs is still needed. Multi-stakeholder international collaboration aimed at building HSC capacity is well-received.

  12. Combining Video, Audio and Lexical Indicators of Affect in Spontaneous Conversation via Particle Filtering

    PubMed Central

    Savran, Arman; Cao, Houwei; Shah, Miraj; Nenkova, Ani; Verma, Ragini

    2013-01-01

    We present experiments on fusing facial video, audio and lexical indicators for affect estimation during dyadic conversations. We use temporal statistics of texture descriptors extracted from facial video, a combination of various acoustic features, and lexical features to create regression based affect estimators for each modality. The single modality regressors are then combined using particle filtering, by treating these independent regression outputs as measurements of the affect states in a Bayesian filtering framework, where previous observations provide prediction about the current state by means of learned affect dynamics. Tested on the Audio-visual Emotion Recognition Challenge dataset, our single modality estimators achieve substantially higher scores than the official baseline method for every dimension of affect. Our filtering-based multi-modality fusion achieves correlation performance of 0.344 (baseline: 0.136) and 0.280 (baseline: 0.096) for the fully continuous and word level sub challenges, respectively. PMID:25300451

  13. Combining Video, Audio and Lexical Indicators of Affect in Spontaneous Conversation via Particle Filtering.

    PubMed

    Savran, Arman; Cao, Houwei; Shah, Miraj; Nenkova, Ani; Verma, Ragini

    2012-01-01

    We present experiments on fusing facial video, audio and lexical indicators for affect estimation during dyadic conversations. We use temporal statistics of texture descriptors extracted from facial video, a combination of various acoustic features, and lexical features to create regression based affect estimators for each modality. The single modality regressors are then combined using particle filtering, by treating these independent regression outputs as measurements of the affect states in a Bayesian filtering framework, where previous observations provide prediction about the current state by means of learned affect dynamics. Tested on the Audio-visual Emotion Recognition Challenge dataset, our single modality estimators achieve substantially higher scores than the official baseline method for every dimension of affect. Our filtering-based multi-modality fusion achieves correlation performance of 0.344 (baseline: 0.136) and 0.280 (baseline: 0.096) for the fully continuous and word level sub challenges, respectively.

  14. Multi-position photovoltaic assembly

    DOEpatents

    Dinwoodie, Thomas L.

    2003-03-18

    The invention is directed to a PV assembly, for use on a support surface, comprising a base, a PV module, a multi-position module support assembly, securing the module to the base at shipping and inclined-use angles, a deflector, a multi-position deflector support securing the deflector to the base at deflector shipping and deflector inclined-use angles, the module and deflector having opposed edges defining a gap therebetween. The invention permits transport of the PV assemblies in a relatively compact form, thus lowering shipping costs, while facilitating installation of the PV assemblies with the PV module at the proper inclination.

  15. Plasma markers of inflammation and prediction of cardiovascular disease and mortality in African Americans with type 1 diabetes.

    PubMed

    Roy, Monique S; Janal, Malvin N; Crosby, Juan; Donnelly, Robert

    2016-04-01

    To determine whether plasma levels of markers of inflammation are predictive of the incidence of cardiovascular disease (CVD), hypertension, or mortality in African Americans with type 1 diabetes mellitus. A total of 484 African Americans with type 1 diabetes were included. At baseline and 6-year follow-up, a clinical interview and examination were conducted to document CVD and systemic hypertension. Venous blood for glycated hemoglobin and cholesterol was obtained and albumin excretion rate measured. Mortality was assessed annually between baseline and 6-year follow-up by review of the social security death index. Baseline plasma levels of 28 inflammatory biomarkers were measured using multiplex bead analysis system. After adjusting for baseline age and other confounders, African Americans with type 1 diabetes in the highest quartile of plasma interferon-inducible protein 10 (IP-10) were three times more likely to develop CVD than those in the lowest quartile. African Americans with type 1 diabetes in the lowest quartiles of plasma stromal derived factor-1 (SDF-1) had a 75% higher risk of death than patients in the highest quartile, independently of age, low density lipoprotein cholesterol, body mass index, hypertension, and albuminuria. In African Americans with type 1 diabetes, high plasma IP-10 is an independent predictor for incident CVD and low SDF-1 an independent predictor for mortality. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  17. Flexible, multi-measurement guided wave damage detection under varying temperatures

    NASA Astrophysics Data System (ADS)

    Douglass, Alexander C. S.; Harley, Joel B.

    2018-04-01

    Temperature compensation in structural health monitoring helps identify damage in a structure by removing data variations due to environmental conditions, such as temperature. Stretch-based methods are one of the most commonly used temperature compensation methods. To account for variations in temperature, stretch-based methods optimally stretch signals in time to optimally match a measurement to a baseline. All of the data is then compared with the single baseline to determine the presence of damage. Yet, for these methods to be effective, the measurement and the baseline must satisfy the inherent assumptions of the temperature compensation method. In many scenarios, these assumptions are wrong, the methods generate error, and damage detection fails. To improve damage detection, a multi-measurement damage detection method is introduced. By using each measurement in the dataset as a baseline, error caused by imperfect temperature compensation is reduced. The multi-measurement method increases the detection effectiveness of our damage metric, or damage indicator, over time and reduces the presence of additional peaks caused by temperature that could be mistaken for damage. By using many baselines, the variance of the damage indicator is reduced and the effects from damage are amplified. Notably, the multi-measurement improves damage detection over single-measurement methods. This is demonstrated through an increase in the maximum of our damage signature from 0.55 to 0.95 (where large values, up to a maximum of one, represent a statistically significant change in the data due to damage).

  18. Sex hormone levels and change in left ventricular structure among men and post-menopausal women: The Multi-Ethnic Study of Atherosclerosis (MESA).

    PubMed

    Subramanya, Vinita; Zhao, Di; Ouyang, Pamela; Lima, Joao A; Vaidya, Dhananjay; Ndumele, Chiadi E; Bluemke, David A; Shah, Sanjiv J; Guallar, Eliseo; Nwabuo, Chike C; Allison, Matthew A; Heckbert, Susan R; Post, Wendy S; Michos, Erin D

    2018-02-01

    Sex hormone (SH) levels may contribute to sex differences in the risk of heart failure with preserved ejection fraction (HFpEF). We examined the associations of SH levels with left ventricular mass (LVM) and mass (M):volume (V) ratio, which are risk markers for HFpEF. We studied 1941 post-menopausal women and 2221 men, aged 45-84 years, participating in the Multi-Ethnic Study of Atherosclerosis (MESA). Serum SH levels, cardiac magnetic resonance imaging (MRI) and ejection fraction (EF) ≥50% had been recorded at baseline (2000-2002). Of these participants, 2810 underwent repeat MRI at Exam 5 (2010-2012). Stratified by sex, linear mixed-effect models were used to test associations between SH and sex hormone binding globulin (SHBG) level [per 1 SD greater log-transformed (SH)] with baseline and change in LV structure. Models were adjusted for age, race/ethnicity, center, height, weight, education, physical activity and smoking, and, in women, for hormone therapy and years since menopause. LVM and M:V ratio. After a median of 9.1 years, higher free testosterone levels were independently associated with a modest increase in LVM (g/yr) in women [0.05 (95% CI 0.01, 0.10)] and men [0.16 (0.03, 0.28)], while higher SHBG levels were associated with less LVM change (g/yr) in women [-0.07 (-0.13, -0.01)] and men [-0.15 (-0.27, -0.02)]. In men, higher dehydroepiandrosterone and estradiol levels were associated with increased LVM. Among women, free testosterone levels were positively and SHBG levels inversely associated with change in M:V ratio. A more androgenic profile (higher free testosterone and lower SHBG levels) is associated with a greater increase in LVM in men and women and greater increase in M:V ratio in women over the course of 9 years. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    NASA Astrophysics Data System (ADS)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  20. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  1. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  2. The Water Security Hydra

    NASA Astrophysics Data System (ADS)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for the approval of the strategies that are implemented. In this talk, I will strive to lay out a cognitive framework for how performance evaluation of water security, and instrument design for assurance can be approached from a multi-stress and multi-user perspective. Selected examples will be used to lillustrate the idea in the context of America's Water.

  3. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    DTIC Science & Technology

    2008-03-01

    Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote

  4. Tools and Methods to Create Scenarios for Experimental Research in the Network Science Research Laboratory (NSRL)

    DTIC Science & Technology

    2015-12-01

    research areas in network science. 15. SUBJECT TERMS scenario creation , emulation environment, NSRL 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...mobility aspect of the emulated environment, the development and creation of scenarios play an integral part. By creating scenarios that model certain...during the visualization phase. We examine these 3 phases in detail by describing the creation of a scenario based upon a vignette from the Multi-Level

  5. 33 CFR 165.9 - Geographic application of limited and controlled access areas and regulated navigation areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., including the territorial sea to a seaward limit of 12 nautical miles from the baseline. (c) Security zones..., including the territorial sea to a seaward limit of 12 nautical miles from the baseline. (d) Naval vessel..., including the territorial sea to a seaward limit of 12 nautical miles from the baseline. [USCG-2001-9044, 68...

  6. Secure Nearest Neighbor Query on Crowd-Sensing Data

    PubMed Central

    Cheng, Ke; Wang, Liangmin; Zhong, Hong

    2016-01-01

    Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU) situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes. PMID:27669253

  7. Secure Nearest Neighbor Query on Crowd-Sensing Data.

    PubMed

    Cheng, Ke; Wang, Liangmin; Zhong, Hong

    2016-09-22

    Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU) situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes.

  8. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    NASA Astrophysics Data System (ADS)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  9. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage

    PubMed Central

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703

  10. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    PubMed

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  11. Extending multi-tenant architectures: a database model for a multi-target support in SaaS applications

    NASA Astrophysics Data System (ADS)

    Rico, Antonio; Noguera, Manuel; Garrido, José Luis; Benghazi, Kawtar; Barjis, Joseph

    2016-05-01

    Multi-tenant architectures (MTAs) are considered a cornerstone in the success of Software as a Service as a new application distribution formula. Multi-tenancy allows multiple customers (i.e. tenants) to be consolidated into the same operational system. This way, tenants run and share the same application instance as well as costs, which are significantly reduced. Functional needs vary from one tenant to another; either companies from different sectors run different types of applications or, although deploying the same functionality, they do differ in the extent of their complexity. In any case, MTA leaves one major concern regarding the companies' data, their privacy and security, which requires special attention to the data layer. In this article, we propose an extended data model that enhances traditional MTAs in respect of this concern. This extension - called multi-target - allows MT applications to host, manage and serve multiple functionalities within the same multi-tenant (MT) environment. The practical deployment of this approach will allow SaaS vendors to target multiple markets or address different levels of functional complexity and yet commercialise just one single MT application. The applicability of the approach is demonstrated via a case study of a real multi-tenancy multi-target (MT2) implementation, called Globalgest.

  12. Cerebral Oxygenation of the Cortex and Striatum following Normobaric Hyperoxia and Mild Hypoxia in Rats by EPR Oximetry using Multi-Probe Implantable Resonators

    PubMed Central

    Hou, Huagang; Li, Hongbin; Dong, Ruhong; Mupparaju, Sriram; Khan, Nadeem; Swartz, Harold

    2013-01-01

    Multi-site electron paramagnetic resonance (EPR) oximetry, using multi-probe implantable resonators, was used to measure the partial pressure of oxygen (pO2) in the brains of rats following normobaric hyperoxia and mild hypoxia. The cerebral tissue pO2 was measured simultaneously in the cerebral cortex and striatum in the same rats before, during, and after normobaric hyperoxia and mild hypoxia challenges. The baseline mean tissue pO2 values (±SE) were not significantly different between the cortex and striatum. During 30 min of 100% O2 inhalation, a statistically significant increase in tissue pO2 of all four sites was observed, however, the tissue pO2 of the striatum area was significantly higher than in the forelimb area of the cortex. Brain pO2 significantly decreased from the baseline value during 15 min of 15% O2 challenge. No differences in the recovery of the cerebral cortex and striatum pO2 were observed when the rats were allowed to breathe 30% O2. It appears that EPR oximetry using implantable resonators can provide information on pO2 under the experimental conditions needed for such a study. The levels of pO2 that occurred in these experiments are readily resolvable by multi-site EPR oximetry with multi-probe resonators. In addition, the ability to simultaneously measure the pO2 in several areas of the brain provides important information that could potentially help differentiate the pO2 changes that can occur due to global or local mechanisms. PMID:21445770

  13. MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Sensing, Exploitation, and Execution (SEE) on a Foundation for Representation, Inference, and Learning

    DTIC Science & Technology

    2016-07-01

    reconstruction, video synchronization, multi - view tracking, action recognition, reasoning with uncertainty 16. SECURITY CLASSIFICATION OF: 17...3.4.2. Human action recognition across multi - views ......................................................................................... 44 3.4.3...68 4.2.1. Multi - view Multi -object Tracking with 3D cues

  14. Robust design of multiple trailing edge flaps for helicopter vibration reduction: A multi-objective bat algorithm approach

    NASA Astrophysics Data System (ADS)

    Mallick, Rajnish; Ganguli, Ranjan; Seetharama Bhat, M.

    2015-09-01

    The objective of this study is to determine an optimal trailing edge flap configuration and flap location to achieve minimum hub vibration levels and flap actuation power simultaneously. An aeroelastic analysis of a soft in-plane four-bladed rotor is performed in conjunction with optimal control. A second-order polynomial response surface based on an orthogonal array (OA) with 3-level design describes both the objectives adequately. Two new orthogonal arrays called MGB2P-OA and MGB4P-OA are proposed to generate nonlinear response surfaces with all interaction terms for two and four parameters, respectively. A multi-objective bat algorithm (MOBA) approach is used to obtain the optimal design point for the mutually conflicting objectives. MOBA is a recently developed nature-inspired metaheuristic optimization algorithm that is based on the echolocation behaviour of bats. It is found that MOBA inspired Pareto optimal trailing edge flap design reduces vibration levels by 73% and flap actuation power by 27% in comparison with the baseline design.

  15. Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security

    NASA Astrophysics Data System (ADS)

    Rojali, Siahaan, Ida Sri Rejeki; Soewito, Benfano

    2017-08-01

    Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.

  16. The impact of a school food aid program on household food insecurity

    PubMed Central

    Petralias, Athanassios; Papadimitriou, Eleni; Riza, Elena; Karagas, Margaret R.; Zagouras, Alexia B.A.

    2016-01-01

    Background: We had a unique opportunity to establish the extent of food insecurity and the potential impact of a large-scale school-based nutritional program, in low-socioeconomic status districts of Greece, during the current economic crisis. Methods: Around 162 schools with 25 349 students participated during the 2012–2013 school year. Each student received a daily healthy meal designed by nutrition specialists. Food insecurity levels, measured using the Food Security Survey Module were assessed at baseline and after a 1–8-month intervention period. Pre–post intervention responses were matched at an individual level. Results: Around 64.2% of children’s households experienced food insecurity at baseline. This percentage decreased to 59.1% post-intervention, P < 0.001. On an individual level, food insecurity score diminished by 6.5%, P < 0.001. After adjustment for various socioeconomic factors, for each additional month of participation, the odds of reducing the food insecurity score increased by 6.3% (OR = 1.06, 95% CI: 1.02–1.11). Those experiencing food insecurity with hunger at baseline were more likely to improve food insecurity score than those who did not (OR = 3.51, 95%CI: 2.92–4.21). Conclusion: Children and families residing in low socioeconomic areas of Greece, experience high levels of food insecurity. Our findings suggest that participation in a school-based food aid program may reduce food insecurity for children and their families in a developed country in times of economic hardship. PMID:26873860

  17. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran.

    PubMed

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households' food security. The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively ( P < 0.001), at the end of the study. Odds of having worse food insecurity in households with medium and high wealth index was 65% and 87% lower than those with low wealth index, respectively (odds ratio [OR] = 0.35, 95% confidence interval [CI]: 0.2-0.61, and OR = 0.23, 95% CI: 0.12-0.43). Food sharing was common among more than 95% of the studied households. Mean maternal body mass index (BMI) increased significantly after 6 months ( P < 0.001). However, there was no significant association between mother's BMI and household food security in the baseline and at the end of the study ( P > 0.05). Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  18. Brief report: enhancement of patient recruitment in rheumatoid arthritis clinical trials using a multi-biomarker disease activity score as an inclusion criterion.

    PubMed

    van Vollenhoven, Ronald F; Bolce, Rebecca; Hambardzumyan, Karen; Saevarsdottir, Saedis; Forslind, Kristina; Petersson, Ingemar F; Sasso, Eric H; Hwang, C C; Segurado, Oscar G; Geborek, Pierre

    2015-11-01

    Rheumatoid arthritis (RA) clinical trials often exclude patients who have low C-reactive protein (CRP) levels, which slows enrollment into the trial. The purpose of this study was to determine whether high Multi-Biomarker Disease Activity (MBDA) scores (>44) in RA patients with low CRP levels (≤10 mg/liter) could be used as a complement to CRP levels >10 mg/liter to enhance patient recruitment without affecting clinical trial outcomes. We evaluated patients from the Swedish Pharmacotherapy (SWEFOT) trial, which did not include any selection criteria for CRP levels. Clinical outcomes were assessed after 3 months of methotrexate (MTX) monotherapy in MTX-naive RA patients (n = 220) and after 3-10 months of add-on therapy in patients who were incomplete responders to MTX alone (MTX-IR) (n = 127). Radiographic outcomes were assessed at 1 year in all patients. Within each cohort, the outcomes were compared between patients with a CRP level of ≤10 mg/liter and an MBDA score of >44 at the start of the respective treatment interval versus those with a CRP level of >10 mg/liter. Patients with both a CRP level of ≤10 mg/liter and an MBDA score of >44 at baseline had clinical and radiographic outcomes that were comparable to those in patients with a CRP level of >10 mg/liter at baseline. This broadened definition of the inclusion criteria identified an additional 24% of patients in the MTX-naive cohort and 47% in the MTX-IR cohort. Patient recruitment into RA clinical trials may be substantially enhanced, without any decrease in clinical and radiographic outcomes, by using as an inclusion criterion "a CRP level of >10 mg/liter and/or an MBDA score of >44." © 2015 The Authors. Arthritis & Rheumatology is published by Wiley Periodicals, Inc. on behalf of the American College of Rheumatology.

  19. A systematic approach to baseline assessment of nursing documentation and enterprise-wide prioritization for electronic conversion.

    PubMed

    Dykes, Patricia C; Spurr, Cindy; Gallagher, Joan; Li, Qi; Ives Erickson, Jeanette

    2006-01-01

    An important challenge associated with making the transition from paper to electronic documentation systems is achieving consensus regarding priorities for electronic conversion across diverse groups. In our work we focus on applying a systematic approach to evaluating the baseline state of nursing documentation across a large healthcare system and establishing a unified vision for electronic conversion. A review of the current state of nursing documentation across PHS was conducted using structured tools. Data from this assessment was employed to facilitate an evidence-based approach to decision-making regarding conversion to electronic documentation at local and PHS levels. In this paper we present highlights of the assessment process and the outcomes of this multi-site collaboration.

  20. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  1. A Computational Model and Multi-Agent Simulation for Information Assurance

    DTIC Science & Technology

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  2. Implementing health promotion activities using community-engaged approaches in Asian American faith-based organizations in New York City and New Jersey.

    PubMed

    Kwon, S C; Patel, S; Choy, C; Zanowiak, J; Rideout, C; Yi, S; Wyatt, L; Taher, M D; Garcia-Dia, M J; Kim, S S; Denholm, T K; Kavathe, R; Islam, N S

    2017-09-01

    Faith-based organizations (FBOs) (e.g., churches, mosques, and gurdwaras) can play a vital role in health promotion. The Racial and Ethnic Approaches to Community Health for Asian Americans (REACH FAR) Project is implementing a multi-level and evidence-based health promotion and hypertension (HTN) control program in faith-based organizations serving Asian American (AA) communities (Bangladeshi, Filipino, Korean, Asian Indian) across multiple denominations (Christian, Muslim, and Sikh) in New York/New Jersey (NY/NJ). This paper presents baseline results and describes the cultural adaptation and implementation process of the REACH FAR program across diverse FBOs and religious denominations serving AA subgroups. Working with 12 FBOs, informed by implementation research and guided by a cultural adaptation framework and community-engaged approaches, REACH FAR strategies included (1) implementing healthy food policies for communal meals and (2) delivering a culturally-linguistically adapted HTN management coaching program. Using the Ecological Validity Model (EVM), the program was culturally adapted across congregation and faith settings. Baseline measures include (i) Congregant surveys assessing social norms and diet (n = 946), (ii) HTN participant program surveys (n = 725), (iii) FBO environmental strategy checklists (n = 13), and (iv) community partner in-depth interviews assessing project feasibility (n = 5). We describe the adaptation process and baseline assessments of FBOs. In year 1, we reached 3790 (nutritional strategies) and 725 (HTN program) via AA FBO sites. Most AA FBOs lack nutrition policies and present prime opportunities for evidence-based multi-level interventions. REACH FAR presents a promising health promotion implementation program that may result in significant community reach.

  3. Once Versus Thrice Daily Colistin in Critically Ill Ptients with Multi-Drug Resistant Infections

    PubMed Central

    Ghazaeian, Monireh; Mokhtari, Majid; Kouchek, Mehran; Miri, MirMohammad; Goharani, Reza; Ghodssi-Ghassemabadi, Robabeh; Sistanizad, Mohammad

    2017-01-01

    The aim of this study was to evaluate the procalcitonin (PCT) changes in two different high-dose colistin regimens in the treatment of multi-drug resistant MDR gram negative infections in ICU patients. This is a prospective study of adult ICU patients with bacteremia and ventilator associated pneumonia (VAP) caused by MDR gram negative pathogens. Patients were assigned to two colistin administration groups. Group A received 9 and group B received 3 million international units every 24 and 8 h respectively. Baseline characteristics and measurements of PCT concentrations at the start, the 3rd and the 5th day of the antibiotic therapy and their trends between the two groups were recorded and compared. of 40 patients enrolled, 34 completed the study protocol, of whom 30 (88.2%) had (VAP) and 4 (11.8%) had bacteremia. There were no statistically significant differences in the baseline characteristics between the two groups. The mean PCT levels in two study groups were; 2.34, 1.24, and 0.95 in group A and 5.89, 1.24 and 0.8 in group B at the baseline, 3rd and 5th day of colistin administration respectively (P=0.47). The ICU length of stay (LOS) in days and ICU mortality were; 31.31, 35.3% and 32.06, 22.2% in groups A and B (P=0.39, 0.87), respectively. Conclusion: We did not find any statistically significant differences in the serum PCT levels, ICU LOS or ICU mortality, between the two groups, who received maximum recommended dose of CMS with 2 different intervals of every 8 or 24 h. PMID:29201114

  4. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    PubMed Central

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  5. Multi-level multi-task learning for modeling cross-scale interactions in nested geospatial data

    USGS Publications Warehouse

    Yuan, Shuai; Zhou, Jiayu; Tan, Pang-Ning; Fergus, Emi; Wagner, Tyler; Sorrano, Patricia

    2017-01-01

    Predictive modeling of nested geospatial data is a challenging problem as the models must take into account potential interactions among variables defined at different spatial scales. These cross-scale interactions, as they are commonly known, are particularly important to understand relationships among ecological properties at macroscales. In this paper, we present a novel, multi-level multi-task learning framework for modeling nested geospatial data in the lake ecology domain. Specifically, we consider region-specific models to predict lake water quality from multi-scaled factors. Our framework enables distinct models to be developed for each region using both its local and regional information. The framework also allows information to be shared among the region-specific models through their common set of latent factors. Such information sharing helps to create more robust models especially for regions with limited or no training data. In addition, the framework can automatically determine cross-scale interactions between the regional variables and the local variables that are nested within them. Our experimental results show that the proposed framework outperforms all the baseline methods in at least 64% of the regions for 3 out of 4 lake water quality datasets evaluated in this study. Furthermore, the latent factors can be clustered to obtain a new set of regions that is more aligned with the response variables than the original regions that were defined a priori from the ecology domain.

  6. A Summary of the Naval Postgraduate School Research Program

    DTIC Science & Technology

    1989-08-30

    5 Fundamental Theory for Automatically Combining Changes to Software Systems ............................ 6 Database -System Approach to...Software Engineering Environments(SEE’s) .................................. 10 Multilevel Database Security .......................... 11 Temporal... Database Management and Real-Time Database Computers .................................... 12 The Multi-lingual, Multi Model, Multi-Backend Database

  7. Hazardous material transportation safety and security field operational test beta test and baseline data report : executive summary

    DOT National Transportation Integrated Search

    2003-10-29

    The Beta Test and Baseline Data Collection efforts ensured that the test technologies would successfully operate during the field operational test (FOT) in the designed scenario configurations. These efforts also ensured that FOT systems would succes...

  8. Multi-focus image fusion and robust encryption algorithm based on compressive sensing

    NASA Astrophysics Data System (ADS)

    Xiao, Di; Wang, Lan; Xiang, Tao; Wang, Yong

    2017-06-01

    Multi-focus image fusion schemes have been studied in recent years. However, little work has been done in multi-focus image transmission security. This paper proposes a scheme that can reduce data transmission volume and resist various attacks. First, multi-focus image fusion based on wavelet decomposition can generate complete scene images and optimize the perception of the human eye. The fused images are sparsely represented with DCT and sampled with structurally random matrix (SRM), which reduces the data volume and realizes the initial encryption. Then the obtained measurements are further encrypted to resist noise and crop attack through combining permutation and diffusion stages. At the receiver, the cipher images can be jointly decrypted and reconstructed. Simulation results demonstrate the security and robustness of the proposed scheme.

  9. Smart Grid Demonstration Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Craig; Carroll, Paul; Bell, Abigail

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives,more » to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and posted for universal access at www.nreca.coop/smartgrid. This research is available for widespread distribution to both cooperative members and non-members. These reports are listed in Table 1.2. Interoperability: The deliverable in this area was the advancement of the MultiSpeak™ interoperability standard from version 4.0 to version 5.0, and improvement in the MultiSpeak™ documentation to include more than 100 use cases. This deliverable substantially expanded the scope and usability of MultiSpeak, ™ the most widely deployed utility interoperability standard, now in use by more than 900 utilities. MultiSpeak™ documentation can be accessed only at www.multispeak.org. Cyber Security: NRECA’s starting point was to develop cyber security tools that incorporated succinct guidance on best practices. The deliverables were: cyber security extensions to MultiSpeak,™ which allow more security message exchanges; a Guide to Developing a Cyber Security and Risk Mitigation Plan; a Cyber Security Risk Mitigation Checklist; a Cyber Security Plan Template that co-ops can use to create their own cyber security plans; and Security Questions for Smart Grid Vendors.« less

  10. Acquisition of Armored Vehicles Purchased Through Contract W914NS-05-M-1189

    DTIC Science & Technology

    2005-10-21

    vehicles. Results. The Multi-National Security Transition Command – Iraq (MNSTC-I) purchased seven armored Mercedes - Benz vehicles that did not have...contractor to provide seven armored Mercedes - Benz vehicles. The vehicles were to be used by the Multi-National Security Transition Command (MNSTC-I) to...ability to provide the vehicles immediately. The contract called for the delivery of seven Mercedes - Benz sedans at a price of $135,000 per vehicle that

  11. Health of midlife and older adults in China: the role of regional economic development, inequality, and institutional setting.

    PubMed

    Ding, Xuejie; Billari, Francesco C; Gietel-Basten, Stuart

    2017-11-01

    To document the association between economic development, income inequality, and health-related public infrastructure, and health outcomes among Chinese adults in midlife and older age. We use a series of multi-level regression models with individual-level baseline data from the China Health and Retirement Longitudinal Survey (CHARLS). Provincial-level data are obtained both from official statistics and from CHARLS itself. Multi-level models are estimated with different subjective and objective health outcomes. Economic growth is associated with better self-rated health, but also with obesity. Better health infrastructure tends to be negatively associated with health outcomes, indicating the likely presence of reverse causality. No supportive evidence is found for the hypothesis that income inequality leads to worse health outcomes. Our study shows that on top of individual characteristics, provincial variations in economic development, income inequality, and health infrastructure are associated with a range of health outcomes for Chinese midlife and older adults. Economic development in China might also bring adverse health outcomes for this age group; as such specific policy responses need to be developed.

  12. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less

  13. Serum phosphate is associated with aortic valve calcification in the Multi-ethnic Study of Atherosclerosis (MESA).

    PubMed

    Linefsky, Jason P; O'Brien, Kevin D; Sachs, Michael; Katz, Ronit; Eng, John; Michos, Erin D; Budoff, Matthew J; de Boer, Ian; Kestenbaum, Bryan

    2014-04-01

    This study sought to investigate associations of phosphate metabolism biomarkers with aortic valve calcification (AVC). Calcific aortic valve disease (CAVD) is a common progressive condition that involves inflammatory and calcification mediators. Currently there are no effective medical treatments, but mineral metabolism pathways may be important in the development and progression of disease. We examined associations of phosphate metabolism biomarkers, including serum phosphate, urine phosphate, parathyroid hormone (PTH) and serum fibroblast growth factor (FGF)-23, with CT-assessed AVC at study baseline and in short-term follow-up in 6814 participants of the Multi-Ethnic Study of Atherosclerosis (MESA). At baseline, AVC prevalence was 13.2%. Higher serum phosphate levels were associated with significantly greater AVC prevalence (relative risk 1.3 per 1 mg/dL increment, 95% confidence incidence: 1.1 to 1.5, p<0.001). Serum FGF-23, serum PTH, and urine phosphate were not associated with prevalent AVC. Average follow-up CT evaluation was 2.4 years (range 0.9-4.9 years) with an AVC incidence of 4.1%. Overall, phosphate metabolism biomarkers were not associated with incident AVC except in the top FGF-23 quartile. Serum phosphate levels are significantly associated with AVC prevalence. Further study of phosphate metabolism as a modifiable risk factor for AVC is warranted. Published by Elsevier Ireland Ltd.

  14. Serum Phosphate is Associated with Aortic Valve Calcification in the Multi-Ethnic Study of Atherosclerosis (MESA)

    PubMed Central

    Linefsky, Jason P.; O’Brien, Kevin D.; Sachs, Michael; Katz, Ronit; Eng, John; Michos, Erin D.; Budoff, Matthew J.; de Boer, Ian; Kestenbaum, Bryan

    2014-01-01

    Objectives This study sought to investigate associations of phosphate metabolism biomarkers with aortic valve calcification (AVC). Background Calcific aortic valve disease (CAVD) is a common progressive condition that involves inflammatory and calcification mediators. Currently there are no effective medical treatments, but mineral metabolism pathways may be important in the development and progression of disease. Methods We examined associations of phosphate metabolism biomarkers, including serum phosphate, urine phosphate, parathyroid hormone (PTH) and serum fibroblast growth factor (FGF)-23, with CT-assessed AVC at study baseline and in short-term follow-up in 6,814 participants of the Multi-Ethnic Study of Atherosclerosis (MESA). Results At baseline, AVC prevalence was 13.2%. Higher serum phosphate levels were associated with significantly greater AVC prevalence (relative risk 1.3 per 1mg/dL increment, 95% confidence incidence: 1.1 to 1.5, p < 0.001). Serum FGF-23, serum PTH, and urine phosphate were not associated with prevalent AVC. Average follow-up CT evaluation was 2.4 years (range 0.9–4.9 years) with an AVC incidence of 4.1%. Overall, phosphate metabolism biomarkers were not associated with incident AVC except in the top FGF-23 quartile. Conclusions Serum phosphate levels are significantly associated with AVC prevalence. Further study of phosphate metabolism as a modifiable risk factor for AVC is warranted. PMID:24530958

  15. Six-month trajectories of self-reported depressive symptoms in long-term care.

    PubMed

    McCusker, Jane; Cole, Martin G; Voyer, Philippe; Monette, Johanne; Champoux, Nathalie; Ciampi, Antonio; Vu, Minh; Belzile, Eric; Bai, Chun

    2016-01-01

    Depression is a common problem in long-term care (LTC) settings. We sought to characterize depression symptom trajectories over six months among older residents, and to identify resident characteristics at baseline that predict symptom trajectory. This study was a secondary analysis of data from a six-month prospective, observational, and multi-site study. Severity of depressive symptoms was assessed with the 15-item Geriatric Depression Scale (GDS) at baseline and with up to six monthly follow-up assessments. Participants were 130 residents with a Mini-Mental State Examination score of 15 or more at baseline and of at least two of the six monthly follow-up assessments. Individual resident GDS trajectories were grouped using hierarchical clustering. The baseline predictors of a more severe trajectory were identified using the Proportional Odds Model. Three clusters of depression symptom trajectory were found that described "lower," "intermediate," and "higher" levels of depressive symptoms over time (mean GDS scores for three clusters at baseline were 2.2, 4.9, and 9.0 respectively). The GDS scores in all groups were generally stable over time. Baseline predictors of a more severe trajectory were as follows: Initial GDS score of 7 or more, female sex, LTC residence for less than 12 months, and corrected visual impairment. The six-month course of depressive symptoms in LTC is generally stable. Most residents who experience a more severe symptom trajectory can be identified at baseline.

  16. Security Belt for Wireless Implantable Medical Devices.

    PubMed

    Kulaç, Selman

    2017-09-19

    In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.

  17. 77 FR 31866 - Intent To Request Approval From OMB of One New Public Collection of Information: Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-30

    ... (BASE) Program for Public Transportation Systems AGENCY: Transportation Security Administration, DHS. ACTION: 60-day Notice. SUMMARY: The Transportation Security Administration (TSA) invites public comment... under contract with a public transportation agency. \\1\\ TSA, ``Transportation Sector-Specific Plan Mass...

  18. A cluster randomised trial of a school-based intervention to prevent decline in adolescent physical activity levels: study protocol for the ‘Physical Activity 4 Everyone’ trial

    PubMed Central

    2013-01-01

    Background Adolescence is an established period of physical activity decline. Multi-component school-based interventions have the potential to slow the decline in adolescents’ physical activity; however, few interventions have been conducted in schools located in low-income or disadvantaged communities. This study aims to assess the effectiveness of a multi-component school-based intervention in reducing the decline in physical activity among students attending secondary schools located in disadvantaged communities. Methods/Design The cluster randomised trial will be conducted with 10 secondary schools located in selected regions of New South Wales, Australia. The schools will be selected from areas that have a level of socio-economic status that is below the state average. Five schools will be allocated to receive an intervention based on the Health Promoting Schools framework, and will be supported by a part-time physical activity consultant placed in intervention schools who will implement a range of intervention adoption strategies. Study measures will be taken at baseline when students are in Year 7 (12–13 years) and again after 12- and 24-months. The primary outcome, minutes of moderate- to-vigorous- intensity physical activity per day and percentage of time in moderate- to vigorous-intensity physical activity (MVPA), will be objectively assessed using accelerometers (Actigraph GT3x+). Group allocation and intervention delivery will commence after baseline data collection. The intervention will continue during school terms through to 24-month follow-up. Discussion The study will provide evidence regarding the effectiveness of a multi-component school-based intervention that includes an in-school physical activity consultant targeting the physical activity levels of adolescents in disadvantaged Australian secondary schools. Trial registration Australian New Zealand Clinical Trials Registry ACTRN12612000382875. PMID:23336603

  19. An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

    ERIC Educational Resources Information Center

    Alomari, Firas

    2013-01-01

    The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…

  20. Change Detection Algorithms for Information Assurance of Computer Networks

    DTIC Science & Technology

    2002-01-01

    original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the

  1. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup

    NASA Astrophysics Data System (ADS)

    Kuo, Cynthia; Walker, Jesse; Perrig, Adrian

    Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.

  2. Strengthening Data Confidentiality and Integrity Protection in the Context of a Multi-Centric Information System Dedicated to Autism Spectrum Disorder.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.

  3. Religious-Based Violence and National Security in Nigeria: Case Studies of Kaduna State and the Taliban Activities in Borno State

    DTIC Science & Technology

    2009-06-12

    A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the...other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a ...Violence and National Security in Nigeria: Nigeria is a multi-religious and multi-ethnic society with enormous potential for economic, social, and

  4. Clinical and Vitamin Response to a Short-Term Multi-Micronutrient Intervention in Brazilian Children and Teens: From Population Data to Interindividual Responses.

    PubMed

    Mathias, Mariana Giaretta; Coelho-Landell, Carolina de Almeida; Scott-Boyer, Marie-Pier; Lacroix, Sébastien; Morine, Melissa J; Salomão, Roberta Garcia; Toffano, Roseli Borges Donegá; Almada, Maria Olímpia Ribeiro do Vale; Camarneiro, Joyce Moraes; Hillesheim, Elaine; de Barros, Tamiris Trevisan; Camelo-Junior, José Simon; Campos Giménez, Esther; Redeuil, Karine; Goyon, Alexandre; Bertschy, Emmanuelle; Lévêques, Antoine; Oberson, Jean-Marie; Giménez, Catherine; Carayol, Jerome; Kussmann, Martin; Descombes, Patrick; Métairon, Slyviane; Draper, Colleen Fogarty; Conus, Nelly; Mottaz, Sara Colombo; Corsini, Giovanna Zambianchi; Myoshi, Stephanie Kazu Brandão; Muniz, Mariana Mendes; Hernandes, Lívia Cristina; Venâncio, Vinícius Paula; Antunes, Lusania Maria Greggi; da Silva, Rosana Queiroz; Laurito, Taís Fontellas; Rossi, Isabela Ribeiro; Ricci, Raquel; Jorge, Jéssica Ré; Fagá, Mayara Leite; Quinhoneiro, Driele Cristina Gomes; Reche, Mariana Chinarelli; Silva, Paula Vitória Sozza; Falquetti, Letícia Lima; da Cunha, Thaís Helena Alves; Deminice, Thalia Manfrin Martins; Tambellini, Tâmara Hambúrguer; de Souza, Gabriela Cristina Arces; de Oliveira, Mariana Moraes; Nogueira-Pileggi, Vicky; Matsumoto, Marina Takemoto; Priami, Corrado; Kaput, Jim; Monteiro, Jacqueline Pontes

    2018-03-01

    Micronutrients are in small amounts in foods, act in concert, and require variable amounts of time to see changes in health and risk for disease. These first principles are incorporated into an intervention study designed to develop new experimental strategies for setting target recommendations for food bioactives for populations and individuals. A 6-week multivitamin/mineral intervention is conducted in 9-13 year olds. Participants (136) are (i) their own control (n-of-1); (ii) monitored for compliance; (iii) measured for 36 circulating vitamin forms, 30 clinical, anthropometric, and food intake parameters at baseline, post intervention, and following a 6-week washout; and (iv) had their ancestry accounted for as modifier of vitamin baseline or response. The same intervention is repeated the following year (135 participants). Most vitamins respond positively and many clinical parameters change in directions consistent with improved metabolic health to the intervention. Baseline levels of any metabolite predict its own response to the intervention. Elastic net penalized regression models are identified, and significantly predict response to intervention on the basis of multiple vitamin/clinical baseline measures. The study design, computational methods, and results are a step toward developing recommendations for optimizing vitamin levels and health parameters for individuals. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Analysis of surface EMG baseline for detection of hidden muscle activity

    NASA Astrophysics Data System (ADS)

    Zhang, Xu; Zhou, Ping

    2014-02-01

    Objective. This study explored the feasibility of detecting hidden muscle activity in surface electromyogram (EMG) baseline. Approach. Power spectral density (PSD) analysis and multi-scale entropy (MSE) analysis were used. Both analyses were applied to computer simulations of surface EMG baseline with the presence (representing activity data) or absence (representing reference data) of hidden muscle activity, as well as surface electrode array EMG baseline recordings of healthy control and amyotrophic lateral sclerosis (ALS) subjects. Main results. Although the simulated reference data and the activity data yielded no distinguishable difference in the time domain, they demonstrated a significant difference in the frequency and signal complexity domains with the PSD and MSE analyses. For a comparison using pooled data, such a difference was also observed when the PSD and MSE analyses were applied to surface electrode array EMG baseline recordings of healthy control and ALS subjects, which demonstrated no distinguishable difference in the time domain. Compared with the PSD analysis, the MSE analysis appeared to be more sensitive for detecting the difference in surface EMG baselines between the two groups. Significance. The findings implied the presence of a hidden muscle activity in surface EMG baseline recordings from the ALS subjects. To promote the presented analysis as a useful diagnostic or investigatory tool, future studies are necessary to assess the pathophysiological nature or origins of the hidden muscle activity, as well as the baseline difference at the individual subject level.

  6. Analysis of Surface EMG Baseline for Detection of Hidden Muscle Activity

    PubMed Central

    Zhang, Xu; Zhou, Ping

    2014-01-01

    Objective This study explored the feasibility of detecting hidden muscle activity in surface electromyogram (EMG) baseline. Approach Power spectral density (PSD) analysis and multi-scale entropy (MSE) analysis were used respectively. Both analyses were applied to computer simulations of surface EMG baseline with presence (representing activity data) or absence (representing reference data) of hidden muscle activity, as well as surface electrode array EMG baseline recordings of healthy control and amyotrophic lateral sclerosis (ALS) subjects. Main results Although the simulated reference data and the activity data yielded no distinguishable difference in the time domain, they demonstrated a significant difference in the frequency and signal complexity domains with the PSD and MSE analyses. For a comparison using pooled data, such a difference was also observed when the PSD and MSE analyses were applied to surface electrode array EMG baseline recordings of healthy control and ALS subjects, which demonstrated no distinguishable difference in the time domain. Compared with the PSD analysis, the MSE analysis appeared to be more sensitive for detecting the difference in surface EMG baselines between the two groups. Significance The findings implied presence of hidden muscle activity in surface EMG baseline recordings from the ALS subjects. To promote the presented analysis as a useful diagnostic or investigatory tool, future studies are necessary to assess the pathophysiological nature or origins of the hidden muscle activity, as well as the baseline difference at the individual subject level. PMID:24445526

  7. Risk to Water Security on Small Islands

    NASA Astrophysics Data System (ADS)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map of the risk to water security throughout Andros Island. It evaluates risk to water security for current and future scenarios and will enable water resource managers to effectively adapt to future impacts on water security.

  8. Multi-stage ranking of emergency technology alternatives for water source pollution accidents using a fuzzy group decision making tool.

    PubMed

    Qu, Jianhua; Meng, Xianlin; You, Hong

    2016-06-05

    Due to the increasing number of unexpected water source pollution events, selection of the most appropriate disposal technology for a specific pollution scenario is of crucial importance to the security of urban water supplies. However, the formulation of the optimum option is considerably difficult owing to the substantial uncertainty of such accidents. In this research, a multi-stage technical screening and evaluation tool is proposed to determine the optimal technique scheme, considering the areas of pollutant elimination both in drinking water sources and water treatment plants. In stage 1, a CBR-based group decision tool was developed to screen available technologies for different scenarios. Then, the threat degree caused by the pollution was estimated in stage 2 using a threat evaluation system and was partitioned into four levels. For each threat level, a corresponding set of technique evaluation criteria weights was obtained using Group-G1. To identify the optimization alternatives corresponding to the different threat levels, an extension of TOPSIS, a multi-criteria interval-valued trapezoidal fuzzy decision making technique containing the four arrays of criteria weights, to a group decision environment was investigated in stage 3. The effectiveness of the developed tool was elaborated by two actual thallium-contaminated scenarios associated with different threat levels. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  10. Phenotypic factors influencing the variation in response of circulating cholesterol level to personalised dietary advice in the Food4Me study.

    PubMed

    Kirwan, Laura; Walsh, Marianne C; Celis-Morales, Carlos; Marsaux, Cyril F M; Livingstone, Katherine M; Navas-Carretero, Santiago; Fallaize, Rosalind; O'Donovan, Clare B; Woolhead, Clara; Forster, Hannah; Kolossa, Silvia; Daniel, Hannelore; Moschonis, George; Manios, Yannis; Surwillo, Agnieszka; Godlewska, Magdalena; Traczyk, Iwona; Drevon, Christian A; Gibney, Mike J; Lovegrove, Julie A; Martinez, J Alfredo; Saris, Wim H M; Mathers, John C; Gibney, Eileen R; Brennan, Lorraine

    2016-12-01

    Individual response to dietary interventions can be highly variable. The phenotypic characteristics of those who will respond positively to personalised dietary advice are largely unknown. The objective of this study was to compare the phenotypic profiles of differential responders to personalised dietary intervention, with a focus on total circulating cholesterol. Subjects from the Food4Me multi-centre study were classified as responders or non-responders to dietary advice on the basis of the change in cholesterol level from baseline to month 6, with lower and upper quartiles defined as responder and non-responder groups, respectively. There were no significant differences between demographic and anthropometric profiles of the groups. Furthermore, with the exception of alcohol, there was no significant difference in reported dietary intake, at baseline. However, there were marked differences in baseline fatty acid profiles. The responder group had significantly higher levels of stearic acid (18 : 0, P=0·034) and lower levels of palmitic acid (16 : 0, P=0·009). Total MUFA (P=0·016) and total PUFA (P=0·008) also differed between the groups. In a step-wise logistic regression model, age, baseline total cholesterol, glucose, five fatty acids and alcohol intakes were selected as factors that successfully discriminated responders from non-responders, with sensitivity of 82 % and specificity of 83 %. The successful delivery of personalised dietary advice may depend on our ability to identify phenotypes that are responsive. The results demonstrate the potential use of metabolic profiles in identifying response to an intervention and could play an important role in the development of precision nutrition.

  11. Stroke with polyvascular atherothrombotic disease.

    PubMed

    Blanco, Miguel; Sobrino, Tomás; Montaner, Joan; Medrano, Vicente; Jiménez, Carmen; Masjuán, Jaime; Gómez-Escalonilla, Carlos; de Luis, Pilar; Arboix, Adriá; Castillo, José

    2010-02-01

    To study the influence of polyvascular atherothrombotic disease on stroke patient prognosis, its relation with inflammatory markers, and to analyze the progression of atherothrombotic disease. MITICO is a multi-centered prospective observational study recruiting non-anticoagulated ischemic stroke patients. Blood samples were obtained at baseline and at one year follow-up for determination of high sensitivity C reactive protein (hs-CRP), interleukin 6 (IL-6), intercellular adhesion molecule 1 (ICAM-1), vascular cell adhesion molecule 1 (VCAM-1), matrix metalloproteinase 9 (MMP-9), and cellular fibronectin (c-Fn). Patients with polyvascular atherothrombotic disease were considered when presented a history of angina-myocardial infarction, intermittent claudication or ischemic limbs-amputation at inclusion. The sample consisted of 863 patients, 121 of them considered as polyvascular atherothrombotic disease (14.02%). Recurrence and vascular death were higher in patients with polyvascular atherothrombotic disease, as compared to patients with monovascular atherothrombotic disease (19.8% vs. 12.4%, p=0.022). Baseline plasma levels of IL-6 and VCAM-1 were higher in patients with polyvascular atherothrombotic disease. IL-6 and VCAM-1 levels were independently associated with a new vascular episode/vascular death. This association was stronger in the group of patients with polyvascular atherothrombotic disease. Baseline levels of IL-6, VCAM-1 and c-Fn were significantly higher in patients who developed progression of atherothrombotic disease. The increase from baseline in MMP-9 and c-Fn levels after one year follow-up was associated to progression of atherothrombotic disease. Stroke patients with polyvascular atherothrombotic disease showed higher rates of vascular recurrence and a stronger association with inflammatory markers. Progression of atherothrombotic disease was associated with inflammatory markers. Copyright 2009 Elsevier Ireland Ltd. All rights reserved.

  12. Association between Heat Shock Protein-60 and Development of Atrial Fibrillation: Results from the Multi-Ethnic Study of Atherosclerosis (MESA).

    PubMed

    Maan, Abhishek; Jorgensen, Neal W; Mansour, Moussa; Dudley, Samuel; Jenny, Nancy S; Defilippi, Christopher; Szklo, Moyses; Alonso, Alvaro; Refaat, Marwan M; Ruskin, Jeremy; Heckbert, Susan R; Heist, E Kevin

    2016-12-01

    During atrial fibrillation (AF), a high rate of myocyte activation causes cellular stress and initiates the process of atrial remodeling, which further promotes persistence of AF. Although heat shock proteins (HSPs) have been shown to prevent atrial remodeling and suppress the occurrence of AF in cellular and animal experimental models, increased levels of HSP-60 have been observed in patients with postoperative AF, likely reflecting a response to cellular stress. To better understand the role of HSP-60 in relation to AF, we examined the association of HSP-60 levels in relation to the future development of AF in the Multi-Ethnic Study of Atherosclerosis (MESA). MESA is a cohort study that recruited 6,814 participants aged 45-84 years and free of known cardiovascular disease at baseline (2000-2002) from six field centers. We investigated 983 participants, selected at random from the total cohort, who had HSP-60 measured and were free of AF at baseline. We tested the association of HSP-60 levels with the incidence of AF using multivariate Cox models after adjustment for demographics, clinical characteristics, and biomarkers. During an average of 10.6 years of follow-up, 77 participants developed AF. We did not observe a significant association between the log-transformed HSP-60 levels and development of AF on either unadjusted or multivariate analysis (adjusted hazard ratio: 1.02 per unit difference on natural log scale, 95% confidence interval: 0.77-1.34 ln (ng/mL). Contrary to the findings from the preclinical studies, which demonstrated an important role of HSP-60 in the pathogenesis of AF, we did not observe a significant association between HSP-60 and occurrence of AF. © 2016 Wiley Periodicals, Inc.

  13. Patient ethnicity and three psychiatric intensive care units compared: the Tompkins Acute Ward Study.

    PubMed

    Bowers, L; Simpson, A; Nijman, H; Hall, C

    2008-04-01

    Psychiatric care units provide care to disturbed patients in a context of higher security and staffing levels. Although such units are numerous, few systematic comparisons have been made, and there are indications that ethnic minority groups may be over-represented. The aim of this study was to compare the rates of adverse incidents and patterns of usage of three psychiatric intensive care units. The study used a triangulation or multi-method design, bringing together data from official statistics, local audit and interviews conducted with staff. Intensive care patients were more likely to be young, male and suffering a psychotic disorder, as compared with general acute ward patients. Caribbean patients were twice as likely, and Asian patients half as likely, to receive intensive care (age, gender and diagnosis controlled). There were large differences in service levels, staffing, team functioning and adverse incidents between the three units. Various aspects of physical security were important in preventing absconds. More evaluative research is required in order to define effective service levels, and to explore the nature of the interaction between ethnicity and inpatient care provision during acute illness.

  14. The Two Faces Of Adolescents’ Success With Peers: Adolescent Popularity, Social Adaptation, and Deviant Behavior

    PubMed Central

    Allen, Joseph P.; Porter, Maryfrances R.; McFarland, F. Christy; Marsh, Penny; McElhaney, Kathleen Boykin

    2006-01-01

    This study assessed the hypothesis that popularity in adolescence takes on a twofold role, both marking high levels of concurrent psychosocial adaptation, but also predicting increases over time in both positive and negative behaviors sanctioned by peer norms. This hypothesis was tested with multi-method, longitudinal data obtained on a diverse community sample of 185 adolescents. Sociometric popularity data were examined in relation to data from interview-based assessments of attachment security and ego development, observations of mother-adolescent interactions, and repeated self- and peer-report assessments of delinquency and alcohol use. Results indicated that popular adolescents displayed higher concurrent levels of ego development, secure attachment and more adaptive interactions with mothers and best friends. Longitudinal analyses supported a “popularity-socialization” hypothesis, however, in which popular adolescents were more likely to increase in behaviors that receive approval in the peer group (e.g., minor levels of drug use and delinquency) and decrease in behaviors unlikely to be well-received by peers (e.g., hostile behavior with peers). PMID:15892790

  15. Two antenna, two pass interferometric synthetic aperture radar

    DOEpatents

    Martinez, Ana; Doerry, Armin W.; Bickel, Douglas L.

    2005-06-28

    A multi-antenna, multi-pass IFSAR mode utilizing data driven alignment of multiple independent passes can combine the scaling accuracy of a two-antenna, one-pass IFSAR mode with the height-noise performance of a one-antenna, two-pass IFSAR mode. A two-antenna, two-pass IFSAR mode can accurately estimate the larger antenna baseline from the data itself and reduce height-noise, allowing for more accurate information about target ground position locations and heights. The two-antenna, two-pass IFSAR mode can use coarser IFSAR data to estimate the larger antenna baseline. Multi-pass IFSAR can be extended to more than two (2) passes, thereby allowing true three-dimensional radar imaging from stand-off aircraft and satellite platforms.

  16. Securing stent during multi-stage laryngotracheoplasty--an evolved technique.

    PubMed

    Siegel, Bianca; Bent, John P

    2015-09-01

    Multi-stage laryngotracheoplasty (LTP) typically requires a stent be secured to the airway for 2-6 weeks. Our technique has evolved over time to securing the stent to the strap muscles and tying a series of knots long enough to leave the suture tail protruding through the skin incision, which simplifies stent removal. Retrospective chart review. Twenty-four patients underwent multi-stage LTP at our institution from 2007 to 2013. Eight patients were excluded from the study because they either did not have a stent placed (n=4), or they had a t-tube placed which was not sutured in place (n=4). Of the remaining 16 patients, 62.5% (n=10) had their stent secured via sutures which were buried below the skin, and 37.5% (n=6) via a long suture tail which was left protruding through the end of the skin incision. An incision was required for stent removal 100% of buried sutures patients, and 33% of exposed suture patients (p=0.0009). Average operative time for stent removal was 60min in the buried sutures group, and 25min in the exposed sutures group (p=0.0075). Securing stents via an exposed suture technique decreases the need for making a skin incision during the second stage of the operation, and significantly decreases the operative time of the second stage. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  17. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  18. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  19. The Effect of Increasing Doses of Saw Palmetto Fruit Extract on Serum PSA Levels: Analysis of the CAMUS Randomized Trial

    PubMed Central

    Andriole, Gerald L.; McCullum-Hill, Christie; Sandhu, Gurdarshan S.; Crawford, E. David; Barry, Michael J.; Cantor, Alan

    2014-01-01

    Purpose Saw palmetto extracts are used for treating lower urinary tract symptoms in men despite level I evidence concluding that saw palmetto was ineffective in reducing lower urinary symptoms. We sought to determine whether higher doses of saw palmetto as studied in CAMUS affect serum PSA levels. Materials and Methods The CAMUS trial was a randomized, placebo-controlled double blind multi-centered North American trial conducted between June 5, 2008 and October 10, 2012 in which 369 men >45 years of age with AUA symptom score ≥ 8 and ≤ 24 were randomly assigned to placebo or dose escalation saw palmetto, which consisted of 320mg for first 24 weeks to 640mg for next 24 weeks to 960mg for last 24 weeks of this 72 week trial. Serum PSA levels (Beckman-Coulter) were obtained at baseline and at weeks 24, 48 and 72 and were compared between treatment groups using the pooled t and Fisher's exact tests. Results Serum PSA levels were similar at baseline for the placebo (1.93 ± 1.59 ng/ml) and saw palmetto groups (2.20 ± 1.95, p = 0.16). Changes in PSA levels over the course of the study were similar: placebo group mean change 0.16 ± 1.08 ng/ml and saw palmetto group mean change 0.23 ± 0.83 ng/ml (p value 0.50). Additionally, no differential effect on serum PSA levels was observed between treatment arms when groups were stratified by baseline PSA values. Conclusions Saw palmetto extract does not affect serum PSA levels more than placebo even at relatively high doses. PMID:23253958

  20. [Epidemiology of food insecurity in Mexico].

    PubMed

    Mundo-Rosas, Verónica; Shamah-Levy, Teresa; Rivera-Dommarco, Juan A

    2013-01-01

    To estimate the proportion of Mexican households in food insecurity (FI) and their distribution in relation to nutrition and socioeconomic conditions. We evaluated information from 40 809 households. FI was measured using a harmonized version for Mexico of the Latin American and Caribbean food Security Scale. Households were classified according to the level of food insecurity as follows: Food security, mild, moderate and severe FI. We describe the distribution of FI according to some household socioeconomic variables. Nationally, 28.2% of households had moderate or severe FI. Rural, indigenous ethnicity and household deprivation were risk factors moderate to severe FI (35.4, 42.2 and 45.9%, respectively). Severe FI was also associated with lower children height and weight. Multi-sectorial actions are needed to address the basic needs of households with moderate and severe FI.

  1. Mythical systems: mathematic and logical theory

    NASA Astrophysics Data System (ADS)

    Nescolarde-Selva, J.; Usó-Doménech, J. L.; Lloret-Climent, M.

    2015-01-01

    The process of elaboration of the symbolic universe leads to exciting insights regarding the search for human emotional security. The symbols end up as explanatory axes of universal reality and on them are constructed myths that form a superstructure for belief systems. Human society is a multi-level system with a material structure (society), an ideological superstructure (belief systems, values, etc.) and a super superstructure with two parts: mythical (origin and justification) and utopic (final goal). All mythical belief systems have a numinous-religious nature.

  2. The Effects of Level of Autonomy on Human-Agent Teaming for Multi-Robot Control and Local Security Maintenance

    DTIC Science & Technology

    2013-11-01

    different types of tasks, the associated costs of task switching also increase (Squire et al., 2006). Task switching costs may be increased with higher...switching costs as well, particularly when managing robot teams of increasing size (Squire et al., 2006). 1.3 Individual Differences The effects of...Research: Ready to Deliver the Promises. Mind 2003, 2 (3), 4. Jian, J.; Bisantz, A. M.; Drury , C. G. Foundations for an Empirically Determined Scale

  3. Tomographic Imaging of a Forested Area By Airborne Multi-Baseline P-Band SAR.

    PubMed

    Frey, Othmar; Morsdorf, Felix; Meier, Erich

    2008-09-24

    In recent years, various attempts have been undertaken to obtain information about the structure of forested areas from multi-baseline synthetic aperture radar data. Tomographic processing of such data has been demonstrated for airborne L-band data but the quality of the focused tomographic images is limited by several factors. In particular, the common Fourierbased focusing methods are susceptible to irregular and sparse sampling, two problems, that are unavoidable in case of multi-pass, multi-baseline SAR data acquired by an airborne system. In this paper, a tomographic focusing method based on the time-domain back-projection algorithm is proposed, which maintains the geometric relationship between the original sensor positions and the imaged target and is therefore able to cope with irregular sampling without introducing any approximations with respect to the geometry. The tomographic focusing quality is assessed by analysing the impulse response of simulated point targets and an in-scene corner reflector. And, in particular, several tomographic slices of a volume representing a forested area are given. The respective P-band tomographic data set consisting of eleven flight tracks has been acquired by the airborne E-SAR sensor of the German Aerospace Center (DLR).

  4. A Multi-Pronged Plan

    ERIC Educational Resources Information Center

    Starkman, Neal

    2007-01-01

    As schools adopt new and varied technologies to protect the campus community, the need to look at security tools in terms of a comprehensive, layered, and integrated strategy, becomes clear. This article discusses how schools are using these security tools.

  5. Multi-level biological responses in Ucides cordatus (Linnaeus, 1763) (Brachyura, Ucididae) as indicators of conservation status in mangrove areas from the western atlantic.

    PubMed

    Duarte, Luis Felipe de Almeida; Souza, Caroline Araújo de; Nobre, Caio Rodrigues; Pereira, Camilo Dias Seabra; Pinheiro, Marcelo Antonio Amaro

    2016-11-01

    There is a global lack of knowledge on tropical ecotoxicology, particularly in terms of mangrove areas. These areas often serve as nurseries or homes for several animal species, including Ucides cordatus (the uçá crab). This species is widely distributed, is part of the diet of human coastal communities, and is considered to be a sentinel species due to its sensitivity to toxic xenobiotics in natural environments. Sublethal damages to benthic populations reveal pre-pathological conditions, but discussions of the implications are scarce in the literature. In Brazil, the state of São Paulo offers an interesting scenario for ecotoxicology and population studies: it is easy to distinguish between mangroves that are well preserved and those which are significantly impacted by human activity. The objectives of this study were to provide the normal baseline values for the frequency of Micronucleated cells (MN‰) and for neutral red retention time (NRRT) in U. cordatus at pristine locations, as well to indicate the conservation status of different mangrove areas using a multi-level biological response approach in which these biomarkers and population indicators (condition factor and crab density) are applied in relation to environmental quality indicators (determined via information in the literature and solid waste volume). A mangrove area with no effects of impact (areas of reference or pristine areas) presented a mean value of MN‰<3 and NRRT>120min, values which were assumed as baseline values representing genetic and physiological normality. A significant correlation was found between NRRT and MN, with both showing similar and effective results for distinguishing between different mangrove areas according to conservation status. Furthermore, crab density was lower in more impacted mangrove areas, a finding which also reflects the effects of sublethal damage; this finding was not determined by condition factor measurements. Multi-level biological responses were able to reflect the conservation status of the mangrove areas studied using information on guideline values of MN‰, NRRT, and density of the uçá crab in order to categorize three levels of human impacts in mangrove areas: PNI (probable null impact); PLI (probable low impact); and PHI (probable high impact). Results confirm the success of U. cordatus species' multi-level biological responses in diagnosing threats to mangrove areas. Therefore, this species represents an effective tool in studies on mangrove conservation statuses in the Western Atlantic. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. 76 FR 22809 - Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ...-AA00 Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA AGENCY... Security Exercise, a multi-agency exercise that tests the proficiency of teams called upon in real [[Page... exercise, many of whom will be traveling at high speeds while interfacing with law enforcement responders...

  7. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Treesearch

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  8. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    ERIC Educational Resources Information Center

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  9. A model for manuscript submitted to the nth IIR conference on overview of the long-baseline neutrino facility cryogenic system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Montanari, David; Adamowski, Mark; Bremer, Johan

    2017-03-09

    The Deep Underground Neutrino Experiment (DUNE) collaboration is developing a multi-kiloton Long-Baseline neutrino experiment that will be located one mile underground at the Sanford Underground Research Facility (SURF) in Lead, SD. In the present design, detectors will be located inside four cryostats filled with a total of 68,400 ton of ultrapure liquid argon, at the level of impurities lower than 100 parts per trillion of oxygen equivalent contamination. The Long-Baseline Neutrino Facility (LBNF) is developing the conventional facilities and cryogenics infrastructure supporting this experiment. The cryogenics system is composed of several sub-systems: External/Infrastructure, Proximity, and Internal cryogenics. It will bemore » engineered, manufactured, commissioned, and qualified by an international engineering team. This contribution highlights the main features of the LBNF cryogenic system. It presents its performance, functional requirements and modes of operations. As a result, it also details the status of the design, present and future needs.« less

  10. A Unified Cropland Layer at 250-m for global agriculture monitoring

    USGS Publications Warehouse

    Waldner, François; Fritz, Steffen; Di Gregorio, Antonio; Plotnikov, Dmitry; Bartalev, Sergey; Kussul, Nataliia; Gong, Peng; Thenkabail, Prasad S.; Hazeu, Gerard; Klein, Igor; Löw, Fabian; Miettinen, Jukka; Dadhwal, Vinay Kumar; Lamarche, Céline; Bontemps, Sophie; Defourny, Pierre

    2016-01-01

    Accurate and timely information on the global cropland extent is critical for food security monitoring, water management and earth system modeling. Principally, it allows for analyzing satellite image time-series to assess the crop conditions and permits isolation of the agricultural component to focus on food security and impacts of various climatic scenarios. However, despite its critical importance, accurate information on the spatial extent, cropland mapping with remote sensing imagery remains a major challenge. Following an exhaustive identification and collection of existing land cover maps, a multi-criteria analysis was designed at the country level to evaluate the fitness of a cropland map with regards to four dimensions: its timeliness, its legend, its resolution adequacy and its confidence level. As a result, a Unified Cropland Layer that combines the fittest products into a 250 m global cropland map was assembled. With an evaluated accuracy ranging from 82% to 95%, the Unified Cropland Layer successfully improved the accuracy compared to single global products.

  11. Safety and efficacy of a multi-electrode renal sympathetic denervation system in resistant hypertension: the EnligHTN I trial

    PubMed Central

    Worthley, Stephen G.; Tsioufis, Costas P.; Worthley, Matthew I.; Sinhal, Ajay; Chew, Derek P.; Meredith, Ian T.; Malaiapan, Yuvi; Papademetriou, Vasilios

    2013-01-01

    Aims Catheter-based renal artery sympathetic denervation has emerged as a novel therapy for treatment of patients with drug-resistant hypertension. Initial studies were performed using a single electrode radiofrequency catheter, but recent advances in catheter design have allowed the development of multi-electrode systems that can deliver lesions with a pre-determined pattern. This study was designed to evaluate the safety and efficacy of the EnligHTN™ multi-electrode system. Methods and results We conducted the first-in-human, prospective, multi-centre, non-randomized study in 46 patients (67% male, mean age 60 years, and mean baseline office blood pressure 176/96 mmHg) with drug-resistant hypertension. The primary efficacy objective was change in office blood pressure from baseline to 6 months. Safety measures included all adverse events with a focus on the renal artery and other vascular complications and changes in renal function. Renal artery denervation, using the EnligHTN™ system significantly reduced the office blood pressure from baseline to 1, 3, and 6 months by −28/10, −27/10 and −26/10 mmHg, respectively (P < 0.0001). No acute renal artery injury or other serious vascular complications occurred. Small, non-clinically relevant, changes in average estimated glomerular filtration rate were reported from baseline (87 ± 19 mL/min/1.73 m2) to 6 months post-procedure (82 ± 20 mL/min/1.73 m2). Conclusion Renal sympathetic denervation, using the EnligHTN™ multi-electrode catheter results in a rapid and significant office blood pressure reduction that was sustained through 6 months. The EnligHTN™ system delivers a promising therapy for the treatment of drug-resistant hypertension. PMID:23782649

  12. Safety and efficacy of a multi-electrode renal sympathetic denervation system in resistant hypertension: the EnligHTN I trial.

    PubMed

    Worthley, Stephen G; Tsioufis, Costas P; Worthley, Matthew I; Sinhal, Ajay; Chew, Derek P; Meredith, Ian T; Malaiapan, Yuvi; Papademetriou, Vasilios

    2013-07-01

    Catheter-based renal artery sympathetic denervation has emerged as a novel therapy for treatment of patients with drug-resistant hypertension. Initial studies were performed using a single electrode radiofrequency catheter, but recent advances in catheter design have allowed the development of multi-electrode systems that can deliver lesions with a pre-determined pattern. This study was designed to evaluate the safety and efficacy of the EnligHTN(™) multi-electrode system. We conducted the first-in-human, prospective, multi-centre, non-randomized study in 46 patients (67% male, mean age 60 years, and mean baseline office blood pressure 176/96 mmHg) with drug-resistant hypertension. The primary efficacy objective was change in office blood pressure from baseline to 6 months. Safety measures included all adverse events with a focus on the renal artery and other vascular complications and changes in renal function. Renal artery denervation, using the EnligHTN system significantly reduced the office blood pressure from baseline to 1, 3, and 6 months by -28/10, -27/10 and -26/10 mmHg, respectively (P < 0.0001). No acute renal artery injury or other serious vascular complications occurred. Small, non-clinically relevant, changes in average estimated glomerular filtration rate were reported from baseline (87 ± 19 mL/min/1.73 m2) to 6 months post-procedure (82 ± 20 mL/min/1.73 m2). Renal sympathetic denervation, using the EnligHTN multi-electrode catheter results in a rapid and significant office blood pressure reduction that was sustained through 6 months. The EnligHTN system delivers a promising therapy for the treatment of drug-resistant hypertension.

  13. The impact of a school food aid program on household food insecurity.

    PubMed

    Petralias, Athanassios; Papadimitriou, Eleni; Riza, Elena; Karagas, Margaret R; Zagouras, Alexia B A; Linos, Athena

    2016-04-01

    We had a unique opportunity to establish the extent of food insecurity and the potential impact of a large-scale school-based nutritional program, in low-socioeconomic status districts of Greece, during the current economic crisis. Around 162 schools with 25 349 students participated during the 2012-2013 school year. Each student received a daily healthy meal designed by nutrition specialists. Food insecurity levels, measured using the Food Security Survey Module were assessed at baseline and after a 1-8-month intervention period. Pre-post intervention responses were matched at an individual level. Around 64.2% of children's households experienced food insecurity at baseline. This percentage decreased to 59.1% post-intervention,P< 0.001. On an individual level, food insecurity score diminished by 6.5%,P< 0.001. After adjustment for various socioeconomic factors, for each additional month of participation, the odds of reducing the food insecurity score increased by 6.3% (OR = 1.06, 95% CI: 1.02-1.11). Those experiencing food insecurity with hunger at baseline were more likely to improve food insecurity score than those who did not (OR = 3.51, 95%CI: 2.92-4.21). Children and families residing in low socioeconomic areas of Greece, experience high levels of food insecurity. Our findings suggest that participation in a school-based food aid program may reduce food insecurity for children and their families in a developed country in times of economic hardship. © The Author 2016. Published by Oxford University Press on behalf of the European Public Health Association.

  14. Barriers to Uptake of Conservation Agriculture in southern Africa: Multi-level Analyses from Malawi

    NASA Astrophysics Data System (ADS)

    Dougill, Andrew; Stringer, Lindsay; Whitfield, Stephen; Wood, Ben; Chinseu, Edna

    2015-04-01

    Conservation agriculture is a key set of actions within the growing body of climate-smart agriculture activities being advocated and rolled out across much of the developing world. Conservation agriculture has purported benefits for environmental quality, food security and the sustained delivery of ecosystem services. In this paper, new multi-level analyses are presented, assessing the current barriers to adoption of conservation agriculture practices in Malawi. Despite significant donor initiatives that have targeted conservation agriculture projects, uptake rates remain low. This paper synthesises studies from across 3 levels in Malawi: i.) national level- drawing on policy analysis, interviews and a multi-stakeholder workshop; ii.) district level - via assessments of development plans and District Office and extension service support, and; iii) local level - through data gained during community / household level studies in Dedza District that have gained significant donor support for conservation agriculture as a component of climate smart agriculture initiatives. The national level multi-stakeholder Conservation Agriculture workshop identified three areas requiring collaborative research and outlined routes for the empowerment of the National Conservation Agriculture Task Force to advance uptake of conservation agriculture and deliver associated benefits in terms of agricultural development, climate adaptation and mitigation. District level analyses highlight that whilst District Development Plans are now checked against climate change adaptation and mitigation criteria, capacity and knowledge limitations exist at the District level, preventing project interventions from being successfully up-scaled. Community level assessments highlight the need for increased community participation at the project-design phase and identify a pressing requirement for conservation agriculture planning processes (in particular those driven by investments in climate-smart agriculture) to better accommodate, and respond to, the differentiated needs of marginalised groups (e.g. poor, elderly, carers). We identify good practices that can be used to design, plan and implement conservation agriculture projects such that the multiple benefits can be realised. We further outline changes to multi-level policy and institutional arrangements to facilitate greater adoption of conservation agriculture in Malawi, noting the vital importance of District-level institutions and amendments and capacity building required within agricultural extension services. We highlight the need for capacity building and support to ensure conservation agriculture's multiple benefits are realised more widely as a route towards sustainable land management.

  15. Hybrid WDM/OCDMA for next generation access network

    NASA Astrophysics Data System (ADS)

    Wang, Xu; Wada, Naoya; Miyazaki, T.; Cincotti, G.; Kitayama, Ken-ichi

    2007-11-01

    Hybrid wavelength division multiplexing/optical code division multiple access (WDM/OCDMA) passive optical network (PON), where asynchronous OCDMA traffic transmits over WDM network, can be one potential candidate for gigabit-symmetric fiber-to-the-home (FTTH) services. In a cost-effective WDM/OCDMA network, a large scale multi-port encoder/decoder can be employed in the central office, and a low cost encoder/decoder will be used in optical network unit (ONU). The WDM/OCDMA system could be one promising solution to the symmetric high capacity access network with high spectral efficiency, cost effective, good flexibility and enhanced security. Asynchronous WDM/OCDMA systems have been experimentally demonstrated using superstructured fiber Bragg gratings (SSFBG) and muti-port OCDMA en/decoders. The total throughput has reached above Tera-bit/s with spectral efficiency of about 0.41. The key enabling techniques include ultra-long SSFBG, multi-port E/D with high power contrast ratio, optical thresholding, differential phase shift keying modulation with balanced detection, forward error correction, and etc. Using multi-level modulation formats to carry multi-bit information with single pulse, the total capacity and spectral efficiency could be further enhanced.

  16. On combining multi-normalization and ancillary measures for the optimal score level fusion of fingerprint and voice biometrics

    NASA Astrophysics Data System (ADS)

    Mohammed Anzar, Sharafudeen Thaha; Sathidevi, Puthumangalathu Savithri

    2014-12-01

    In this paper, we have considered the utility of multi-normalization and ancillary measures, for the optimal score level fusion of fingerprint and voice biometrics. An efficient matching score preprocessing technique based on multi-normalization is employed for improving the performance of the multimodal system, under various noise conditions. Ancillary measures derived from the feature space and the score space are used in addition to the matching score vectors, for weighing the modalities, based on their relative degradation. Reliability (dispersion) and the separability (inter-/intra-class distance and d-prime statistics) measures under various noise conditions are estimated from the individual modalities, during the training/validation stage. The `best integration weights' are then computed by algebraically combining these measures using the weighted sum rule. The computed integration weights are then optimized against the recognition accuracy using techniques such as grid search, genetic algorithm and particle swarm optimization. The experimental results show that, the proposed biometric solution leads to considerable improvement in the recognition performance even under low signal-to-noise ratio (SNR) conditions and reduces the false acceptance rate (FAR) and false rejection rate (FRR), making the system useful for security as well as forensic applications.

  17. Gingival crevicular fluid bone turnover biomarkers: How postmenopausal women respond to orthodontic activation.

    PubMed

    Smuthkochorn, Sorapan; Palomo, J Martin; Hans, Mark G; Jones, Corey S; Palomo, Leena

    2017-07-01

    Bone turnover associated with orthodontic tooth movement is evidenced by increased bone turnover markers in gingival crevicular fluid (GCF). Postmenopausal women have an increased concentration of serum bone turnover markers. The filtrate of this serum makes up GCF, but little is known of the bone turnover around teeth in this cohort. The objective of this investigation was to compare the GCF bone turnover markers in premenopausal vs postmenopausal women receiving orthodontic treatment at baseline and at orthodontic activation. Twenty-eight women were enrolled in the study and separated into 2 groups: premenopausal (16) and postmenopausal (12). Bone turnover was evaluated by GCF at baseline and 24 hours after orthodontic appliance activation. GCF concentrations of RANKL and OPN were measured using ELISA. Baseline and change in concentrations were compared between groups. Baseline RANKL and OPN were significantly different between the premenopausal and postmenopausal groups (P <0.05). Both markers increased significantly from baseline to 24 hours after orthodontic appliance activation in both groups (P <0.05). However, the response to orthodontic activation was not significantly different between groups. Although postmenopausal women have a different bone turnover profile at baseline than do their premenopausal counterparts, there is no difference in their response to orthodontic activation. This confers a level of security associated with orthodontic activation. Future studies are warranted to construct biomarker curves throughout orthodontic therapy. Copyright © 2017 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  18. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  19. The problem of isotopic baseline: Reconstructing the diet and trophic position of fossil animals

    NASA Astrophysics Data System (ADS)

    Casey, Michelle M.; Post, David M.

    2011-05-01

    Stable isotope methods are powerful, frequently used tools which allow diet and trophic position reconstruction of organisms and the tracking of energy sources through ecosystems. The majority of ecosystems have multiple food sources which have distinct carbon and nitrogen isotopic signatures despite occupying a single trophic level. This difference in the starting isotopic composition of primary producers sets up an isotopic baseline that needs to be accounted for when calculating diet or trophic position using stable isotopic methods. This is particularly important when comparing animals from different regions or different times. Failure to do so can cause erroneous estimations of diet or trophic level, especially for organisms with mixed diets. The isotopic baseline is known to vary seasonally and in concert with a host of physical and chemical variables such as mean annual rainfall, soil maturity, and soil pH in terrestrial settings and lake size, depth, and distance from shore in aquatic settings. In the fossil record, the presence of shallowing upward suites of rock, or parasequences, will have a considerable impact on the isotopic baseline as basin size, depth and distance from shore change simultaneously with stratigraphic depth. For this reason, each stratigraphic level is likely to need an independent estimation of baseline even within a single outcrop. Very little is known about the scope of millennial or decadal variation in isotopic baseline. Without multi-year data on the nature of isotopic baseline variation, the impacts of time averaging on our ability to resolve trophic relationships in the fossil record will remain unclear. The use of a time averaged baseline will increase the amount of error surrounding diet and trophic position reconstructions. Where signal to noise ratios are low, due to low end member disparity (e.g., aquatic systems), or where the observed isotopic shift is small (≤ 1‰) the error introduced by time averaging may severely inhibit the scope of one's interpretations and limit the types of questions one can reliably answer. In situations with strong signal strength, resulting from high amounts of end member disparity (e.g., terrestrial settings), this additional error maybe surmountable. Baseline variation that is adequately characterized can be dealt with by applying multiple end-member mixing models.

  20. Energy Logic (EL): a novel fusion engine of multi-modality multi-agent data/information fusion for intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Rababaah, Haroun; Shirkhodaie, Amir

    2009-04-01

    The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.

  1. A demonstration of high precision GPS orbit determination for geodetic applications

    NASA Technical Reports Server (NTRS)

    Lichten, S. M.; Border, J. S.

    1987-01-01

    High precision orbit determination of Global Positioning System (GPS) satellites is a key requirement for GPS-based precise geodetic measurements and precise low-earth orbiter tracking, currently under study at JPL. Different strategies for orbit determination have been explored at JPL with data from a 1985 GPS field experiment. The most successful strategy uses multi-day arcs for orbit determination and includes fine tuning of spacecraft solar pressure coefficients and station zenith tropospheric delays using the GPS data. Average rms orbit repeatability values for 5 of the GPS satellites are 1.0, 1.2, and 1.7 m in altitude, cross-track, and down-track componenets when two independent 5-day fits are compared. Orbit predictions up to 24 hours outside the multi-day arcs agree within 4 m of independent solutions obtained with well tracked satellites in the prediction interval. Baseline repeatability improves with multi-day as compared to single-day arc orbit solutions. When tropospheric delay fluctuations are modeled with process noise, significant additional improvement in baseline repeatability is achieved. For a 246-km baseline, with 6-day arc solutions for GPS orbits, baseline repeatability is 2 parts in 100 million (0.4-0.6 cm) for east, north, and length components and 8 parts in 100 million for the vertical component. For 1314 and 1509 km baselines with the same orbits, baseline repeatability is 2 parts in 100 million for the north components (2-3 cm) and 4 parts in 100 million or better for east, length, and vertical components.

  2. 76 FR 9356 - Intent To Request Approval From OMB of One New Public Collection of Information: Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... during site visits with security and operating officials of transit systems. The STSIs capture and... assessments during site visits with security and operating officials of transit agencies. DATES: Send your... distance passenger railroad providers operate in the United States.\\1\\ Mass transit and passenger rail...

  3. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  4. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  5. Potential Collaborative Research topics with Korea’s Agency for Defense Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farrar, Charles R.; Todd, Michael D.

    2012-08-23

    This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involvedmore » the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.« less

  6. Hybrid Biosynthetic Autograft Extender for Use in Posterior Lumbar Interbody Fusion: Safety and Clinical Effectiveness.

    PubMed

    Chedid, Mokbel K; Tundo, Kelly M; Block, Jon E; Muir, Jeffrey M

    2015-01-01

    Autologous iliac crest bone graft is the preferred option for spinal fusion, but the morbidity associated with bone harvest and the need for graft augmentation in more demanding cases necessitates combining local bone with bone substitutes. The purpose of this study was to document the clinical effectiveness and safety of a novel hybrid biosynthetic scaffold material consisting of poly(D,L-lactide-co-glycolide) (PLGA, 75:25) combined by lyophilization with unmodified high molecular weight hyaluronic acid (10-12% wt:wt) as an extender for a broad range of spinal fusion procedures. We retrospectively evaluated all patients undergoing single- and multi-level posterior lumbar interbody fusion at an academic medical center over a 3-year period. A total of 108 patients underwent 109 procedures (245 individual vertebral levels). Patient-related outcomes included pain measured on a Visual Analog Scale. Radiographic outcomes were assessed at 6 weeks, 3-6 months, and 1 year postoperatively. Radiographic fusion or progression of fusion was documented in 221 of 236 index levels (93.6%) at a mean (±SD) time to fusion of 10.2+4.1 months. Single and multi-level fusions were not associated with significantly different success rates. Mean pain scores (+SD) for all patients improved from 6.8+2.5 at baseline to 3.6+2.9 at approximately 12 months. Improvements in VAS were greatest in patients undergoing one- or two-level fusion, with patients undergoing multi-level fusion demonstrating lesser but still statistically significant improvements. Overall, stable fusion was observed in 64.8% of vertebral levels; partial fusion was demonstrated in 28.8% of vertebral levels. Only 15 of 236 levels (6.4%) were non-fused at final follow-up.

  7. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  8. Six weeks of multi-station program on the knee proprioception and performance of futsal players.

    PubMed

    Pérez-Silvestre, Ángel; Albert-Lucena, Daniel; Gómez-Chiguano, Guido F; Plaza-Manzano, Gustavo; Pecos-Martín, Daniel; Gallego-Izquierdo, Tomás; Martín-Casas, Patricia; Romero-Franco, Natalia

    2018-03-27

    Proprioception and vertical jump are important parameters in the performance and prevention of injuries in futsal. However, very few studies have analyzed the role of multi-station exercises to improve these variables. The purpose of this study was to assess the effects of a six-week multi-station exercise program on knee joint position sense (JPS) and countermovement jump (CMJ) of futsal players. Thirty-four male futsal players randomly classified into experimental (n = 17) or control group (n = 17). The experimental group included a multi-station exercise protocol to their training routines (2 times/week - 6 weeks); the control group continued their training routines. All the players completed similar training routines outside of the multi-station exercises. Before (baseline), just after the intervention (Post6Wk) and four weeks later (Post10Wk), CMJ and knee JPS (absolute, relative and variable angular error: AAE, RAE and VAE, respectively) were evaluated. ANOVA showed that the experimental group significantly decreased VAE at Post10Wk compared to baseline, suggestive of greater proprioceptive precision, while the control group significantly increased AAE, RAE and VAE at Post10Wk compared to baseline. The experimental group exhibited lower and thus, better AAE and VAE than the control group at Post10Wk, although no significant differences were found at Post6Wk. No significant differences was found in the CMJ. A six weeks of multi-station program may help improve proprioceptive precision of futsal players, even one month after finishing the 6-wk multi-station training program. However, this is not long enough to improve proprioceptive acuity and maximum vertical jump. Therefore, the meaningful of these results in term of performance are unclear.

  9. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  10. Polinsar Experiments of Multi-Mode X-Band Data Over South Area of China

    NASA Astrophysics Data System (ADS)

    Lu, L.; Yan, Q.; Duan, M.; Zhang, Y.

    2012-08-01

    This paper makes the polarimetric and polarimetric interferometric synthetic aperture radar (PolInSAR) experiments with the high-resolution X-band data acquired by Multi-mode airborne SAR system over an area around Linshui, south of China containing tropic vegetation and urban areas. Polarimetric analysis for typical tropic vegetations and man-made objects are presented, some polarimetric descriptors sensitive to vegetations and man-made objects are selected. Then, the PolInSAR information contained in the data is investigated, considering characteristics of the Multi-mode-XSAR dataset, a dual-baseline polarimetric interferometry method is proposed in this paper. The method both guarantees the high coherence on fully polarimetric data and combines the benefits of short and long baseline that helpful to the phase unwrapping and height sensitivity promotion. PolInSAR experiment results displayed demonstrates Multi-mode-XSAR datasets have intuitive capabilities for amount of application of land classification, objects detection and DSM mapping.

  11. Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication

    DTIC Science & Technology

    2017-05-22

    Proceedings of the International Conference on Security and Management (SAM 󈧇) In Proceedings of the 2014 ACM SIGSAC Conference on Computer and...Communications Security (CCS ’14) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) In Proceedings of the 3rd Symposium...on Usable Privacy and Security (SOUPS ’07) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12) In Proceedings of

  12. Food Insecurity in Relation to Changes in Hemoglobin A1c, Self-Efficacy, and Fruit/Vegetable Intake During a Diabetes Educational Intervention

    PubMed Central

    Lyles, Courtney R.; Wolf, Michael S.; Schillinger, Dean; Davis, Terry C.; DeWalt, Darren; Dahlke, Allison R.; Curtis, Laura; Seligman, Hilary K.

    2013-01-01

    OBJECTIVE Food insecurity is hypothesized to make diabetes self-management more difficult. We conducted a longitudinal assessment of food insecurity with several diabetes self-care measures. RESEARCH DESIGN AND METHODS We conducted a secondary, observational analysis of 665 low-income patients with diabetes, all of whom received self-management support as part of a larger diabetes educational intervention. We analyzed baseline food insecurity (measured by the U.S. Department of Agriculture Food Security module) in relation to changes in hemoglobin A1c (HbA1c) as well as self-reported diabetes self-efficacy and daily fruit and vegetable intake. We examined longitudinal differences using generalized estimating equation linear regression models, controlling for time, age, sex, race, income, and intervention arm. RESULTS Overall, 57% of the sample had an income <$15,000. Participants who were food insecure (33%) were younger, had less income, and were more likely to be unemployed compared with participants who were food secure. At baseline, those who were food insecure had higher mean HbA1c values (8.4% vs. 8.0%) and lower self-efficacy and fruit and vegetable intake than those who were food secure (all P < 0.05). Compared with food-secure individuals, participants who were food insecure had significantly greater improvements in HbA1c over time (0.38% decrease compared with 0.01% decrease; P value for interaction <0.05) as well as in self-efficacy (P value for interaction <0.01). There was no significant difference in HbA1c by food security status at follow-up. CONCLUSIONS Participants experiencing food insecurity had poorer diabetes-related measures at baseline but made significant improvements in HbA1c and self-efficacy. Low-income patients who were food insecure may be particularly receptive to diabetes self-management support, even if interventions are not explicitly structured to address finances or food security challenges. PMID:23275354

  13. Food insecurity in relation to changes in hemoglobin A1c, self-efficacy, and fruit/vegetable intake during a diabetes educational intervention.

    PubMed

    Lyles, Courtney R; Wolf, Michael S; Schillinger, Dean; Davis, Terry C; Dewalt, Darren; Dahlke, Allison R; Curtis, Laura; Seligman, Hilary K

    2013-06-01

    Food insecurity is hypothesized to make diabetes self-management more difficult. We conducted a longitudinal assessment of food insecurity with several diabetes self-care measures. We conducted a secondary, observational analysis of 665 low-income patients with diabetes, all of whom received self-management support as part of a larger diabetes educational intervention. We analyzed baseline food insecurity (measured by the U.S. Department of Agriculture Food Security module) in relation to changes in hemoglobin A1c (HbA1c) as well as self-reported diabetes self-efficacy and daily fruit and vegetable intake. We examined longitudinal differences using generalized estimating equation linear regression models, controlling for time, age, sex, race, income, and intervention arm. Overall, 57% of the sample had an income <$15,000. Participants who were food insecure (33%) were younger, had less income, and were more likely to be unemployed compared with participants who were food secure. At baseline, those who were food insecure had higher mean HbA1c values (8.4% vs. 8.0%) and lower self-efficacy and fruit and vegetable intake than those who were food secure (all P < 0.05). Compared with food-secure individuals, participants who were food insecure had significantly greater improvements in HbA1c over time (0.38% decrease compared with 0.01% decrease; P value for interaction <0.05) as well as in self-efficacy (P value for interaction <0.01). There was no significant difference in HbA1c by food security status at follow-up. Participants experiencing food insecurity had poorer diabetes-related measures at baseline but made significant improvements in HbA1c and self-efficacy. Low-income patients who were food insecure may be particularly receptive to diabetes self-management support, even if interventions are not explicitly structured to address finances or food security challenges.

  14. Mapping Forest Height in Gabon Using UAVSAR Multi-Baseline Polarimetric SAR Interferometry and Lidar Fusion

    NASA Astrophysics Data System (ADS)

    Simard, M.; Denbina, M. W.

    2017-12-01

    Using data collected by NASA's Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR) and Land, Vegetation, and Ice Sensor (LVIS) lidar, we have estimated forest canopy height for a number of study areas in the country of Gabon using a new machine learning data fusion approach. Using multi-baseline polarimetric synthetic aperture radar interferometry (PolInSAR) data collected by UAVSAR, forest heights can be estimated using the random volume over ground model. In the case of multi-baseline UAVSAR data consisting of many repeat passes with spatially separated flight tracks, we can estimate different forest height values for each different image pair, or baseline. In order to choose the best forest height estimate for each pixel, the baselines must be selected or ranked, taking care to avoid baselines with unsuitable spatial separation, or severe temporal decorrelation effects. The current baseline selection algorithms in the literature use basic quality metrics derived from the PolInSAR data which are not necessarily indicative of the true height accuracy in all cases. We have developed a new data fusion technique which treats PolInSAR baseline selection as a supervised classification problem, where the classifier is trained using a sparse sampling of lidar data within the PolInSAR coverage area. The classifier uses a large variety of PolInSAR-derived features as input, including radar backscatter as well as features based on the PolInSAR coherence region shape and the PolInSAR complex coherences. The resulting data fusion method produces forest height estimates which are more accurate than a purely radar-based approach, while having a larger coverage area than the input lidar training data, combining some of the strengths of each sensor. The technique demonstrates the strong potential for forest canopy height and above-ground biomass mapping using fusion of PolInSAR with data from future spaceborne lidar missions such as the upcoming Global Ecosystems Dynamics Investigation (GEDI) lidar.

  15. Impact Response of Thermally Sprayed Metal Deposits

    NASA Astrophysics Data System (ADS)

    Wise, J. L.; Hall, A. C.; Moore, N. W.; Pautz, S. D.; Franke, B. C.; Scherzinger, W. M.; Brown, D. W.

    2017-06-01

    Gas-gun experiments have probed the impact response of tantalum specimens that were additively manufactured using a controlled thermal spray deposition process. Velocity interferometer (VISAR) diagnostics provided time-resolved measurements of sample response under one-dimensional (i . e . , uniaxial strain) shock compression to peak stresses ranging between 1 and 4 GPa. The acquired wave-profile data have been analyzed to determine the Hugoniot Elastic Limit (HEL), Hugoniot equation of state, and high-pressure yield strength of the thermally deposited samples for comparison to published baseline results for conventionally wrought tantalum. The effects of composition, porosity, and microstructure (e . g . , grain/splat size and morphology) are assessed to explain differences in the dynamic mechanical behavior of spray-deposited versus conventional material. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  16. Flexible Multi-Shock Shield

    NASA Technical Reports Server (NTRS)

    Christiansen, Eric L. (Inventor); Crews, Jeanne L. (Inventor)

    2005-01-01

    Flexible multi-shock shield system and method are disclosed for defending against hypervelocity particles. The flexible multi-shock shield system and method may include a number of flexible bumpers or shield layers spaced apart by one or more resilient support layers, all of which may be encapsulated in a protective cover. Fasteners associated with the protective cover allow the flexible multi-shock shield to be secured to the surface of a structure to be protected.

  17. Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2008-01-01

    This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.

  18. Satellite Imagery Analysis for Automated Global Food Security Forecasting

    NASA Astrophysics Data System (ADS)

    Moody, D.; Brumby, S. P.; Chartrand, R.; Keisler, R.; Mathis, M.; Beneke, C. M.; Nicholaeff, D.; Skillman, S.; Warren, M. S.; Poehnelt, J.

    2017-12-01

    The recent computing performance revolution has driven improvements in sensor, communication, and storage technology. Multi-decadal remote sensing datasets at the petabyte scale are now available in commercial clouds, with new satellite constellations generating petabytes/year of daily high-resolution global coverage imagery. Cloud computing and storage, combined with recent advances in machine learning, are enabling understanding of the world at a scale and at a level of detail never before feasible. We present results from an ongoing effort to develop satellite imagery analysis tools that aggregate temporal, spatial, and spectral information and that can scale with the high-rate and dimensionality of imagery being collected. We focus on the problem of monitoring food crop productivity across the Middle East and North Africa, and show how an analysis-ready, multi-sensor data platform enables quick prototyping of satellite imagery analysis algorithms, from land use/land cover classification and natural resource mapping, to yearly and monthly vegetative health change trends at the structural field level.

  19. The Multivariate Roles of Family Instability and Interparental Conflict in Predicting Children's Representations of Insecurity in the Family System and Early School Adjustment Problems.

    PubMed

    Coe, Jesse L; Davies, Patrick T; Sturge-Apple, Melissa L

    2017-02-01

    This study examined the moderating role of family instability in relations involving destructive interparental conflict, children's internal representations of insecurity in the family system, and their early school maladjustment. Two hundred forty-three preschool children (M age = 4.60 years; 56 % girls) and their families participated in this multi-method (i.e., observations, structured interview, surveys) multi-informant (i.e., observer, parent, teacher), longitudinal study. Findings indicated that the mediational role of children's insecure family representations in the pathway between destructive interparental conflict and children's adjustment problems varied significantly depending on the level of family instability. Interparental conflict was specifically associated with insecure family representations only under conditions of low family instability. In supporting the role of family instability as a vulnerable-stable risk factor, follow up analyses revealed that children's concerns about security in the family were uniformly high under conditions of heightened instability regardless of their level of exposure to interparental conflict.

  20. A comparative study of multi-focus image fusion validation metrics

    NASA Astrophysics Data System (ADS)

    Giansiracusa, Michael; Lutz, Adam; Messer, Neal; Ezekiel, Soundararajan; Alford, Mark; Blasch, Erik; Bubalo, Adnan; Manno, Michael

    2016-05-01

    Fusion of visual information from multiple sources is relevant for applications security, transportation, and safety applications. One way that image fusion can be particularly useful is when fusing imagery data from multiple levels of focus. Different focus levels can create different visual qualities for different regions in the imagery, which can provide much more visual information to analysts when fused. Multi-focus image fusion would benefit a user through automation, which requires the evaluation of the fused images to determine whether they have properly fused the focused regions of each image. Many no-reference metrics, such as information theory based, image feature based and structural similarity-based have been developed to accomplish comparisons. However, it is hard to scale an accurate assessment of visual quality which requires the validation of these metrics for different types of applications. In order to do this, human perception based validation methods have been developed, particularly dealing with the use of receiver operating characteristics (ROC) curves and the area under them (AUC). Our study uses these to analyze the effectiveness of no-reference image fusion metrics applied to multi-resolution fusion methods in order to determine which should be used when dealing with multi-focus data. Preliminary results show that the Tsallis, SF, and spatial frequency metrics are consistent with the image quality and peak signal to noise ratio (PSNR).

  1. Utilising a multi-item questionnaire to assess household food security in Australia.

    PubMed

    Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda

    2018-03-15

    Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P < .001), marital status (P = .005), household income (P < .001) and education (P < .001). Findings suggest food insecurity is an important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.

  2. Comparative Shock Response of Additively Manufactured Versus Conventionally Wrought 304L Stainless Steel*

    NASA Astrophysics Data System (ADS)

    Wise, J. L.; Adams, D. P.; Nishida, E. E.; Song, B.; Maguire, M. C.; Carroll, J.; Reedlunn, B.; Bishop, J. E.

    2015-06-01

    Gas-gun experiments have probed the compression and release behavior of impact-loaded 304L stainless steel specimens machined from additively manufactured (AM) blocks as well as baseline ingot-derived bar stock. The AM technology allows direct fabrication of metal parts. For the present study, a velocity interferometer (VISAR) measured the time-resolved motion of samples subjected to one-dimensional (i.e., uniaxial strain) shock compression to peak stresses ranging from 0.2 to 7.5 GPa. The acquired wave-profile data have been analyzed to determine the comparative Hugoniot Elastic Limit (HEL), Hugoniot equation of state, spall strength, and high-pressure yield strength of the AM and conventional materials. Observed differences in shock loading and unloading characteristics for the two 304L source variants have been correlated to complementary Kolsky bar results for compressive and tensile testing at lower strain rates. The effects of composition, porosity, microstructure (e.g., grain size and morphology), residual stress, and sample axis orientation relative to the additive manufacturing deposition trajectory have been assessed to explain differences between the AM and baseline 304L dynamic mechanical properties. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000.

  3. Consequence Prioritization Process for Potential High Consequence Events (HCE)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freeman, Sarah G.

    2016-10-31

    This document describes the process for Consequence Prioritization, the first phase of the Consequence-Driven Cyber-Informed Engineering (CCE) framework. The primary goal of Consequence Prioritization is to identify potential disruptive events that would significantly inhibit an organization’s ability to provide the critical services and functions deemed fundamental to their business mission. These disruptive events, defined as High Consequence Events (HCE), include both events that have occurred or could be realized through an attack of critical infrastructure owner assets. While other efforts have been initiated to identify and mitigate disruptive events at the national security level, such as Presidential Policy Directive 41more » (PPD-41), this process is intended to be used by individual organizations to evaluate events that fall below the threshold for a national security. Described another way, Consequence Prioritization considers threats greater than those addressable by standard cyber-hygiene and includes the consideration of events that go beyond a traditional continuity of operations (COOP) perspective. Finally, Consequence Prioritization is most successful when organizations adopt a multi-disciplinary approach, engaging both cyber security and engineering expertise, as in-depth engineering perspectives are required to recognize and characterize and mitigate HCEs. Figure 1 provides a high-level overview of the prioritization process.« less

  4. Comparative performance between compressed and uncompressed airborne imagery

    NASA Astrophysics Data System (ADS)

    Phan, Chung; Rupp, Ronald; Agarwal, Sanjeev; Trang, Anh; Nair, Sumesh

    2008-04-01

    The US Army's RDECOM CERDEC Night Vision and Electronic Sensors Directorate (NVESD), Countermine Division is evaluating the compressibility of airborne multi-spectral imagery for mine and minefield detection application. Of particular interest is to assess the highest image data compression rate that can be afforded without the loss of image quality for war fighters in the loop and performance of near real time mine detection algorithm. The JPEG-2000 compression standard is used to perform data compression. Both lossless and lossy compressions are considered. A multi-spectral anomaly detector such as RX (Reed & Xiaoli), which is widely used as a core algorithm baseline in airborne mine and minefield detection on different mine types, minefields, and terrains to identify potential individual targets, is used to compare the mine detection performance. This paper presents the compression scheme and compares detection performance results between compressed and uncompressed imagery for various level of compressions. The compression efficiency is evaluated and its dependence upon different backgrounds and other factors are documented and presented using multi-spectral data.

  5. International Nuclear Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less

  6. Environmental radiology assessment in Lahad Datu, Sabah

    NASA Astrophysics Data System (ADS)

    Siti Fharhana, Yusof; Wan Muhamad Saridan, Wan Hassan; Ahmad Termizi, Ramli; Mohd Hilmi, Sahini; Mohammad Syazwan, Mohd Sanusi; Nor Afifah, Basri; Nor Zati Hani, Abu Hanifah

    2017-10-01

    Monitoring terrestial gamma radiation is crucial to prepare a baseline data for environmental radiological protection. Radiological research was carried out in Lahad Datu, Sabah to obtain the radioactivity status and terrestrial gamma radiation level in the area. We measure the terrestrial gamma radiation dose rates and analyse the radioactivity concentration of primordial radionuclides for radiological risk assessment. We identified that the annual estimation of dose effective for public is below the public dose limit, 1 mSv per year. Public and environment safety and health are remain secure. The obtained data and results can be used as reference for environmental radiology protection.

  7. Secure multi-party quantum summation based on quantum Fourier transform

    NASA Astrophysics Data System (ADS)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  8. Unnecessary work tasks and mental health: a prospective analysis of Danish human service workers.

    PubMed

    Madsen, Ida E H; Tripathi, Manisha; Borritz, Marianne; Rugulies, Reiner

    2014-11-01

    According to the "stress-as-offense-to-self" perspective, work tasks that are considered unnecessary or unreasonable - so-called "illegitimate work tasks" - are likely to elicit stress-reactions. Previous studies, mostly cross-sectional, have shown that illegitimate tasks are associated with increased self-reported stress, cortisol, and counterproductive work behavior. In this article, we examine the prospective association between unnecessary work tasks, one type of illegitimate work tasks, and mental health among Danish human service workers. Further, we explore whether this association is modified by sex, age, occupational position, and baseline mental health status. The data were obtained from self-administered questionnaires from 1351 Danish human service workers in three waves of data-collection during 1999-2005. We measured unnecessary work tasks by a single item, and assessed mental health using the 5-item mental health inventory from the Short form 36 questionnaire. We analyzed data using multi-level modeling, adjusting for potential confounding by sex, age, cohabitation, occupational position, and baseline mental health. Unnecessary work tasks were prospectively associated with a decreased level of mental health. This association was stronger for employees with poor baseline mental health and tended to be more pronounced among older employees. Among participants with poor baseline mental health, the association was explained by neither psychological demands nor decision latitude. Our findings suggest that the prevention of unnecessary work tasks may benefit employee mental health, particularly among employees with pre-existing mental health problems.

  9. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  10. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code.

    PubMed

    Lin, Chao; Shen, Xueju; Li, Baochen

    2014-08-25

    We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.

  11. Organization of the secure distributed computing based on multi-agent system

    NASA Astrophysics Data System (ADS)

    Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera

    2018-04-01

    Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.

  12. Proceedings of a workshop: Multidisciplinary Use of the Very Long Baseline Array

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The National Research Council organized a workshop to gather together experts in very long baseline interometry, astronomy, space navigation, general relativity and the earth sciences. The purpose of the workshop was to provide a forum for consideration of the various possible multi-disciplinary uses of the very long baseline array. Geophysical investigations received major attention. Geodesic uses of the very long baseline array were identified as were uses for fundamental astronomy investigations. Numerous specialized uses were identified.

  13. Transmission Line Security Monitor

    ScienceCinema

    None

    2017-12-09

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. 49 CFR 172.330 - Tank cars and multi-unit tank car tanks.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 2 2013-10-01 2013-10-01 false Tank cars and multi-unit tank car tanks. 172.330..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.330 Tank cars and multi-unit tank car tanks. (a... material— (1) In a tank car unless the following conditions are met: (i) The tank car must be marked on...

  15. 49 CFR 172.330 - Tank cars and multi-unit tank car tanks.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 2 2012-10-01 2012-10-01 false Tank cars and multi-unit tank car tanks. 172.330..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.330 Tank cars and multi-unit tank car tanks. (a... material— (1) In a tank car unless the following conditions are met: (i) The tank car must be marked on...

  16. 49 CFR 172.330 - Tank cars and multi-unit tank car tanks.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 2 2014-10-01 2014-10-01 false Tank cars and multi-unit tank car tanks. 172.330..., TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.330 Tank cars and multi-unit tank car tanks. (a... material— (1) In a tank car unless the following conditions are met: (i) The tank car must be marked on...

  17. Forearm muscle oxygenation decreases with low levels of voluntary contraction

    NASA Technical Reports Server (NTRS)

    Murthy, G.; Kahan, N. J.; Hargens, A. R.; Rempel, D. M.

    1997-01-01

    The purpose of our investigation was to determine if the near infrared spectroscopy technique was sensitive to changes in tissue oxygenation at low levels of isometric contraction in the extensor carpi radialis brevis muscle. Nine subjects were seated with the right arm abducted to 45 degrees, elbow flexed to 85 degrees, forearm pronated 45 degrees, and wrist and forearm supported on an armrest throughout the protocol. Altered tissue oxygenation was measured noninvasively with near infrared spectroscopy. The near infrared spectroscopy probe was placed over the extensor carpi radialis brevis of the subject's right forearm and secured with an elastic wrap. After 1 minute of baseline measurements taken with the muscle relaxed, four different loads were applied just proximal to the metacarpophalangeal joint such that the subjects isometrically contracted the extensor carpi radialis brevis at 5, 10, 15, and 50% of the maximum voluntary contraction for 1 minute each. A 3-minute recovery period followed each level of contraction. At the end of the protocol, with the probe still in place, a value for ischemic tissue oxygenation was obtained for each subject. This value was considered the physiological zero and hence 0% tissue oxygenation. Mean tissue oxygenation (+/-SE) decreased from resting baseline (100% tissue oxygenation) to 89 +/- 4, 81 +/- 8, 78 +/- 8, and 47 +/- 8% at 5, 10, 15, and 50% of the maximum voluntary contraction, respectively. Tissue oxygenation levels at 10, 15, and 50% of the maximum voluntary contraction were significantly lower (p < 0.05) than the baseline value. Our results indicate that tissue oxygenation significantly decreases during brief, low levels of static muscle contraction and that near infrared spectroscopy is a sensitive technique for detecting deoxygenation noninvasively at low levels of forearm muscle contraction. Our findings have important implications in occupational medicine because oxygen depletion induced by low levels of muscle contraction may be directly linked to muscle fatigue.

  18. Fuzzy Evaluating Customer Satisfaction of Jet Fuel Companies

    NASA Astrophysics Data System (ADS)

    Cheng, Haiying; Fang, Guoyi

    Based on the market characters of jet fuel companies, the paper proposes an evaluation index system of jet fuel company customer satisfaction from five dimensions as time, business, security, fee and service. And a multi-level fuzzy evaluation model composing with the analytic hierarchy process approach and fuzzy evaluation approach is given. Finally a case of one jet fuel company customer satisfaction evaluation is studied and the evaluation results response the feelings of the jet fuel company customers, which shows the fuzzy evaluation model is effective and efficient.

  19. Publics and biobanks: Pan-European diversity and the challenge of responsible innovation.

    PubMed

    Gaskell, George; Gottweis, Herbert; Starkbaum, Johannes; Gerber, Monica M; Broerse, Jacqueline; Gottweis, Ursula; Hobbs, Abbi; Helén, Ilpo; Paschou, Maria; Snell, Karoliina; Soulier, Alexandra

    2013-01-01

    This article examines public perceptions of biobanks in Europe using a multi-method approach combining quantitative and qualitative data. It is shown that public support for biobanks in Europe is variable and dependent on a range of interconnected factors: people's engagement with biobanks; concerns about privacy and data security, and trust in the socio-political system, key actors and institutions involved in biobanks. We argue that the biobank community needs to acknowledge the impact of these factors if they are to successfully develop and integrate biobanks at a pan-European level.

  20. Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.

    PubMed

    Veeningen, Meilof; Chatterjea, Supriyo; Horváth, Anna Zsófia; Spindler, Gerald; Boersma, Eric; van der Spek, Peter; van der Galiën, Onno; Gutteling, Job; Kraaij, Wessel; Veugen, Thijs

    2018-01-01

    While there is a clear need to apply data analytics in the healthcare sector, this is often difficult because it requires combining sensitive data from multiple data sources. In this paper, we show how the cryptographic technique of secure multi-party computation can enable such data analytics by performing analytics without the need to share the underlying data. We discuss the issue of compliance to European privacy legislation; report on three pilots bringing these techniques closer to practice; and discuss the main challenges ahead to make fully privacy-preserving data analytics in the medical sector commonplace.

  1. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  2. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  3. Community resilience under multi-hazards: time series measurement and it's strategies for improvement

    NASA Astrophysics Data System (ADS)

    Tian, Cong-shan; Fang, Yi-ping

    2017-04-01

    Multi - hazards stress is a big obsession that hampers the social and economic development in disaster - prone areas. There is a need to understand and manage drivers of vulnerability and adaptive capacity to the system of multiple geological hazards. Here we pilot three methods namely the multi - hazards resilience assessment model (new framework), the entropy weight method, and the assess social resilience to flood hazards model to measure the resilience to natural hazards of landslide and debris flow on community scale. Using one typical multi - hazards affected county in southwest China, 32 resilience indicators belonging to antecedent conditions, coping responses, adaptation (including learning), and hazard exposure are selected, and a composite index was calculated under the three methods mentioned above. Results show that the new framework reflected a more detailed fluctuation among the 16 years, despite of the overall similar trend between 2000 and 2015 under the three methods. Medical insurance coverage, unemployment insurance coverage, education degree, and hazard exposure are the main drivers of resilience. The most effective strategies for improving community resilience to multiple hazards are likely to be accelerating the development of education, improving the level of medical security, increasing unemployment insurance, and establishing multi - hazards prevention and mitigation systems.

  4. Requirements, model and prototype for a multi-utility locational and security information hub.

    DOT National Transportation Integrated Search

    2015-11-01

    This project lays the foundation for building an exchange hub for locational and security data and risk assessment of potential excavation work. It acts primarily at 2 stages: upstream of the mark-out process, as a decision support tool to help strea...

  5. The p27Kip1 Tumor Suppressor and Multi-Step Tumorigenesis

    DTIC Science & Technology

    2001-08-01

    Breast Cancer , Cell cycle, tumor suppressor 33 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...in many cancers , including carcinomas of the breast , colon, lung and prostate, and lymphoma. Although these studies of p27 expression in primary...of DMBA-induced pituitary tumors in p27-/- mice precluded determination of breast cancer risk in these mice. Nevertheless, the extensive mammary tissue

  6. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    PubMed

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  7. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  8. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  9. Interparental Conflict in Kindergarten and Adolescent Adjustment: Prospective Investigation of Emotional Security as an Explanatory Mechanism

    PubMed Central

    Cummings, E. Mark; George, Melissa R. W.; McCoy, Kathleen P.; Davies, Patrick T.

    2012-01-01

    Advancing the long-term prospective study of explanations for the effects of marital conflict on children’s functioning, relations were examined between interparental conflict in kindergarten, children’s emotional insecurity in the early school years, and subsequent adolescent internalizing and externalizing problems. Based on a community sample of 235 mothers, fathers and children (M = 6.00, 8.02, 12.62 years), and multi-method and multi-reporter assessments, structural equation model (SEM) tests provided support for emotional insecurity in early childhood as an intervening process related to adolescent internalizing and externalizing problems, even with stringent auto-regressive controls over prior levels of functioning for both mediating and outcome variables. Discussion considers implications for understanding pathways between interparental conflict, emotional insecurity and adjustment in childhood and adolescence. PMID:22694264

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Juarez, Anthony

    In November 2015, the Center for Global Security Research, NSO, and Global Security program jointly sponsored a seminar investigating questions related to cross-domain deterrence at Lawrence Livermore National Laboratory. At the seminar, experts were asked to moderate discussion based on the four topics below. For each of these topics, we have compiled a short list of literature that will help analysts develop a baseline understanding of the issue.

  11. A new pure ω-3 eicosapentaenoic acid ethyl ester (AMR101) for the management of hypertriglyceridemia: the MARINE trial.

    PubMed

    Jacobson, Terry A

    2012-06-01

    ω-3 fatty acids reduce triglyceride (TG) levels, but corresponding increases in low-density lipoprotein cholesterol (LDL-C) levels may compromise achievement of lipid goals in patients with elevated cardiovascular risk. AMR101 is an investigational agent containing ≥96% of pure icosapent ethyl (the ethyl ester of eicosapentaenoic acid). The Phase III Multi-Center, Placebo-Controlled, Randomized, Double-Blind, 12-Week Study with an Open-Label Extension (MARINE) investigated the efficacy and safety of AMR101 in 229 patients with very high TG levels (≥500 mg/dl). AMR101 4 g/day significantly reduced median placebo-adjusted TG levels from baseline by 33.1% (p < 0.0001), and AMR101 2 g/day reduced TG levels by 19.7% (p = 0.0051). Changes in LDL-C were minimal and nonsignificant. AMR101 may offer substantial TG lowering without increases in LDL-C levels.

  12. Deconvolution single shot multibox detector for supermarket commodity detection and classification

    NASA Astrophysics Data System (ADS)

    Li, Dejian; Li, Jian; Nie, Binling; Sun, Shouqian

    2017-07-01

    This paper proposes an image detection model to detect and classify supermarkets shelves' commodity. Based on the principle of the features directly affects the accuracy of the final classification, feature maps are performed to combine high level features with bottom level features. Then set some fixed anchors on those feature maps, finally the label and the position of commodity is generated by doing a box regression and classification. In this work, we proposed a model named Deconvolutiuon Single Shot MultiBox Detector, we evaluated the model using 300 images photographed from real supermarket shelves. Followed the same protocol in other recent methods, the results showed that our model outperformed other baseline methods.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in reconfigurable network enclaving through Software Defined Networking (SDN) and Network Function Virtualization (NFV) and their applicability to secure enclaves in HPC environments. SDN and NFV methods are based on a solid foundation of system wide virtualization. The purpose of which is very straight forward, the system administrator can deploy networks that are more amenable to customer needs, and at the same time achieve increased scalability making it easier to increase overall capacity as needed without negatively affecting functionality. The network administration of both the server system and the virtual sub-systems is simplified allowing control of the infrastructure through well-defined APIs (Application Programming Interface). While SDN and NFV technologies offer significant promise in meeting these goals, they also provide the ability to address a significant component of the multi-tenant challenge in HPC environments, namely resource isolation. Traditional HPC systems are built upon scalable high-performance networking technologies designed to meet specific application requirements. Dynamic isolation of resources within these environments has remained difficult to achieve. SDN and NFV methodology provide us with relevant concepts and available open standards based APIs that isolate compute and storage resources within an otherwise common networking infrastructure. Additionally, the integration of the networking APIs within larger system frameworks such as OpenStack provide the tools necessary to establish isolated enclaves dynamically allowing the benefits of HPC while providing a controlled security structure surrounding these systems.« less

  14. Effect of Physical Therapy Students' Clinical Experiences on Clinician Productivity.

    PubMed

    Pivko, Susan E; Abbruzzese, Laurel D; Duttaroy, Pragati; Hansen, Ruth L; Ryans, Kathryn

    2016-01-01

    Physical therapy clinical education experiences (CEEs) are difficult to secure, particularly first-level CEEs. Our purpose was to determine 1) what impact student full-time CEEs have on PT clinician productivity and 2) whether there is a productivity difference between first vs final CEEs. Productivity logs, including possible factors impacting productivity, were distributed to clinician-student pairings on first and final CEEs. Two-week baseline data (without a student) were compared to weeks 1 and 6 (with a student) for 31 logs using a 2x4 repeated-measures ANOVA. In a subset of 17 logs for CEEs 8 weeks or longer, a 2x5 repeated-measures ANOVA was performed. There was a significant increase in the number of patients seen and CPT units billed by both levels of CEEs comparing weeks 1 and 6. In the subset of CEEs, 8 weeks or longer, there was a significant increase in the number of patients treated per hour at week 6 and a trend toward a change at week 8 when compared to baseline week A. The factors selected as impacting productivity were census (59%) and staffing (32%). Physical therapy clinician-student pairings showed an overall increase in productivity during both full-time first and final level CEEs.

  15. Hepatocyte growth factor is associated with progression of atherosclerosis: The Multi-Ethnic Study of Atherosclerosis (MESA).

    PubMed

    Bell, Elizabeth J; Decker, Paul A; Tsai, Michael Y; Pankow, James S; Hanson, Naomi Q; Wassel, Christina L; Larson, Nicholas B; Cohoon, Kevin P; Budoff, Matthew J; Polak, Joseph F; Stein, James H; Bielinski, Suzette J

    2018-05-01

    Hepatocyte growth factor (HGF) has previously been associated with risk of stroke, coronary heart disease, and atherosclerosis. We hypothesized that higher circulating HGF is associated with greater progression of measures of atherosclerosis: coronary artery calcium (CAC) and carotid plaque. Participants aged 45-84 years from the prospective cohort study Multi-Ethnic Study of Atherosclerosis had HGF measured at baseline (between 2000 and 2002) and were followed for progression of atherosclerosis for up to 12 years. CAC was measured at all five exams using the Agatston method. Mixed-effects models were used to examine the association of HGF and CAC progression among 6695 participants with available data. Relative risk regression was used to assess the association between HGF and new or additional carotid plaque between exams 1 and 5 in 3400 participants with available data. All point estimates were adjusted for potential confounding variables. Each standard deviation higher HGF at baseline was associated with 2.9 Agatston units/year greater CAC progression (95% CI: 1.6-4.2, p < 0.0001), and the magnitude of this association differed by race/ethnicity (p value for interaction by race = 0.003). Each standard deviation higher HGF at baseline was associated with a 4% higher risk of new or additional carotid plaque (95% CI: 1.01-1.08, p = 0.005). Higher levels of HGF were significantly associated with greater progression of atherosclerosis in this large and diverse population. Circulating HGF continues to show promise as a potential clinical biomarker for cardiovascular disease. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Iteration and superposition encryption scheme for image sequences based on multi-dimensional keys

    NASA Astrophysics Data System (ADS)

    Han, Chao; Shen, Yuzhen; Ma, Wenlin

    2017-12-01

    An iteration and superposition encryption scheme for image sequences based on multi-dimensional keys is proposed for high security, big capacity and low noise information transmission. Multiple images to be encrypted are transformed into phase-only images with the iterative algorithm and then are encrypted by different random phase, respectively. The encrypted phase-only images are performed by inverse Fourier transform, respectively, thus new object functions are generated. The new functions are located in different blocks and padded zero for a sparse distribution, then they propagate to a specific region at different distances by angular spectrum diffraction, respectively and are superposed in order to form a single image. The single image is multiplied with a random phase in the frequency domain and then the phase part of the frequency spectrums is truncated and the amplitude information is reserved. The random phase, propagation distances, truncated phase information in frequency domain are employed as multiple dimensional keys. The iteration processing and sparse distribution greatly reduce the crosstalk among the multiple encryption images. The superposition of image sequences greatly improves the capacity of encrypted information. Several numerical experiments based on a designed optical system demonstrate that the proposed scheme can enhance encrypted information capacity and make image transmission at a highly desired security level.

  17. Enhanced visual responses in the superior colliculus in an animal model of attention-deficit hyperactivity disorder and their suppression by D-amphetamine.

    PubMed

    Clements, K M; Devonshire, I M; Reynolds, J N J; Overton, P G

    2014-08-22

    Attention-deficit hyperactivity disorder (ADHD) is a prevalent neurodevelopmental disorder characterized by overactivity, impulsiveness and attentional problems, including an increase in distractibility. A structure that is intimately linked with distractibility is the superior colliculus (SC), a midbrain sensory structure which plays a particular role in the production of eye and head movements. Although others have proposed the involvement of such diverse elements as the frontal cortex and forebrain noradrenaline in ADHD, given the role of the colliculus in distractibility and the increased distractibility in ADHD, we have proposed that distractibility in ADHD arises due to collicular sensory hyper-responsiveness. To further investigate this possibility, we recorded the extracellular activity (multi-unit (MUA) and local field potential (LFP)) in the superficial visual layers of the SC in an animal model of ADHD, the New Zealand genetically hypertensive (GH) rat, in response to wholefield light flashes. The MUA and LFP peak amplitude and summed activity within a one-second time window post-stimulus were both significantly greater in GH rats than in Wistar controls, across the full range of stimulus intensities. Given that baseline firing rate did not differ between the strains, this suggests that the signal-to-noise ratio is elevated in GH animals. D-Amphetamine reduced the peak amplitude and summed activity of the multi-unit response in Wistar animals. It also reduced the peak amplitude and summed activity of the multi-unit response in GH animals, at higher doses bringing it down to levels that were equivalent to those of Wistar animals at baseline. The present results provide convergent evidence that a collicular dysfunction (sensory hyper-responsiveness) is present in ADHD, and that it may underlie the enhanced distractibility. In addition, D-amphetamine - a widely used treatment in ADHD - may have one of its loci of therapeutic action at the level of the colliculus. Copyright © 2014 IBRO. Published by Elsevier Ltd. All rights reserved.

  18. Extending the Operational Envelope of a Turbofan Engine Simulation into the Sub-Idle Region

    NASA Technical Reports Server (NTRS)

    Chapman, Jeffryes W.; Hamley, Andrew J.; Guo, Ten-Huei; Litt, Jonathan S.

    2016-01-01

    In many non-linear gas turbine simulations, operation in the sub-idle region can lead to model instability. This paper lays out a method for extending the operational envelope of a map based gas turbine simulation to include the sub-idle region. This method develops a multi-simulation solution where the baseline component maps are extrapolated below the idle level and an alternate model is developed to serve as a safety net when the baseline model becomes unstable or unreliable. Sub-idle model development takes place in two distinct operational areas, windmilling/shutdown and purge/cranking/ startup. These models are based on derived steady state operating points with transient values extrapolated between initial (known) and final (assumed) states. Model transitioning logic is developed to predict baseline model sub-idle instability, and transition smoothly and stably to the backup sub-idle model. Results from the simulation show a realistic approximation of sub-idle behavior as compared to generic sub-idle engine performance that allows the engine to operate continuously and stably from shutdown to full power.

  19. Extending the Operational Envelope of a Turbofan Engine Simulation into the Sub-Idle Region

    NASA Technical Reports Server (NTRS)

    Chapman, Jeffryes Walter; Hamley, Andrew J.; Guo, Ten-Huei; Litt, Jonathan S.

    2016-01-01

    In many non-linear gas turbine simulations, operation in the sub-idle region can lead to model instability. This paper lays out a method for extending the operational envelope of a map based gas turbine simulation to include the sub-idle region. This method develops a multi-simulation solution where the baseline component maps are extrapolated below the idle level and an alternate model is developed to serve as a safety net when the baseline model becomes unstable or unreliable. Sub-idle model development takes place in two distinct operational areas, windmilling/shutdown and purge/cranking/startup. These models are based on derived steady state operating points with transient values extrapolated between initial (known) and final (assumed) states. Model transitioning logic is developed to predict baseline model sub-idle instability, and transition smoothly and stably to the backup sub-idle model. Results from the simulation show a realistic approximation of sub-idle behavior as compared to generic sub-idle engine performance that allows the engine to operate continuously and stably from shutdown to full power.

  20. Earth Observatory Satellite system definition study. Report 5: System design and specifications. Volume 1: Baseline system description

    NASA Technical Reports Server (NTRS)

    1974-01-01

    A system baseline design oriented to the requirements of the next generation of Earth Observatory Satellite missions is presented. The first mission (EOS-A) is envisioned as a two-fold mission which (1) provides a continuum of data of the type being supplied by ERTS for the emerging operational applications and also (2) expands the research and development activities for future instrumentation and analysis techniques. The baseline system specifically satisfies the requirements of this first mission. However, EOS-A is expected to be the first of a series of earth observation missions. Thus the baseline design has been developed so as to accommodate these latter missions effectively as the transition is made from conventional, expendable launch vehicles and spacecraft to the Shuttle Space Transportation System era. Further, a subset of alternative missions requirements including Seasat, SEOS, SMM and MSS-5 have been analyzed to verify that the spacecraft design to serve a multi-mission role is economically sound. A key feature of the baseline system design is the concept of a modular observatory system whose elements are compatible with varying levels of launch vehicle capability. The design configuration can be used with either the Delta or Titan launch vehicles and will adapt readily to the space shuttle when that system becomes available in the early 1980's.

  1. The Association of Calcium Supplementation and Incident Cardiovascular Events in the Multi-Ethnic Study of Atherosclerosis (MESA)

    PubMed Central

    Hsu, F.C.; de Boer, I.H.; Ix, J.H.; Siscovick, D.; Szklo, M.; Burke, G.L.; Frazier-Wood, A.C.; Herrington, D.M.

    2016-01-01

    Background and Aims Many US adults use calcium supplements to address inadequate dietary intake and improve bone health. However, recent reports have suggested that use of calcium supplements may elevate cardiovascular disease (CVD) risk. In this study, we examined associations between baseline calcium supplement use and incident myocardial infarction (MI) (n=208 events) and CVD events (n=641 events) over 10.3 years in men and women from the Multi-Ethnic Study of Atherosclerosis (MESA) cohort (n=6,236), with dietary calcium intake at baseline also examined as a supplementary objective. Methods and Results Using Cox proportional hazards models, no compelling associations between calcium intake from supplements or diet and incident CVD events were observed upon multivariate adjustment for potential confounders. An association with lower MI risk was observed comparing those with low levels of calcium supplement use (1-499 mg) to those using no calcium supplements (hazard ratio 0.69, 95% CI 0.48, 0.98, p=0.039). Relationships were homogeneous by gender, race/ethnicity, or chronic kidney disease. Results were also similar when the analysis was limited to postmenopausal women only. Conclusion Analysis of incident MI and CVD events in the MESA cohort does not support a substantial association of calcium supplement use with negative cardiovascular outcomes. PMID:27514606

  2. The effects of multi-disciplinary psycho-social care on socio-economic problems in cancer patients: a cluster-randomized trial.

    PubMed

    Singer, Susanne; Roick, Julia; Meixensberger, Jürgen; Schiefke, Franziska; Briest, Susanne; Dietz, Andreas; Papsdorf, Kirsten; Mössner, Joachim; Berg, Thomas; Stolzenburg, Jens-Uwe; Niederwieser, Dietger; Keller, Annette; Kersting, Anette; Danker, Helge

    2018-06-01

    We examined whether multi-disciplinary stepped psycho-social care decreases financial problems and improves return-to-work in cancer patients. In a university hospital, wards were randomly allocated to either stepped or standard care. Stepped care comprised screening for financial problems, consultation between doctor and patient, and the provision of social service. Outcomes were financial problems at the time of discharge and return-to-work in patients < 65 years old half a year after baseline. The analysis employed mixed-effect multivariate regression modeling. Thirteen wards were randomized and 1012 patients participated (n = 570 in stepped care and n = 442 in standard care). Those who reported financial problems at baseline were less likely to have financial problems at discharge when they had received stepped care (odds ratio (OR) 0.2, 95% confidence interval (CI) 0.1, 0.7; p = 0.01). There was no evidence for an effect of stepped care on financial problems in patients without such problems at baseline (OR 1.1, CI 0.5, 2.6; p = 0.82). There were 399 patients < 65 years old who were not retired at baseline. In this group, there was no evidence for an effect of stepped care on being employed half a year after baseline (OR 0.7, CI 0.3, 2.0; p = 0.52). NCT01859429 CONCLUSIONS: Financial problems can be avoided more effectively with multi-disciplinary stepped psycho-social care than with standard care in patients who have such problems.

  3. Self Organized Multi Agent Swarms (SOMAS) for Network Security Control

    DTIC Science & Technology

    2009-03-01

    Normal hierarchy vs entangled hierarchy 2.5.7 Quantifying Entangledness . While self organization means that the swarm develops a consistent structure of...flexibility due to centralization of control and com- munication. Thus, self organized, entangled hierarchy multi-agent swarms are evolved in this study to...technique. The resulting design exhibits a self organized multi-agent swarm (SOMAS) with entangled hierarchical control and communication through the

  4. A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks

    PubMed Central

    Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan

    2017-01-01

    With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894

  5. Placental baseline conditions modulate the hyperoxic BOLD-MRI response.

    PubMed

    Sinding, Marianne; Peters, David A; Poulsen, Sofie S; Frøkjær, Jens B; Christiansen, Ole B; Petersen, Astrid; Uldbjerg, Niels; Sørensen, Anne

    2018-01-01

    Human pregnancies complicated by placental dysfunction may be characterized by a high hyperoxic Blood oxygen level-dependent (BOLD) MRI response. The pathophysiology behind this phenomenon remains to be established. The aim of this study was to evaluate whether it is associated with altered placental baseline conditions, including a lower oxygenation and altered tissue morphology, as estimated by the placental transverse relaxation time (T2*). We included 49 normal pregnancies (controls) and 13 pregnancies complicated by placental dysfunction (cases), defined by a birth weight < 10th percentile in combination with placental pathological signs of vascular malperfusion. During maternal oxygen inhalation, we measured the relative ΔBOLD response ((hyperoxic BOLD - baseline BOLD)/baseline BOLD) from a dynamic single-echo gradient-recalled echo (GRE) MRI sequence and the absolute ΔT2* (hyperoxic T2*- baseline T2*) from breath-hold multi-echo GRE sequences. In the control group, the relative ΔBOLD response increased during gestation from 5% in gestational week 20 to 20% in week 40. In the case group, the relative ΔBOLD response was significantly higher (mean Z-score 4.94; 95% CI 2.41, 7.47). The absolute ΔT2*, however, did not differ between controls and cases (p = 0.37), whereas the baseline T2* was lower among cases (mean Z-score -3.13; 95% CI -3.94, -2.32). Furthermore, we demonstrated a strong negative linear correlation between the Log 10 ΔBOLD response and the baseline T2* (r = -0.88, p < 0.0001). The high hyperoxic ΔBOLD response demonstrated in pregnancies complicated by placental dysfunction may simply reflect altered baseline conditions, as the absolute increase in placental oxygenation (ΔT2*) does not differ between groups. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Towards Formalizing the Java Security Architecture of JDK 1.2

    DTIC Science & Technology

    1998-01-01

    and Richard E. Newman for their contributions to this paper. References 1. Balfanz , D. and Gong, L.: Experience with Secure Multi-Processing in Java...Privacy, IEEE Computer Society, Oakland, California, Pages 122-136, 1992. 18. Wallach, D. S., Balfanz , D., Dean, D., and Felton, E. W.: Extensible

  7. Computer Security Products Technology Overview

    DTIC Science & Technology

    1988-10-01

    13 3. DATABASE MANAGEMENT SYSTEMS ................................... 15 Definition...this paper addresses fall into the areas of multi-user hosts, database management systems (DBMS), workstations, networks, guards and gateways, and...provide a portion of that protection, for example, a password scheme, a file protection mechanism, a secure database management system, or even a

  8. Microcomputer Security Issues in an Office Environment.

    DTIC Science & Technology

    1986-11-01

    Holmes Inc. A. 4605 Post Oak Place Drive, Suite 209 Houston, Texas 77027 r -w (713) 840-7771 Lockit I/Lockit II Security Microsystems Consultants 16...9300 MultiSentry/ComputerSentry Tact Technology 100 North 20th Street Philadelphia, PA 19103 (215) 569-1300 . Sherlock PC/ISM/ISM-Federal Analytics

  9. Multilateral, regional and bilateral energy trade governance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany

    The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain themore » proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.« less

  10. Growth hormone combined with child-specific motor training improves motor development in infants with Prader-Willi syndrome: a randomized controlled trial.

    PubMed

    Reus, Linda; Pelzer, Ben J; Otten, Barto J; Siemensma, Elbrich P C; van Alfen-van der Velden, Janielle A A E M; Festen, Dederieke A M; Hokken-Koelega, Anita C S; Nijhuis-van der Sanden, Maria W G

    2013-10-01

    Although severe motor problems in infants with Prader-Willi syndrome (PWS) are striking, motor development has never been studied longitudinally and the results of growth hormone (GH) treatment on motor development are contradictory. The authors studied whether GH treatment can enhance the effect of physical training on motor development in infants with PWS. Twenty-two infants were followed for two years during a randomized controlled trial. The treatment and control groups began GH after baseline or following a control period, respectively. Both groups followed a child-specific physical training program. Motor performance was measured every three months. Multi-level regression analysis revealed that motor development differed significantly between infants (p<.001), and this could be partially explained by baseline motor developmental level (p<.01). GH treatment enhanced the effects of child-specific physical training on both motor developmental rate and motor developmental potential. Moreover, this effect was more pronounced when GH treatment was initiated at a younger age. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. The study on network security based on software engineering

    NASA Astrophysics Data System (ADS)

    Jia, Shande; Ao, Qian

    2012-04-01

    Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.

  12. Site systems engineering fiscal year 1999 multi-year work plan (MYWP) update for WBS 1.8.2.2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    GRYGIEL, M.L.

    1998-10-08

    Manage the Site Systems Engineering process to provide a traceable integrated requirements-driven, and technically defensible baseline. Through the Site Integration Group(SIG), Systems Engineering ensures integration of technical activities across all site projects. Systems Engineering's primary interfaces are with the RL Project Managers, the Project Direction Office and with the Project Major Subcontractors, as well as with the Site Planning organization. Systems Implementation: (1) Develops, maintains, and controls the site integrated technical baseline, ensures the Systems Engineering interfaces between projects are documented, and maintain the Site Environmental Management Specification. (2) Develops and uses dynamic simulation models for verification of the baselinemore » and analysis of alternatives. (3) Performs and documents fictional and requirements analyses. (4) Works with projects, technology management, and the SIG to identify and resolve technical issues. (5) Supports technical baseline information for the planning and budgeting of the Accelerated Cleanup Plan, Multi-Year Work Plans, Project Baseline Summaries as well as performance measure reporting. (6) Works with projects to ensure the quality of data in the technical baseline. (7) Develops, maintains and implements the site configuration management system.« less

  13. Multi-objective optimization for an automated and simultaneous phase and baseline correction of NMR spectral data

    NASA Astrophysics Data System (ADS)

    Sawall, Mathias; von Harbou, Erik; Moog, Annekathrin; Behrens, Richard; Schröder, Henning; Simoneau, Joël; Steimers, Ellen; Neymeyr, Klaus

    2018-04-01

    Spectral data preprocessing is an integral and sometimes inevitable part of chemometric analyses. For Nuclear Magnetic Resonance (NMR) spectra a possible first preprocessing step is a phase correction which is applied to the Fourier transformed free induction decay (FID) signal. This preprocessing step can be followed by a separate baseline correction step. Especially if series of high-resolution spectra are considered, then automated and computationally fast preprocessing routines are desirable. A new method is suggested that applies the phase and the baseline corrections simultaneously in an automated form without manual input, which distinguishes this work from other approaches. The underlying multi-objective optimization or Pareto optimization provides improved results compared to consecutively applied correction steps. The optimization process uses an objective function which applies strong penalty constraints and weaker regularization conditions. The new method includes an approach for the detection of zero baseline regions. The baseline correction uses a modified Whittaker smoother. The functionality of the new method is demonstrated for experimental NMR spectra. The results are verified against gravimetric data. The method is compared to alternative preprocessing tools. Additionally, the simultaneous correction method is compared to a consecutive application of the two correction steps.

  14. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  15. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  16. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  17. Equity in development and access to health services in the Wild Coast of South Africa: the community view through four linked cross-sectional studies between 1997 and 2007

    PubMed Central

    2011-01-01

    Background After election in 1994, the South African government implemented national and regional programmes, such as the Wild Coast Spatial Development Initiative (SDI), to provoke economic growth and to decrease inequities. CIET measured development in the Wild Coast region across four linked cross-sectional surveys (1997-2007). The 2007 survey was an opportunity to look at inequities since the original 1997 baseline, and how such inequities affect access to health care. Methods The 2000, 2004 and 2007 follow-up surveys revisited the communities of the 1997 baseline. Household-level multivariate analysis looked at development indicators and access to health in the context of inequities such as household crowding, access to protected sources of water, house roof construction, main food item purchased, and perception of community empowerment. Individual multivariate models accounted for age, sex, education and income earning opportunities. Results Overall access to protected sources of water increased since the baseline (from 20% in 1997 to 50% in 2007), yet households made of mud and grass, and households who bought basics as their main food item were still less likely to have protected sources of water. The most vulnerable, such as those with less education and less water and food security, were also less likely to have worked for wages leaving them with little chance of improving their standard of living (less education OR 0.59, 95%CI 0.37-0.94; less water security OR 0.67, 95%CI 0.48-0.93; less food security OR 0.43, 95%CI 0.29-0.64). People with less income were more likely to visit government services (among men OR 0.28, 95%CI 0.13-0.59; among women OR 0.33, 95%CI 0.20-0.54), reporting decision factors of cost and distance; users of private clinics sought out better service and medication. Lower food security and poorer house construction was also associated with women visiting government rather than private health services. Women with some formal education were nearly eight times more likely than women with no education to access health services for prevention rather than curative reasons (OR 7.65, 95%CI 4.10-14.25). Conclusion While there have been some improvements, the Wild Coast region still falls well below provincial and national standards in key areas such as access to clean water and employment despite years of government-led investment. Inequities remain prominent, particularly around access to health services. PMID:22375700

  18. Multi-Enzyme Complexes in the Thermophilic Archaea: The Effects of Temperature on Stability, Catalysis and Enzyme Interactions in a Multi-Component System

    DTIC Science & Technology

    2012-01-01

    COVERED (From - To) 4. TITLE AND SUBTITLE Multi- enzyme complexes in the thermophilic archaea: The effects of temperature on stability, catalysis and... enzyme interactions in a multi- component system 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-07-1-0058 5c. PROGRAM ELEMENT NUMBER 61102F 6...involves cloning of the genes for the relevant lipoylation enzymes , and characterisation of the protein products 15. SUBJECT TERMS 16. SECURITY

  19. Multi-Modality Cascaded Convolutional Neural Networks for Alzheimer's Disease Diagnosis.

    PubMed

    Liu, Manhua; Cheng, Danni; Wang, Kundong; Wang, Yaping

    2018-03-23

    Accurate and early diagnosis of Alzheimer's disease (AD) plays important role for patient care and development of future treatment. Structural and functional neuroimages, such as magnetic resonance images (MRI) and positron emission tomography (PET), are providing powerful imaging modalities to help understand the anatomical and functional neural changes related to AD. In recent years, machine learning methods have been widely studied on analysis of multi-modality neuroimages for quantitative evaluation and computer-aided-diagnosis (CAD) of AD. Most existing methods extract the hand-craft imaging features after image preprocessing such as registration and segmentation, and then train a classifier to distinguish AD subjects from other groups. This paper proposes to construct cascaded convolutional neural networks (CNNs) to learn the multi-level and multimodal features of MRI and PET brain images for AD classification. First, multiple deep 3D-CNNs are constructed on different local image patches to transform the local brain image into more compact high-level features. Then, an upper high-level 2D-CNN followed by softmax layer is cascaded to ensemble the high-level features learned from the multi-modality and generate the latent multimodal correlation features of the corresponding image patches for classification task. Finally, these learned features are combined by a fully connected layer followed by softmax layer for AD classification. The proposed method can automatically learn the generic multi-level and multimodal features from multiple imaging modalities for classification, which are robust to the scale and rotation variations to some extent. No image segmentation and rigid registration are required in pre-processing the brain images. Our method is evaluated on the baseline MRI and PET images of 397 subjects including 93 AD patients, 204 mild cognitive impairment (MCI, 76 pMCI +128 sMCI) and 100 normal controls (NC) from Alzheimer's Disease Neuroimaging Initiative (ADNI) database. Experimental results show that the proposed method achieves an accuracy of 93.26% for classification of AD vs. NC and 82.95% for classification pMCI vs. NC, demonstrating the promising classification performance.

  20. A digital memories based user authentication scheme with privacy preservation.

    PubMed

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  1. A digital memories based user authentication scheme with privacy preservation

    PubMed Central

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659

  2. Chemical supply chain modeling for analysis of homeland security events

    DOE PAGES

    Ehlen, Mark A.; Sun, Amy C.; Pepple, Mark A.; ...

    2013-09-06

    The potential impacts of man-made and natural disasters on chemical plants, complexes, and supply chains are of great importance to homeland security. To be able to estimate these impacts, we developed an agent-based chemical supply chain model that includes: chemical plants with enterprise operations such as purchasing, production scheduling, and inventories; merchant chemical markets, and multi-modal chemical shipments. Large-scale simulations of chemical-plant activities and supply chain interactions, running on desktop computers, are used to estimate the scope and duration of disruptive-event impacts, and overall system resilience, based on the extent to which individual chemical plants can adjust their internal operationsmore » (e.g., production mixes and levels) versus their external interactions (market sales and purchases, and transportation routes and modes). As a result, to illustrate how the model estimates the impacts of a hurricane disruption, a simple example model centered on 1,4-butanediol is presented.« less

  3. Examining the Multi-level Fit between Work and Technology in a Secure Messaging Implementation.

    PubMed

    Ozkaynak, Mustafa; Johnson, Sharon; Shimada, Stephanie; Petrakis, Beth Ann; Tulu, Bengisu; Archambeault, Cliona; Fix, Gemmae; Schwartz, Erin; Woods, Susan

    2014-01-01

    Secure messaging (SM) allows patients to communicate with their providers for non-urgent health issues. Like other health information technologies, the design and implementation of SM should account for workflow to avoid suboptimal outcomes. SM may present unique workflow challenges because patients add a layer of complexity, as they are also direct users of the system. This study explores SM implementation at two Veterans Health Administration facilities. We interviewed twenty-nine members of eight primary care teams using semi-structured interviews. Questions addressed staff opinions about the integration of SM with daily practice, and team members' attitudes and experiences with SM. We describe the clinical workflow for SM, examining complexity and variability. We identified eight workflow issues directly related to efficiency and patient satisfaction, based on an exploration of the technology fit with multilevel factors. These findings inform organizational interventions that will accommodate SM implementation and lead to more patient-centered care.

  4. Fusion of space-borne multi-baseline and multi-frequency interferometric results based on extended Kalman filter to generate high quality DEMs

    NASA Astrophysics Data System (ADS)

    Zhang, Xiaojie; Zeng, Qiming; Jiao, Jian; Zhang, Jingfa

    2016-01-01

    Repeat-pass Interferometric Synthetic Aperture Radar (InSAR) is a technique that can be used to generate DEMs. But the accuracy of InSAR is greatly limited by geometrical distortions, atmospheric effect, and decorrelations, particularly in mountainous areas, such as western China where no high quality DEM has so far been accomplished. Since each of InSAR DEMs generated using data of different frequencies and baselines has their own advantages and disadvantages, it is therefore very potential to overcome some of the limitations of InSAR by fusing Multi-baseline and Multi-frequency Interferometric Results (MMIRs). This paper proposed a fusion method based on Extended Kalman Filter (EKF), which takes the InSAR-derived DEMs as states in prediction step and the flattened interferograms as observations in control step to generate the final fused DEM. Before the fusion, detection of layover and shadow regions, low-coherence regions and regions with large height error is carried out because MMIRs in these regions are believed to be unreliable and thereafter are excluded. The whole processing flow is tested with TerraSAR-X and Envisat ASAR datasets. Finally, the fused DEM is validated with ASTER GDEM and national standard DEM of China. The results demonstrate that the proposed method is effective even in low coherence areas.

  5. Multilevel analysis of the Be Active Eat Well intervention: environmental and behavioural influences on reductions in child obesity risk.

    PubMed

    Johnson, B A; Kremer, P J; Swinburn, B A; de Silva-Sanigorski, A M

    2012-07-01

    The Be Active Eat Well (BAEW) community-based child obesity prevention intervention was successful in modestly reducing unhealthy weight gain in primary school children using a multi-strategy and multi-setting approach. To (1) examine the relationship between changes in obesity-related individual, household and school factors and changes in standardised child body mass index (zBMI), and (2) determine if the BAEW intervention moderated these effects. The longitudinal relationships between changes in individual, household and school variables and changes in zBMI were explored using multilevel modelling, with measurement time (baseline and follow-up) at level 1, individual (behaviours, n = 1812) at level 2 and households (n = 1318) and schools (n = 18) as higher levels (environments). The effect of the intervention was tested while controlling for child age, gender and maternal education level. This study confirmed that the BAEW intervention lowered child zBMI compared with the comparison group (-0.085 units, P = 0.03). The variation between household environments was found to be a large contributor to the percentage of unexplained change in child zBMI (59%), compared with contributions from the individual (23%) and school levels (1%). Across both groups, screen time (P = 0.03), sweet drink consumption (P = 0.03) and lack of household rules for television (TV) viewing (P = 0.05) were associated with increased zBMI, whereas there was a non-significant association with the frequency the TV was on during evening meals (P = 0.07). The moderating effect of the intervention was only evident for the relationship between the frequency of TV on during meals and zBMI, however, this effect was modest (P = 0.04). The development of childhood obesity involves multi-factorial and multi-level influences, some of which are amenable to change. Obesity prevention strategies should not only target individual behaviours but also the household environment and family practices. Although zBMI changes were modest, these findings are encouraging as small reductions can have population level impacts on childhood obesity levels.

  6. Drinking to Cope Motivation as a Prospective Predictor of Negative Affect.

    PubMed

    Armeli, Stephen; Sullivan, Tami P; Tennen, Howard

    2015-07-01

    Consistent with research indicating that drinking to cope (DTC) motivation might exacerbate negative affective states within or immediately proximal to discrete drinking episodes, we examined whether yearly deviations in more global levels of DTC motivation prospectively predicted depressive and anxious affect over several weeks. College students (N = 521, 52% women) completed baseline measures of drinking motives, recent depression and anxiety symptoms, recent alcohol use, and alcohol use disorder symptoms on a secure website. Approximately 2 weeks after completing this survey, participants completed the 30-day daily diary portion of the study in which they reported on their current-day affective states. This yearly assessment burst in which participants completed a baseline survey and a daily diary assessment was repeated for 3 additional years. We found that changes in DTC motivation were positively associated with changes in depressive and anxious affect in the subsequent month, after we controlled for changes in concurrent anxiety and depressive symptoms, drinking level, enhancement drinking motivation, and alcohol use disorder symptoms. Our findings are consistent with the notion that DTC motivation confers a unique vulnerability for emotion dysregulation, and that drinking for such reasons possibly prolongs or exacerbates negative affective states.

  7. Piezometer completion report for borehole cluster sites DC-19, DC-20, and DC-22

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jackson, R.L.; Diediker, L.D.; Ledgerwood, R.K.

    1984-07-01

    This report describes the design and installation of multi-level piezometers at borehole cluster sites DC-19, DC-20 and DC-22. The network of borehole cluster sites will provide facilities for multi-level water-level monitoring across the RRL for piezometer baseline monitoring and for large-scale hydraulic stress testing. These groundwater-monitoring facilities were installed between August 1983 and March 1984. Three series of piezometer nests (A-, C- and D-series) were installed in nine hydrogeologic units (monitoring horizons) within the Columbia River Basalt Group at each borehole cluster site. In addition to the piezometer facilities, a B-series pumping well was installed at borehole cluster sites DC-20more » and DC-22. The A-series piezometer nest monitors the basal Ringold sediments and the Rattlesnake Ridge interbed. The C-series piezometer nests monitors the six deepest horizons, which are in increasing depth, the Priest Rapids interflow, Sentinel Gap flow top, Ginkgo flow top, Rocky Coulee flow top, Cohassett flow top and Umtanum flow top. The D-series piezometer monitors the Mabton interbed. The B-series pumping well was completed in the Priest Rapids interflow. 21 refs., 6 figs., 6 tabs.« less

  8. Delaying cognitive and physical decline through multidomain interventions for residents with mild-to-moderate dementia in dementia care units in Taiwan: A prospective cohort study.

    PubMed

    Liang, Chih-Kuang; Chou, Ming-Yueh; Chen, Liang-Yu; Wang, Kuei-Yu; Lin, Shih-Yi; Chen, Liang-Kung; Lin, Yu-Te; Liu, Tsung-Yun; Loh, Ching-Hui

    2017-04-01

    To develop experimental multi-domain interventions for older people with mild-to-moderate dementia, and to evaluate the effect of delaying cognitive and physical decline, and improvement or prevention of geriatric syndromes during 1-year follow up. Participants aged 65 years and older with mild-to-moderate dementia (clinical dementia rating [CDR] 1 or 2) were grouped as intervention in Jia-Li Veterans Home and usual care model in the community (Memory clinic). All residents in Jia-Li Veterans Home received comprehensive intervention, including Multi-disciplinary team consultation and intervention, Multi-component non-pharmacological management, geriatric syndromes survey and intervention by CGA, and a dementia friendly medical Green channel Approach (2MCGA). The decline of cognitive and physical function are determined by the change of Mini-Mental State Examination score, CDR and the sum of CDR box, as well as activities of daily living based on the Barthel Index. We also screened geriatric syndromes at baseline and 1 year later. Participants in the intervention group were older and had a lower educational level, lower body mass index, poor baseline activities of daily living function, lower visual impairment, and higher rates of hearing impairment, polypharmacy and risk of malnutrition. The residents receiving 2MCGA had lower baseline Mini-Mental State Examination scores, and higher CDR. For residents in Jia-Li Veterans Home, all cognitive measurements except Mini-Mental State Examination were significantly associated with delaying the decline of cognition after analyzing by multiple linear regression, and multivariate logistic regression also showed that patients living in the community was independently associated with a higher odds ratio for activities of daily living decline (3.180, 95% CI 1.384-7.308, P = 0.006). There are also more improvement in their baseline geriatric syndromes and suffered less from new geriatric syndromes, including falls, urinary incontinence, and risk of malnutrition. The 2MCGA intervention shows strong delays in the decline of cognition and physical function for older residents with mild-to-moderate dementia. Furthermore, this strategy can also improve or prevent the onset of new geriatric syndromes, especially fall episodes, urinary incontinence and risk of malnutrition. Geriatr Gerontol Int 2017; 17 (Suppl. 1): 36-43. © 2017 Japan Geriatrics Society.

  9. Status of the LBNF Cryogenic System

    DOE PAGES

    Montanari, D.; Adamowski, M.; Bremer, J.; ...

    2017-12-30

    We present that the Sanford Underground Research Facility (SURF) will host the Deep Underground Neutrino Experiment (DUNE), an international multi-kiloton Long-Baseline neutrino experiment that will be installed about a mile underground in Lead, SD. In the current configuration four cryostats will contain a modular detector and a total of 68,400 tons of ultrapure liquid argon, with a level of impurities lower than 100 parts per trillion of oxygen equivalent contamination. The Long-Baseline Neutrino Facility (LBNF) provides the conventional facilities and the cryogenic infrastructure to support DUNE. The system is comprised of three sub-systems: External/Infrastructure, Proximity and Internal cryogenics. An internationalmore » engineering team will design, manufacture, commission, and qualify the LBNF cryogenic system. This contribution presents the modes of operations, layout and main features of the LBNF cryogenic system. Lastly, the expected performance, the functional requirements and the status of the design are also highlighted.« less

  10. Status of the LBNF Cryogenic System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Montanari, D.; Adamowski, M.; Bremer, J.

    We present that the Sanford Underground Research Facility (SURF) will host the Deep Underground Neutrino Experiment (DUNE), an international multi-kiloton Long-Baseline neutrino experiment that will be installed about a mile underground in Lead, SD. In the current configuration four cryostats will contain a modular detector and a total of 68,400 tons of ultrapure liquid argon, with a level of impurities lower than 100 parts per trillion of oxygen equivalent contamination. The Long-Baseline Neutrino Facility (LBNF) provides the conventional facilities and the cryogenic infrastructure to support DUNE. The system is comprised of three sub-systems: External/Infrastructure, Proximity and Internal cryogenics. An internationalmore » engineering team will design, manufacture, commission, and qualify the LBNF cryogenic system. This contribution presents the modes of operations, layout and main features of the LBNF cryogenic system. Lastly, the expected performance, the functional requirements and the status of the design are also highlighted.« less

  11. Status of the LBNF Cryogenic System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Montanari, D.; Adamowski, M.; Bremer, J.

    2017-01-01

    The Sanford Underground Research Facility (SURF) will host the Deep Underground Neutrino Experiment (DUNE), an international multi-kiloton Long-Baseline neutrino experiment that will be installed about a mile underground in Lead, SD. In the current configuration four cryostats will contain a modular detector and a total of 68,400 ton of ultrapure liquid argon, with a level of impurities lower than 100 parts per trillion of oxygen equivalent contamination. The Long-Baseline Neutrino Facility (LBNF) provides the conventional facilities and the cryogenic infrastructure to support DUNE. The system is comprised of three sub-systems: External/Infrastructure, Proximity and Internal cryogenics. An international engineering team willmore » design, manufacture, commission, and qualify the LBNF cryogenic system. This contribution presents the models of operations, layout and main features of the LBNF cryogenic system. The expected performance, the functional requirements and the status of the design are also highlighted.« less

  12. Status of the LBNF Cryogenic System

    NASA Astrophysics Data System (ADS)

    Montanari, D.; Adamowski, M.; Bremer, J.; Delaney, M.; Diaz, A.; Doubnik, R.; Haaf, K.; Hentschel, S.; Norris, B.; Voirin, E.

    2017-12-01

    The Sanford Underground Research Facility (SURF) will host the Deep Underground Neutrino Experiment (DUNE), an international multi-kiloton Long-Baseline neutrino experiment that will be installed about a mile underground in Lead, SD. In the current configuration four cryostats will contain a modular detector and a total of 68,400 tons of ultrapure liquid argon, with a level of impurities lower than 100 parts per trillion of oxygen equivalent contamination. The Long-Baseline Neutrino Facility (LBNF) provides the conventional facilities and the cryogenic infrastructure to support DUNE. The system is comprised of three sub-systems: External/Infrastructure, Proximity and Internal cryogenics. An international engineering team will design, manufacture, commission, and qualify the LBNF cryogenic system. This contribution presents the modes of operations, layout and main features of the LBNF cryogenic system. The expected performance, the functional requirements and the status of the design are also highlighted.

  13. High-capacity optical long data memory based on enhanced Young's modulus in nanoplasmonic hybrid glass composites.

    PubMed

    Zhang, Qiming; Xia, Zhilin; Cheng, Yi-Bing; Gu, Min

    2018-03-22

    Emerging as an inevitable outcome of the big data era, long data are the massive amount of data that captures changes in the real world over a long period of time. In this context, recording and reading the data of a few terabytes in a single storage device repeatedly with a century-long unchanged baseline is in high demand. Here, we demonstrate the concept of optical long data memory with nanoplasmonic hybrid glass composites. Through the sintering-free incorporation of nanorods into the earth abundant hybrid glass composite, Young's modulus is enhanced by one to two orders of magnitude. This discovery, enabling reshaping control of plasmonic nanoparticles of multiple-length allows for continuous multi-level recording and reading with a capacity over 10 terabytes with no appreciable change of the baseline over 600 years, which opens new opportunities for long data memory that affects the past and future.

  14. Food insecurity, overweight and obesity among low-income African-American families in Baltimore City: associations with food-related perceptions.

    PubMed

    Vedovato, Gabriela M; Surkan, Pamela J; Jones-Smith, Jessica; Steeves, Elizabeth Anderson; Han, Eunkyung; Trude, Angela Cb; Kharmats, Anna Y; Gittelsohn, Joel

    2016-06-01

    To examine associations between food insecurity, excess body weight, psychosocial factors and food behaviours among low-income African-American families. Cross-sectional survey of participants in the baseline evaluation of the B'More Healthy Communities for Kids (BHCK) obesity prevention trial. We collected data on socio-economic factors, food source destinations, acquiring food, preparation methods, psychosocial factors, beliefs and attitudes, participation in food assistance programmes, anthropometry and food security. We used principal component analysis to identify patterns of food source destinations and logistic regression to examine associations. Fourteen low-income, predominantly African-American neighbourhoods in Baltimore City, MD, USA. Two hundred and ninety-eight adult caregiver-child (10-14 years old) dyads. Of households, 41·6 % had some level of food insecurity and 12·4 % experienced some level of hunger. Food-insecure participants with hunger were significantly more likely to be unemployed and to have lower incomes. We found high rates of excess body weight (overweight and obesity) among adults and children (82·8 % and 37·9 % among food insecure without hunger, 89·2 % and 45·9 % among food insecure with hunger, respectively), although there were no significant differences by food security status. Food source usage patterns, food acquisition, preparation, knowledge, self-efficacy and intentions did not differ by food security. Food security was associated with perceptions that healthy foods are affordable and convenient. Greater caregiver body satisfaction was associated with food insecurity and excess body weight. In this setting, obesity and food insecurity are major problems. For many food-insecure families, perceptions of healthy foods may serve as additional barriers to their purchase and consumption.

  15. Food insecurity, overweight and obesity among low-income African-American families in Baltimore City: Associations with food-related perceptions

    PubMed Central

    Vedovato, Gabriela M.; Surkan, Pamela J.; Jones-Smith, Jessica; Steeves, Elizabeth Anderson; Han, Eunkyung; Trude, Angela C.B.; Kharmats, Anna Y.; Gittelsohn, Joel

    2016-01-01

    Objective To examine associations between food insecurity, excess body weight, psychosocial factors and food behaviors among low-income African-American (AA) families. Design Cross-sectional survey of participants in the baseline evaluation of the B’More Healthy Communities for Kids (BHCK) obesity prevention trial. We collected data on socioeconomic factors, food source destinations, acquiring food, preparation methods, psychosocial factors, beliefs and attitudes, participation in food assistance programs, anthropometry and food security. We used principal component analysis to identify patterns of food source destinations and logistic regression to examine associations. Setting Fourteen low-income, predominantly AA neighborhoods in Baltimore City. Subjects 298 adult caregiver-child (10–14 years old) dyads. Results 41.6% of households had some level of food insecurity, and 12.4% experienced some level of hunger. Food insecure participants with hunger were significantly more likely to be unemployed and to have lower incomes. We found high rates of excess body weight (overweight and obese) among adults and children (82.8% and 37.9% food insecure without hunger; 89.2% and 45.9% with hunger, respectively), although there were no significant differences by security status. Food source usage patterns, food acquisition, preparation, knowledge, self-efficacy and intentions did not differ by food security. Food security was associated with perceptions that healthy foods are affordable and convenient. Greater caregiver body satisfaction was associated with food insecurity and excess body weight. Conclusions In this setting, obesity and food insecurity are major problems. For many food insecure families, perceptions of healthy foods may serve as additional barriers to their purchase and consumption. PMID:26441159

  16. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  17. Financial Strategies Moderate Weather Impacts on Food Security Outcomes

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Niles, M.

    2016-12-01

    Global food security relies on local agricultural capacity as well as the financial ability to import food from elsewhere. Climate change is likely to affect the ability to grow sufficient food to meet the needs of a growing population in low income countries where population expansion is the greatest. This paper presents an analysis of 2095 household surveys from 12 food insecure countries in West Africa, East Africa and Asia from the Climate Change, Agriculture, and Food Security (CCAFS) program conducted from 2010-2012. Using a multi-level hierarchical random effects model, we estimated the number of months a household was food insecure with information on the rainfall anomaly the year prior to the survey, agricultural input use, cash income, and community group membership. We found that when the rainfall was either one standard deviation above or below the mean, the number of months households experience food insecurity increased by 74%. When there is a significant weather anomaly, agricultural credit and cash income, but not agricultural inputs or social capital, are found to be critical factors reducing food insecurity. This highlights the ongoing and critical importance of risk reduction strategies such as crop insurance, government safety nets, and credit for maintaining food security in the face of climate change.

  18. Psychiatric Diagnosis, Substance Use and Dependence, and Arrests among Former Recipients of Supplemental Security Income for Drug Abuse and Alcoholism

    ERIC Educational Resources Information Center

    Swartz, James A.; Lurigio, Arthur J.

    2004-01-01

    This study examines the associations among substance use and psychiatric disorders on arrests in a sample of 187 former recipients of Supplemental Security Income for drug addiction and alcoholism. Participants were interviewed at baseline and at 12, 18, and 24 months. Primary measures included urine tests for recent drug use, psychiatric and…

  19. Technology Requirements and Selection for Securely Partitioning OBSW

    NASA Astrophysics Data System (ADS)

    Mendham, Peter; Windsor, James; Eckstein, Knut

    2010-08-01

    The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.

  20. Serial C-reactive protein measurements in patients treated for suspected abdominal tuberculosis.

    PubMed

    Sharma, Vishal; Mandavdhare, Harshal S; Lamoria, Sandeep; Singh, Harjeet; Kumar, Amit

    2018-06-01

    Response to treatment is often used as a criterion for the diagnosis of abdominal tuberculosis. To determine utility of serum C reactive protein (CRP) in assessment of response to anti-tubercular therapy (ATT) in abdominal tuberculosis (ATB). We retrospectively analysed the database of patients with suspected ATB (intestinal and/or peritoneal). Response to ATT was assessed using subjective and objective (ulcer healing or ascites resolution) parameters. Serum CRP levels were estimated at baseline and then at 2 months and 6 months of ATT. One hundred and twelve patients were included in the analysis. The mean age was 36.57 ± 15.04 years and 54.46% (61/112) were males. Sixty-six patients (58.92%) had intestinal, 28 (25%) had peritoneal and 18 (16.07%) had both. Eleven patients had a normal CRP at baseline while 101 had elevated levels. The CRP levels declined in 94 patients at 6 months. One patient with increased levels at 2 months had multi-drug resistant TB. Seven patients showed elevated or plateaued CRP levels on follow-up. These patients had underlying Crohn's disease (3 patients), peritoneal carcinomatosis (1), inter-current infection (1), lymphoma (1) and non-healing ulcers (1). Lack of decline in CRP may suggest alternative diagnosis or drug-resistant tuberculosis. Copyright © 2017 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  1. A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Networks

    DTIC Science & Technology

    2001-01-01

    00-00-2001 to 00-00-2001 4. TITLE AND SUBTITLE A Receiver-Initiated Collision-Avoidance Protocol for Multi-Channel Netowrks 5a. CONTRACT NUMBER...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE

  2. 75 FR 23223 - Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ...] Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public... Select Agent Program established under the Public Health Security and Bioterrorism Preparedness and... Roberson, Veterinary Permit Examiner, APHIS Select Agent Program, VS, ASAP, APHIS, 4700 River Road Unit 2...

  3. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  4. The emerging threats of climate change on tropical coastal ecosystem services, public health, local economies and livelihood sustainability of small islands: Cumulative impacts and synergies.

    PubMed

    Hernández-Delgado, E A

    2015-12-15

    Climate change has significantly impacted tropical ecosystems critical for sustaining local economies and community livelihoods at global scales. Coastal ecosystems have largely declined, threatening the principal source of protein, building materials, tourism-based revenue, and the first line of defense against storm swells and sea level rise (SLR) for small tropical islands. Climate change has also impacted public health (i.e., altered distribution and increased prevalence of allergies, water-borne, and vector-borne diseases). Rapid human population growth has exacerbated pressure over coupled social-ecological systems, with concomitant non-sustainable impacts on natural resources, water availability, food security and sovereignty, public health, and quality of life, which should increase vulnerability and erode adaptation and mitigation capacity. This paper examines cumulative and synergistic impacts of climate change in the challenging context of highly vulnerable small tropical islands. Multiple adaptive strategies of coupled social-ecological ecosystems are discussed. Multi-level, multi-sectorial responses are necessary for adaptation to be successful. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. The Multivariate Roles of Family Instability and Interparental Conflict in Predicting Children’s Representations of Insecurity in the Family System and Early School Adjustment Problems

    PubMed Central

    Coe, Jesse L.; Davies, Patrick T.; Sturge-Apple, Melissa L.

    2016-01-01

    This study examined the moderating role of family instability in relations involving destructive interparental conflict, children’s internal representations of insecurity in the family system, and their early school maladjustment. Two hundred forty-three preschool children (M age = 4.60 years; 56% girls) and their families participated in this multi-method (i.e., observations, structured interview, surveys) multi-informant (i.e., observer, parent, teacher), longitudinal study. Findings indicated that the mediational role of children’s insecure family representations in the pathway between destructive interparental conflict and children’s adjustment problems varied significantly depending on the level of family instability. Interparental conflict was specifically associated with insecure family representations only under conditions of low family instability. In supporting the role of family instability as a vulnerable-stable risk factor, follow up analyses revealed that children’s concerns about security in the family were uniformly high under conditions of heightened instability regardless of their level of exposure to interparental conflict. PMID:27146062

  6. Multi-Rate Secure Processor Terminal Architecture Study. Volume 1. Terminal Architecture.

    DTIC Science & Technology

    1981-06-01

    together because of the intimate relationship that must be established between the KG devices and the control of those devices to satisy security...9.6 kilobit for ti’.:., pass filter funtion because it’s time span is larger. The resultdot loading is estimated at 260 microseconds out of 833

  7. Optimization of a Turboprop UAV for Maximum Loiter and Specific Power Using Genetic Algorithm

    NASA Astrophysics Data System (ADS)

    Dinc, Ali

    2016-09-01

    In this study, a genuine code was developed for optimization of selected parameters of a turboprop engine for an unmanned aerial vehicle (UAV) by employing elitist genetic algorithm. First, preliminary sizing of a UAV and its turboprop engine was done, by the code in a given mission profile. Secondly, single and multi-objective optimization were done for selected engine parameters to maximize loiter duration of UAV or specific power of engine or both. In single objective optimization, as first case, UAV loiter time was improved with an increase of 17.5% from baseline in given boundaries or constraints of compressor pressure ratio and burner exit temperature. In second case, specific power was enhanced by 12.3% from baseline. In multi-objective optimization case, where previous two objectives are considered together, loiter time and specific power were increased by 14.2% and 9.7% from baseline respectively, for the same constraints.

  8. Increasing conclusiveness of clinical breath analysis by improved baseline correction of multi capillary column - ion mobility spectrometry (MCC-IMS) data.

    PubMed

    Szymańska, Ewa; Tinnevelt, Gerjen H; Brodrick, Emma; Williams, Mark; Davies, Antony N; van Manen, Henk-Jan; Buydens, Lutgarde M C

    2016-08-05

    Current challenges of clinical breath analysis include large data size and non-clinically relevant variations observed in exhaled breath measurements, which should be urgently addressed with competent scientific data tools. In this study, three different baseline correction methods are evaluated within a previously developed data size reduction strategy for multi capillary column - ion mobility spectrometry (MCC-IMS) datasets. Introduced for the first time in breath data analysis, the Top-hat method is presented as the optimum baseline correction method. A refined data size reduction strategy is employed in the analysis of a large breathomic dataset on a healthy and respiratory disease population. New insights into MCC-IMS spectra differences associated with respiratory diseases are provided, demonstrating the additional value of the refined data analysis strategy in clinical breath analysis. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Industrial-Graded Epoxy Nanocomposites with Mechanically Dispersed Multi-Walled Carbon Nanotubes: Static and Damping Properties

    PubMed Central

    Di Maio, Dario

    2017-01-01

    The majority of currently published dispersion protocols of carbon nanotubes rely on techniques that are not scalable to an industrial level. This work shows how to obtain polymer nanocomposites with good mechanical characteristics using multi-walled carbon nanotubes epoxy resins obtained by mechanical mixing only. The mechanical dispersion method illustrated in this work is easily scalable to industrial level. The high shearing force due to the complex field of motion produces a good and reproducible carbon nanotube dispersion. We have tested an industrial epoxy matrix with good baseline mechanical characteristics at different carbon nanotube weight loads. ASTM-derived tensile and compressive tests show an increment in both Young’s modulus and compressive strength compared with the pristine resin from a starting low wt %. Comparative vibration tests show improvement in the damping capacity. The new carbon nanotube enhanced epoxy resin has superior mechanical proprieties compared to the market average competitor, and is among the top products in the bi-components epoxy resins market. The new dispersion method shows significant potential for the industrial use of CNTs in epoxy matrices. PMID:29064400

  10. Industrial-Graded Epoxy Nanocomposites with Mechanically Dispersed Multi-Walled Carbon Nanotubes: Static and Damping Properties.

    PubMed

    Giovannelli, Andrea; Di Maio, Dario; Scarpa, Fabrizio

    2017-10-24

    The majority of currently published dispersion protocols of carbon nanotubes rely on techniques that are not scalable to an industrial level. This work shows how to obtain polymer nanocomposites with good mechanical characteristics using multi-walled carbon nanotubes epoxy resins obtained by mechanical mixing only. The mechanical dispersion method illustrated in this work is easily scalable to industrial level. The high shearing force due to the complex field of motion produces a good and reproducible carbon nanotube dispersion. We have tested an industrial epoxy matrix with good baseline mechanical characteristics at different carbon nanotube weight loads. ASTM-derived tensile and compressive tests show an increment in both Young's modulus and compressive strength compared with the pristine resin from a starting low wt %. Comparative vibration tests show improvement in the damping capacity. The new carbon nanotube enhanced epoxy resin has superior mechanical proprieties compared to the market average competitor, and is among the top products in the bi-components epoxy resins market. The new dispersion method shows significant potential for the industrial use of CNTs in epoxy matrices.

  11. A Colony Architecture for an Artificial Creature

    DTIC Science & Technology

    1989-08-01

    Laboratory DSTflJJITtlarl STATEMENT A Approved for public releamo; DistribuUon UnlimIted BEST AVAILABLE COPY 091 09 0 23 SECURiTy CLASSICICATION O r...Arlington, VA 22209 ._133 i4. MONITORING AGENCY NAME 4 AOORESS(II differm Orem Confreilln OIIlce) IS. SECURITY CLASS. (of Ohl. erpef) Office of Naval...home. A multi-agent system such as this has many advantages DD 1473 EDITION OF INOV 0 os isOSOLETE UNCLASSIFIED (cont.) 3/ C0014. O OP I SECURITY

  12. Instrumentation, Control, and Intelligent Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-09-01

    Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less

  13. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    NASA Astrophysics Data System (ADS)

    Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  14. Network-Centric Quantum Communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2014-03-01

    Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.

  15. Stacked, Filtered Multi-Channel X-Ray Diode Array

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacNeil, Lawrence P.; Dutra, Eric C.; Raphaelian, Mark

    2015-08-01

    This system meets the need for a low-cost, robust X-ray diode array to use for experiments in hostile environments on multiple platforms, and for experiments utilizing forces that may destroy the diode(s). Since these uses require a small size with a minimal single line-of-sight, a parallel array often cannot be used. So a stacked, filtered multi-channel X-ray diode array was developed that was called the MiniXRD. The design was modeled, built, and tested at National Security Technologies, LLC (NSTec) Livermore Operations (LO) to determine fundamental characteristics. Then, several different systems were fielded as ancillary “ridealong” diagnostics at several national facilitiesmore » to allow us to iteratively improve the design and usability. Presented here are design considerations and experimental results. This filtered diode array is currently at Technical Readiness Level (TRL) 6.« less

  16. Effects of cooking using multi-ply cookware on absorption of potassium and vitamins: a randomized double-blind placebo control study

    PubMed Central

    Mori, Mari; Hamada, Atsumi; Mori, Hideki; Yamori, Yukio; Tsuda, Kinsuke

    2012-01-01

    This 2-week interventional study involved a randomized allocation of subjects into three groups: Group A (daily ingestion of 350 g vegetables cooked without water using multi-ply [multilayer-structured] cookware), Group B (daily ingestion of 350g vegetables; ordinary cookware) and Group C (routine living). Before and after intervention, each subject underwent health examination with 24-h urine sampling. Blood vitamin C significantly increased after intervention from the baseline in Group A (P < 0.01) and Group B (P < 0.05). β-Carotene levels also increased significantly after intervention in Group A (P < 0.01) and Group B (P < 0.01). Oxidized low-density lipoprotein decreased significantly after intervention in Group A (P < 0.01). In Group A, 24-h urinary potassium excretion increased significantly (P < 0.01) and 24-h urinary sodium (Na)/K ratio improved significantly (P < 0.05) after intervention. In conclusion, a cooking method modification with multi-ply cookware improved absorption of nutrients from vegetables and enhanced effective utilization of the antioxidant potentials of vegetable nutrients. PMID:22229802

  17. Coordination between Generation and Transmission Maintenance Scheduling by Means of Multi-agent Technique

    NASA Astrophysics Data System (ADS)

    Nagata, Takeshi; Tao, Yasuhiro; Utatani, Masahiro; Sasaki, Hiroshi; Fujita, Hideki

    This paper proposes a multi-agent approach to maintenance scheduling in restructured power systems. The restructuring of electric power industry has resulted in market-based approaches for unbundling a multitude of service provided by self-interested entities such as power generating companies (GENCOs), transmission providers (TRANSCOs) and distribution companies (DISCOs). The Independent System Operator (ISO) is responsible for the security of the system operation. The schedule submitted to ISO by GENCOs and TRANSCOs should satisfy security and reliability constraints. The proposed method consists of several GENCO Agents (GAGs), TARNSCO Agents (TAGs) and a ISO Agent(IAG). The IAG’s role in maintenance scheduling is limited to ensuring that the submitted schedules do not cause transmission congestion or endanger the system reliability. From the simulation results, it can be seen the proposed multi-agent approach could coordinate between generation and transmission maintenance schedules.

  18. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  19. Privacy and Security in Multi-User Health Kiosks

    PubMed Central

    TAKYI, HAROLD; WATZLAF, VALERIE; MATTHEWS, JUDITH TABOLT; ZHOU, LEMING; DEALMEIDA, DILHARI

    2017-01-01

    Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) has gotten stricter and penalties have become more severe in response to a significant increase in computer-related information breaches in recent years. With health information said to be worth twice as much as other forms of information on the underground market, making preservation of privacy and security an integral part of health technology development, rather than an afterthought, not only mitigates risks but also helps to ensure HIPAA and HITECH compliance. This paper provides a guide, based on the Office for Civil Rights (OCR) audit protocol, for creating and maintaining an audit checklist for multi-user health kiosks. Implementation of selected audit elements for a multi-user health kiosk designed for use by community-residing older adults illustrates how the guide can be applied. PMID:28814990

  20. Measuring global water security towards sustainable development goals

    NASA Astrophysics Data System (ADS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  1. Effects of Four-Week Supplementation with a Multi-Vitamin/Mineral Preparation on Mood and Blood Biomarkers in Young Adults: A Randomised, Double-Blind, Placebo-Controlled Trial.

    PubMed

    White, David J; Cox, Katherine H M; Peters, Riccarda; Pipingas, Andrew; Scholey, Andrew B

    2015-10-30

    This study explored the effects of four-week multi-vitamin and mineral (MVM) supplementation on mood and neurocognitive function in healthy, young adults. Fifty-eight healthy adults, 18-40 years of age (M = 25.82 years, SD = 4.87) participated in this randomised, double-blind, placebo-controlled trial, in which mood and blood biomarkers were assessed at baseline and after four weeks of supplementation. Compared to placebo, MVM supplementation was associated with significantly lowered homocysteine and increased blood B-vitamin levels (p < 0.01). MVM treatment was also associated with significantly improved mood, as measured by reduced scores on the "depression-dejection" subscale of the Profile of Mood States (p = 0.018). These findings suggest that the four weeks of MVM supplementation may have beneficial effects on mood, underpinned by elevated B-vitamins and lowered homocysteine in healthy young adults.

  2. Multi-voxel pattern analysis reveals increased memory targeting and reduced use of retrieved details during single-agenda source monitoring

    PubMed Central

    McDuff, Susan G. R.; Frankel, Hillary C.; Norman, Kenneth A.

    2009-01-01

    We used multi-voxel pattern analysis (MVPA) of fMRI data to gain insight into how subjects’ retrieval agendas influence source memory judgments (was item X studied using source Y?). In Experiment 1, we used a single-agenda test where subjects judged whether items were studied with the targeted source or not. In Experiment 2, we used a multi-agenda test where subjects judged whether items were studied using the targeted source, studied using a different source, or nonstudied. To evaluate the differences between single- and multi-agenda source monitoring, we trained a classifier to detect source-specific fMRI activity at study, and then we applied the classifier to data from the test phase. We focused on trials where the targeted source and the actual source differed, so we could use MVPA to track neural activity associated with both the targeted source and the actual source. Our results indicate that single-agenda monitoring was associated with increased focus on the targeted source (as evidenced by increased targeted-source activity, relative to baseline) and reduced use of information relating to the actual, non-target source. In the multi-agenda experiment, high-levels of actual-source activity were associated with increased correct rejections, suggesting that subjects were using recollection of actual-source information to avoid source memory errors. In the single-agenda experiment, there were comparable levels of actual-source activity (suggesting that recollection was taking place), but the relationship between actual-source activity and behavior was absent (suggesting that subjects were failing to make proper use of this information). PMID:19144851

  3. Favourite alcohol advertisements and binge drinking among adolescents: a cross-cultural cohort study.

    PubMed

    Morgenstern, Matthis; Sargent, James D; Sweeting, Helen; Faggiano, Fabrizio; Mathis, Federica; Hanewinkel, Reiner

    2014-12-01

    To investigate the association between having a favourite alcohol advertisement and binge drinking among European adolescents. Data were obtained from a longitudinal observational study on relationships between smoking and drinking and film tobacco and alcohol exposures. State-funded schools. Baseline survey of 12 464 German, Italian, Polish and Scottish adolescents (mean age 13.5 years), of whom 10 259 (82%) were followed-up 12 months later. Pupils were asked the brand of their favourite alcohol advertisement at baseline. Multi-level mixed-effects logistic regressions assessed relationships between having a favourite alcohol advertisement ('alcohol marketing receptivity') and (i) binge drinking at baseline; and (ii) initiating binge drinking during follow-up among a subsample of 7438 baseline never binge drinkers. Life-time binge drinking prevalence at baseline was 29.9% and 25.9% initiated binge drinking during follow-up. Almost one-third of the baseline sample (32.1%) and 22.6% of the follow-up sample of never-bingers named a branded favourite alcohol advertisement, with high between-country variation in brand named. After controlling for age, gender, family affluence, school performance, TV screen time, personality characteristics and drinking behaviour of peers, parents and siblings, alcohol marketing receptivity was related significantly to both binge drinking at baseline [adjusted odds ratio (AOR) = 2.13, 95% confidence interval (CI) = 1.92, 2.36] and binge drinking initiation in longitudinal analysis (AOR = 1.45, 95% CI = 1.26, 1.66). There was no evidence for effect heterogeneity across countries. Among European adolescents naming a favourite alcohol advertisement was associated with increased likelihood of initiating binge drinking during 1-year follow-up, suggesting a relationship between alcohol marketing receptivity and adolescent binge drinking. © 2014 Society for the Study of Addiction.

  4. Lack of Association of Oral Calcium Supplementation with Coronary Artery Calcification in Rheumatoid Arthritis

    PubMed Central

    Giles, Jon T.; Bathon, Joan M.

    2015-01-01

    Objectives To investigate the association between oral calcium supplementation and coronary arterial calcification among rheumatoid arthritis (RA) patients without known cardiovascular disease (CVD). Methods This study was nested in a prospective cohort study of RA patients without known CVD. Daily supplemental calcium dose was ascertained from prescription and over-the-counter medications at baseline and visit 2 (median 20 months post-baseline). Coronary artery calcium (CAC), a measure of coronary atherosclerosis, was assessed by cardiac multi-detector row computed tomography at baseline and visit 3 (median 39 months post-baseline). The association of calcium supplementation with CAC was explored. Results Among the 145 RA patients studied, 42 (28%) took ≥1000mg/day of supplemental calcium at baseline. Forty-four (30%) and 50 (34%) had a CAC score >100 units at baseline and follow-up, respectively. Baseline CAC scores >100 units were significantly less frequent in the higher (≥1000mg/day) supplemental calcium group than in the lower dosed group (<1000mg/day) [OR 0.28 (95% CI 0.11-0.74)]; this remained significant after adjusting for relevant confounders [OR 0.30 (95% CI 0.09-0.93)]. Similarly, at the third study visit, CAC scores >100 units were less frequent in the higher vs. the lower supplemental calcium group [OR 0.41 (95% CI 0.18-0.95)]. When adjusted for relevant confounders, statistical significance was lost [OR 0.39 (95% CI 0.14-1.12)]. No gender interaction and no change in CAC score over time were appreciated. Conclusion Higher levels of oral calcium supplementation were not associated with an increased risk of coronary atherosclerosis as measured by CAC score in this RA cohort. PMID:25808397

  5. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.

  6. Time-Dependent Simulations of Turbopump Flows

    NASA Technical Reports Server (NTRS)

    Kiris, Cetin; Kwak, Dochan; Chan, William; Williams, Robert

    2002-01-01

    Unsteady flow simulations for RLV (Reusable Launch Vehicles) 2nd Generation baseline turbopump for one and half impeller rotations have been completed by using a 34.3 Million grid points model. MLP (Multi-Level Parallelism) shared memory parallelism has been implemented in INS3D, and benchmarked. Code optimization for cash based platforms will be completed by the end of September 2001. Moving boundary capability is obtained by using DCF module. Scripting capability from CAD (computer aided design) geometry to solution has been developed. Data compression is applied to reduce data size in post processing. Fluid/Structure coupling has been initiated.

  7. Hybrid Multi-Objective Optimization of Folsom Reservoir Operation to Maximize Storage in Whole Watershed

    NASA Astrophysics Data System (ADS)

    Goharian, E.; Gailey, R.; Maples, S.; Azizipour, M.; Sandoval Solis, S.; Fogg, G. E.

    2017-12-01

    The drought incidents and growing water scarcity in California have a profound effect on human, agricultural, and environmental water needs. California experienced multi-year droughts, which have caused groundwater overdraft and dropping groundwater levels, and dwindling of major reservoirs. These concerns call for a stringent evaluation of future water resources sustainability and security in the state. To answer to this call, Sustainable Groundwater Management Act (SGMA) was passed in 2014 to promise a sustainable groundwater management in California by 2042. SGMA refers to managed aquifer recharge (MAR) as a key management option, especially in areas with high variation in water availability intra- and inter-annually, to secure the refill of underground water storage and return of groundwater quality to a desirable condition. The hybrid optimization of an integrated water resources system provides an opportunity to adapt surface reservoir operations for enhancement in groundwater recharge. Here, to re-operate Folsom Reservoir, objectives are maximizing the storage in the whole American-Cosumnes watershed and maximizing hydropower generation from Folsom Reservoir. While a linear programing (LP) module tends to maximize the total groundwater recharge by distributing and spreading water over suitable lands in basin, a genetic based algorithm, Non-dominated Sorting Genetic Algorithm II (NSGA-II), layer above it controls releases from the reservoir to secure the hydropower generation, carry-over storage in reservoir, available water for replenishment, and downstream water requirements. The preliminary results show additional releases from the reservoir for groundwater recharge during high flow seasons. Moreover, tradeoffs between the objectives describe that new operation performs satisfactorily to increase the storage in the basin, with nonsignificant effects on other objectives.

  8. Temporal Variation and Association of Aflatoxin B1 Albumin-Adduct Levels with Socio-Economic and Food Consumption Factors in HIV Positive Adults

    PubMed Central

    Jolly, Pauline E.; Akinyemiju, Tomi F.; Jha, Megha; Aban, Inmaculada; Gonzalez-Falero, Andrea; Joseph, Dnika

    2015-01-01

    The association between aflatoxin exposure and alteration in immune responses observed in humans suggest that aflatoxin could suppress the immune system and work synergistically with HIV to increase disease severity and progression to AIDS. No longitudinal study has been conducted to assess exposure to aflatoxin (AF) among HIV positive individuals. We examined temporal variation in AFB1 albumin adducts (AF-ALB) in HIV positive Ghanaians, and assessed the association with socioeconomic and food consumption factors. We collected socioeconomic and food consumption data for 307 HIV positive antiretroviral naive adults and examined AF-ALB levels at recruitment (baseline) and at six (follow-up 1) and 12 (follow-up 2) months post-recruitment, by age, gender, socioeconomic status (SES) and food consumption patterns. Generalized linear models were used to examine the influence of socioeconomic and food consumption factors on changes in AF-ALB levels over the study period, adjusting for other covariates. AF-ALB levels (pg/mg albumin) were lower at baseline (mean AF-ALB: 14.9, SD: 15.9), higher at six months (mean AF-ALB: 23.3, SD: 26.6), and lower at 12 months (mean AF-ALB: 15.3, SD: 15.4). Participants with the lowest SES had the highest AF-ALB levels at baseline and follow up-2 compared with those with higher SES. Participants who bought less than 20% of their food and who stored maize for less than two months had lower AF-ALB levels. In the adjusted models, there was a statistically significant association between follow up time and season (dry or rainy season) on AF-ALB levels over time (p = 0.04). Asymptomatic HIV-positive Ghanaians had high plasma AF-ALB levels that varied according to season, socioeconomic status, and food consumption patterns. Steps need to be taken to ensure the safety and security of the food supply for the population, but in particular for the most vulnerable groups such as HIV positive people. PMID:26633502

  9. University multi-user facility survey-2010.

    PubMed

    Riley, Melissa B

    2011-12-01

    Multi-user facilities serve as a resource for many universities. In 2010, a survey was conducted investigating possible changes and successful characteristics of multi-user facilities, as well as identifying problems in facilities. Over 300 surveys were e-mailed to persons identified from university websites as being involved with multi-user facilities. Complete responses were received from 36 facilities with an average of 20 years of operation. Facilities were associated with specific departments (22%), colleges (22%), and university research centers (8.3%) or were not affiliated with any department or college within the university (47%). The five most important factors to succeed as a multi-user facility were: 1) maintaining an experienced, professional staff in an open atmosphere; 2) university-level support providing partial funding; 3) broad client base; 4) instrument training programs; and 5) an effective leader and engaged strategic advisory group. The most significant problems were: 1) inadequate university financial support and commitment; 2) problems recovering full service costs from university subsidies and user fees; 3) availability of funds to repair and upgrade equipment; 4) inability to retain highly qualified staff; and 5) unqualified users dirtying/damaging equipment. Further information related to these issues and to fee structure was solicited. Overall, there appeared to be a decline in university support for facilities and more emphasis on securing income by serving clients outside of the institution and by obtaining grants from entities outside of the university.

  10. Self port scanning tool : providing a more secure computing Environment through the use of proactive port scanning

    NASA Technical Reports Server (NTRS)

    Kocher, Joshua E; Gilliam, David P.

    2005-01-01

    Secure computing is a necessity in the hostile environment that the internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world, These network ports are essentially the doorways from the internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid System Administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a website where SAs and Users can request a port scan of their computer. The results are then emailed to the requestor. This tool aids Users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or backdoors, and what ports can be closed.

  11. Pricing and hedging derivative securities with neural networks: Bayesian regularization, early stopping, and bagging.

    PubMed

    Gençay, R; Qi, M

    2001-01-01

    We study the effectiveness of cross validation, Bayesian regularization, early stopping, and bagging to mitigate overfitting and improving generalization for pricing and hedging derivative securities with daily S&P 500 index daily call options from January 1988 to December 1993. Our results indicate that Bayesian regularization can generate significantly smaller pricing and delta-hedging errors than the baseline neural-network (NN) model and the Black-Scholes model for some years. While early stopping does not affect the pricing errors, it significantly reduces the hedging error (HE) in four of the six years we investigated. Although computationally most demanding, bagging seems to provide the most accurate pricing and delta hedging. Furthermore, the standard deviation of the MSPE of bagging is far less than that of the baseline model in all six years, and the standard deviation of the average HE of bagging is far less than that of the baseline model in five out of six years. We conclude that they be used at least in cases when no appropriate hints are available.

  12. Renewable Energy on the Front Lines - Continuum Magazine | NREL

    Science.gov Websites

    , vehicles, the microgrid, and intelligent controls. Functional models of this system could be used to of the multi-year, multi-agency Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) project, which focuses on improving energy surety for military installations. Funded by

  13. Secure Cooperative Data Access in Multi-Cloud Environment

    ERIC Educational Resources Information Center

    Le, Meixing

    2013-01-01

    In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…

  14. Case Study Research: Training Interdisciplinary Engineers with Context-Dependent Knowledge

    ERIC Educational Resources Information Center

    Chanan, Amit; Vigneswaran, Saravanamuth; Kandasamy, Jaya

    2012-01-01

    It is now widely acknowledged that water management discipline is transforming, from being a public health and flood prevention challenge of the nineteenth century to a multi-dimensional challenge of water security for the twenty-first century. In order to train water engineers to be capable of working with this holistic multi-dimensional…

  15. Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java

    DTIC Science & Technology

    2000-04-01

    separation of garbage collection costs is not possible. Balfanz and Gong [2] describe a multi- processing JVM developed to explore the secu- rity...line in Java. In Proc. of the 7th HotOS, Rio Rico, AZ, Mar. 1999. IEEE Computer Society. [2] D. Balfanz and L. Gong. Experience with secure multi

  16. Navigating Local Smoke-Free Multi-Unit Housing Policy Adoption

    ERIC Educational Resources Information Center

    Satterlund, Travis D.; Treiber, Jeanette; Cassady, Diana

    2013-01-01

    California state-funded local tobacco control projects have instituted smoke-free multi-unit housing (MUH) policy adoption campaigns in order to secure voluntary policy throughout the state. While landlords can legally prohibit smoking at MUH complexes in California, they often oppose such measures. The objective of this study was to analyze…

  17. The distribution of uranium over Europe: Geological and environmental significance

    USGS Publications Warehouse

    Plant, J.A.; Reeder, S.; Salminen, R.; Smith, D.B.; Tarvainen, T.; de Vivo, B.; Petterson, M.G.

    2003-01-01

    The variation of baseline levels of uranium in soil and stream sediments over Europe is described, based on new data prepared by the Forum of European Geological Surveys (FOREGS). The samples have been collected and analysed according to the protocols established for the International Union of Geological Sciences/International Association of Geochemistry and Cosmochemistry (IUGS/IAGC) Working Group on Global Geochemical Baselines. The baseline levels of U vary between 0??21 to 53 mg kg-1 in topsoils, 0??19 to 30 mg kg-1 in subsoils and < 1 to 59 mg kg-1 in stream sediments. There is generally good agreement between the levels of U in the three sample types, and the median concentration in all three media is approximately 2 mg kg-1. The most anomalous baseline levels occur over the Variscan orogen, especially areas into which late post-orogenic radiothermal high heat production (HHP) granites were emplaced. Spiderdiagrams based on trace element levels and rare earth element (REE) plots, confirm the association between the highest U anomalies and evolved radiothermal granites. High values are also associated with parts of the Alpine terrain especially in Slovenia, where there are historical U workings, and Southern Italy, where high values of U reflect contemporary volcanism. In contrast, much of the Caledonides of North West Europe and the Precambrian of the Baltic Shield and East European craton and its overlying sedimentary cover have very low values, generally < 4 mg kg-1. The results suggest that the main concern for the environment and human health from U, and the Th and K with which it is generally associated, is the naturally occurring total gamma radiation and radon potential associated with radiothermal granites. This is likely to be especially important where the granites are mineralised and have been worked historically, for example in the North West of the Iberian Peninsula where U and its decay products are likely to be more dispersed in the surface environment. The study also indicates the value of multi-element data in distinguishing between anthropogenic and naturally occurring anomalies.

  18. Effects of two doses of glucose and a caffeine-glucose combination on cognitive performance and mood during multi-tasking.

    PubMed

    Scholey, Andrew; Savage, Karen; O'Neill, Barry V; Owen, Lauren; Stough, Con; Priestley, Caroline; Wetherell, Mark

    2014-09-01

    This study assessed the effects of two doses of glucose and a caffeine-glucose combination on mood and performance of an ecologically valid, computerised multi-tasking platform. Following a double-blind, placebo-controlled, randomised, parallel-groups design, 150 healthy adults (mean age 34.78 years) consumed drinks containing placebo, 25 g glucose, 60 g glucose or 60 g glucose with 40 mg caffeine. They completed a multi-tasking framework at baseline and then 30 min following drink consumption with mood assessments immediately before and after the multi-tasking framework. Blood glucose and salivary caffeine were co-monitored. The caffeine-glucose group had significantly better total multi-tasking scores than the placebo or 60 g glucose groups and were significantly faster at mental arithmetic tasks than either glucose drink group. There were no significant treatment effects on mood. Caffeine and glucose levels confirmed compliance with overnight abstinence/fasting, respectively, and followed the predicted post-drink patterns. These data suggest that co-administration of glucose and caffeine allows greater allocation of attentional resources than placebo or glucose alone. At present, we cannot rule out the possibility that the effects are due to caffeine alone Future studies should aim at disentangling caffeine and glucose effects. © 2014 The Authors. Human Psychopharmacology: Clinical and Experimental published by John Wiley & Sons, Ltd.

  19. Effects of two doses of glucose and a caffeine–glucose combination on cognitive performance and mood during multi-tasking

    PubMed Central

    Scholey, Andrew; Savage, Karen; O'Neill, Barry V; Owen, Lauren; Stough, Con; Priestley, Caroline; Wetherell, Mark

    2014-01-01

    Background This study assessed the effects of two doses of glucose and a caffeine–glucose combination on mood and performance of an ecologically valid, computerised multi-tasking platform. Materials and methods Following a double-blind, placebo-controlled, randomised, parallel-groups design, 150 healthy adults (mean age 34.78 years) consumed drinks containing placebo, 25 g glucose, 60 g glucose or 60 g glucose with 40 mg caffeine. They completed a multi-tasking framework at baseline and then 30 min following drink consumption with mood assessments immediately before and after the multi-tasking framework. Blood glucose and salivary caffeine were co-monitored. Results The caffeine–glucose group had significantly better total multi-tasking scores than the placebo or 60 g glucose groups and were significantly faster at mental arithmetic tasks than either glucose drink group. There were no significant treatment effects on mood. Caffeine and glucose levels confirmed compliance with overnight abstinence/fasting, respectively, and followed the predicted post-drink patterns. Conclusion These data suggest that co-administration of glucose and caffeine allows greater allocation of attentional resources than placebo or glucose alone. At present, we cannot rule out the possibility that the effects are due to caffeine alone Future studies should aim at disentangling caffeine and glucose effects. PMID:25196040

  20. Multi-site pain and working conditions as predictors of work ability in a 4-year follow-up among food industry employees.

    PubMed

    Neupane, S; Virtanen, P; Leino-Arjas, P; Miranda, H; Siukola, A; Nygård, C-H

    2013-03-01

    We investigated the separate and joint effects of multi-site musculoskeletal pain and physical and psychosocial exposures at work on future work ability. A survey was conducted among employees of a Finnish food industry company in 2005 (n = 1201) and a follow-up survey in 2009 (n = 734). Information on self-assessed work ability (current work ability on a scale from 0 to 10; 7 = poor work ability), multi-site musculoskeletal pain (pain in at least two anatomical areas of four), leisure-time physical activity, body mass index and physical and psychosocial exposures was obtained by questionnaire. The separate and joint effects of multi-site pain and work exposures on work ability at follow-up, among subjects with good work ability at baseline, were assessed by logistic regression, and p-values for the interaction derived. Compared with subjects with neither multi-site pain nor adverse work exposure, multi-site pain at baseline increased the risk of poor work ability at follow-up, allowing for age, gender, occupational class, body mass index and leisure-time physical activity. The separate effects of the work exposures on work ability were somewhat smaller than those of multi-site pain. Multi-site pain had an interactive effect with work environment and awkward postures, such that no association of multi-site pain with poor work ability was seen when work environment was poor or awkward postures present. The decline in work ability connected with multi-site pain was not increased by exposure to adverse physical or psychosocial factors at work. © 2012 European Federation of International Association for the Study of Pain Chapters.

  1. Five Models for European Security: Implications for the United States

    DTIC Science & Technology

    1992-01-01

    tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in part to...distinguish the five systems from each other are reasonably clear (ad hoc, bipolar, tripolar , multi-polar collective, and overlapping), there is room...based on a tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in

  2. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  3. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  4. Algorithmic and user study of an autocompletion algorithm on a large medical vocabulary.

    PubMed

    Sevenster, Merlijn; van Ommering, Rob; Qian, Yuechen

    2012-02-01

    Autocompletion supports human-computer interaction in software applications that let users enter textual data. We will be inspired by the use case in which medical professionals enter ontology concepts, catering the ongoing demand for structured and standardized data in medicine. Goal is to give an algorithmic analysis of one particular autocompletion algorithm, called multi-prefix matching algorithm, which suggests terms whose words' prefixes contain all words in the string typed by the user, e.g., in this sense, opt ner me matches optic nerve meningioma. Second we aim to investigate how well it supports users entering concepts from a large and comprehensive medical vocabulary (snomed ct). We give a concise description of the multi-prefix algorithm, and sketch how it can be optimized to meet required response time. Performance will be compared to a baseline algorithm, which gives suggestions that extend the string typed by the user to the right, e.g. optic nerve m gives optic nerve meningioma, but opt ner me does not. We conduct a user experiment in which 12 participants are invited to complete 40 snomed ct terms with the baseline algorithm and another set of 40 snomed ct terms with the multi-prefix algorithm. Our results show that users need significantly fewer keystrokes when supported by the multi-prefix algorithm than when supported by the baseline algorithm. The proposed algorithm is a competitive candidate for searching and retrieving terms from a large medical ontology. Copyright © 2011 Elsevier Inc. All rights reserved.

  5. Effect of Supplementation with Zinc and Other Micronutrients on Malaria in Tanzanian Children: A Randomised Trial

    PubMed Central

    Veenemans, Jacobien; Milligan, Paul; Prentice, Andrew M.; Schouten, Laura R. A.; Inja, Nienke; van der Heijden, Aafke C.; de Boer, Linsey C. C.; Jansen, Esther J. S.; Koopmans, Anna E.; Enthoven, Wendy T. M.; Kraaijenhagen, Rob J.; Demir, Ayse Y.; Uges, Donald R. A.; Mbugi, Erasto V.; Savelkoul, Huub F. J.; Verhoef, Hans

    2011-01-01

    Background It is uncertain to what extent oral supplementation with zinc can reduce episodes of malaria in endemic areas. Protection may depend on other nutrients. We measured the effect of supplementation with zinc and other nutrients on malaria rates. Methods and Findings In a 2×2 factorial trial, 612 rural Tanzanian children aged 6–60 months in an area with intense malaria transmission and with height-for-age z-score≤−1.5 SD were randomized to receive daily oral supplementation with either zinc alone (10 mg), multi-nutrients without zinc, multi-nutrients with zinc, or placebo. Intervention group was indicated by colour code, but neither participants, researchers, nor field staff knew who received what intervention. Those with Plasmodium infection at baseline were treated with artemether-lumefantrine. The primary outcome, an episode of malaria, was assessed among children reported sick at a primary care clinic, and pre-defined as current Plasmodium infection with an inflammatory response, shown by axillary temperature ≥37.5°C or whole blood C-reactive protein concentration ≥8 mg/L. Nutritional indicators were assessed at baseline and at 251 days (median; 95% reference range: 191–296 days). In the primary intention-to-treat analysis, we adjusted for pre-specified baseline factors, using Cox regression models that accounted for multiple episodes per child. 592 children completed the study. The primary analysis included 1,572 malaria episodes during 526 child-years of observation (median follow-up: 331 days). Malaria incidence in groups receiving zinc, multi-nutrients without zinc, multi-nutrients with zinc and placebo was 2.89/child-year, 2.95/child-year, 3.26/child-year, and 2.87/child-year, respectively. There was no evidence that multi-nutrients influenced the effect of zinc (or vice versa). Neither zinc nor multi-nutrients influenced malaria rates (marginal analysis; adjusted HR, 95% CI: 1.04, 0.93–1.18 and 1.10, 0.97–1.24 respectively). The prevalence of zinc deficiency (plasma zinc concentration <9.9 µmol/L) was high at baseline (67% overall; 60% in those without inflammation) and strongly reduced by zinc supplementation. Conclusions We found no evidence from this trial that zinc supplementation protected against malaria. Trial Registration ClinicalTrials.gov NCT00623857 Please see later in the article for the Editors' Summary. PMID:22131908

  6. Implications of changing water cycle for the performance and yield characteristics of the multi-purpose Beas Reservoir in India

    NASA Astrophysics Data System (ADS)

    Adeloye, A. J.; Ojha, C. S.; Soundharajan, B.; Remesan, R.

    2013-12-01

    There is considerable change in both the spatial and temporal patterns of monsoon rainfall in India, with implications for water resources availability and security. 'Mitigating the Impacts of Climate Change on India Agriculture' (MICCI) is one of five on-going scientific efforts being sponsored as part of the UK-NERC/India-MOES Changing Water Cycle (South Asia) initiative to further the understanding of the problem and proffer solutions that are robust and effective. This paper focuses on assessing the implications of projected climate change on the yield and performance characteristics of the Pong Reservoir on the Beas River, Himachal Pradesh, India. The Pong serves both hydropower and irrigation needs and is therefore strategic for the socio-economic well-being of the region as well as sustaining the livelihoods of millions of farmers that rely on it for irrigation. Simulated baseline and climate-change perturbed hydro-climate scenarios developed as part of a companion Work Package of MICCI formed the basis of the analysis. For both of these scenarios, reservoir analyses were carried out using the Sequent Peak Algorithm (SPA) and Pong's existing level of releases to derive rule curves for the reservoir. These rule curves then formed the basis of further reservoir behaviour simulations in WEAP and the resulting performance of the reservoir was summarised in terms of reliability, resilience, vulnerability and sustainability. The whole exercise was implemented within a Monte Carlo framework for the benefit of characterising the variability in the assessments. The results show that the rule curves developed using future hydro-climate are significantly changed from the baseline in that higher storages will be required to be maintained in the Pong in the future to achieve reliable performance. As far as the overall performance of the reservoir is concerned, future reliability (both time-based and volume-based) is not significantly different from the baseline, provided the future simulations adopt the future rule curves. This is, however, not the case with the resilience, with the future hydro-climate resulting in a less resilient system when compared with the baseline. The resilience is the ability of the system to recover from a hydrological failure; consequently, lower resilience for the future systems is an indication that longer, continuous failure periods are likely with implications for the two purposes of the reservoir. For example, extended periods of water scarcity that may result from a low resilient system will mean that crops are likely to experience longer periods of water stress with implications for crop yields. In such situations, better operational practices that manage the available water through hedging and irrigation water scheduling will be required. Other interventions may include the introduction of water from other sources, e.g. groundwater.

  7. Independent Validation and Verification of automated information systems in the Department of Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hunteman, W.J.; Caldwell, R.

    1994-07-01

    The Department of Energy (DOE) has established an Independent Validation and Verification (IV&V) program for all classified automated information systems (AIS) operating in compartmented or multi-level modes. The IV&V program was established in DOE Order 5639.6A and described in the manual associated with the Order. This paper describes the DOE IV&V program, the IV&V process and activities, the expected benefits from an IV&V, and the criteria and methodologies used during an IV&V. The first IV&V under this program was conducted on the Integrated Computing Network (ICN) at Los Alamos National Laboratory and several lessons learned are presented. The DOE IV&Vmore » program is based on the following definitions. An IV&V is defined as the use of expertise from outside an AIS organization to conduct validation and verification studies on a classified AIS. Validation is defined as the process of applying the specialized security test and evaluation procedures, tools, and equipment needed to establish acceptance for joint usage of an AIS by one or more departments or agencies and their contractors. Verification is the process of comparing two levels of an AIS specification for proper correspondence (e.g., security policy model with top-level specifications, top-level specifications with source code, or source code with object code).« less

  8. Clustering recommendations to compute agent reputation

    NASA Astrophysics Data System (ADS)

    Bedi, Punam; Kaur, Harmeet

    2005-03-01

    Traditional centralized approaches to security are difficult to apply to multi-agent systems which are used nowadays in e-commerce applications. Developing a notion of trust that is based on the reputation of an agent can provide a softer notion of security that is sufficient for many multi-agent applications. Our paper proposes a mechanism for computing reputation of the trustee agent for use by the trustier agent. The trustier agent computes the reputation based on its own experience as well as the experience the peer agents have with the trustee agents. The trustier agents intentionally interact with the peer agents to get their experience information in the form of recommendations. We have also considered the case of unintentional encounters between the referee agents and the trustee agent, which can be directly between them or indirectly through a set of interacting agents. The clustering is done to filter off the noise in the recommendations in the form of outliers. The trustier agent clusters the recommendations received from referee agents on the basis of the distances between recommendations using the hierarchical agglomerative method. The dendogram hence obtained is cut at the required similarity level which restricts the maximum distance between any two recommendations within a cluster. The cluster with maximum number of elements denotes the views of the majority of recommenders. The center of this cluster represents the reputation of the trustee agent which can be computed using c-means algorithm.

  9. The natural history of children with joint hypermobility syndrome and Ehlers-Danlos hypermobility type: a longitudinal cohort study.

    PubMed

    Scheper, Mark C; Nicholson, Lesley L; Adams, Roger D; Tofts, Louise; Pacey, Verity

    2017-12-01

    The objective of the manuscript was to describe the natural history of complaints and disability in children diagnosed with joint hypermobility syndrome (JHS)/Ehlers-Danlos-hypermobility type (EDS-HT) and to identify the constructs that underlie functional decline. One hundred and one JHS/EDS-HT children were observed over 3 years and assessed at three time points on the following: functional impairments, quality of life, connective tissue laxity, muscle function, postural control and musculoskeletal and multi-systemic complaints. Cluster analysis was performed to identify subgroups in severity. Clinical profiles were determined for these subgroups, and differences were assessed by multivariate analysis of covariance. Mixed linear regression models were used to determine the subsequent trajectories. Finally, an exploratory factor analysis was used to uncover the underlying constructs of functional impairment. Three clusters of children were identified in terms of functional impairment: mild, moderately and severely affected. Functional impairment at baseline was predictive of worsening trajectories in terms of reduced walking distance and decreased quality of life (P ⩽ 0.05) over 3 years. Multiple interactions between the secondary outcomes were observed, with four underlying constructs identified. All four constructs (multi-systemic effects, pain, fatigue and loss of postural control) contributed significantly to disability (P ⩽ 0.046). Children diagnosed with JHS/EDS-HT who have a high incidence of multi-systemic complaints (particularly, orthostatic intolerance, urinary incontinence and diarrhoea) and poor postural control in addition to high levels of pain and fatigue at baseline are most likely to have a deteriorating trajectory of functional impairment and, accordingly, warrant clinical prioritization. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  10. A multi-scale ensemble-based framework for forecasting compound coastal-riverine flooding: The Hackensack-Passaic watershed and Newark Bay

    NASA Astrophysics Data System (ADS)

    Saleh, F.; Ramaswamy, V.; Wang, Y.; Georgas, N.; Blumberg, A.; Pullen, J.

    2017-12-01

    Estuarine regions can experience compound impacts from coastal storm surge and riverine flooding. The challenges in forecasting flooding in such areas are multi-faceted due to uncertainties associated with meteorological drivers and interactions between hydrological and coastal processes. The objective of this work is to evaluate how uncertainties from meteorological predictions propagate through an ensemble-based flood prediction framework and translate into uncertainties in simulated inundation extents. A multi-scale framework, consisting of hydrologic, coastal and hydrodynamic models, was used to simulate two extreme flood events at the confluence of the Passaic and Hackensack rivers and Newark Bay. The events were Hurricane Irene (2011), a combination of inland flooding and coastal storm surge, and Hurricane Sandy (2012) where coastal storm surge was the dominant component. The hydrodynamic component of the framework was first forced with measured streamflow and ocean water level data to establish baseline inundation extents with the best available forcing data. The coastal and hydrologic models were then forced with meteorological predictions from 21 ensemble members of the Global Ensemble Forecast System (GEFS) to retrospectively represent potential future conditions up to 96 hours prior to the events. Inundation extents produced by the hydrodynamic model, forced with the 95th percentile of the ensemble-based coastal and hydrologic boundary conditions, were in good agreement with baseline conditions for both events. The USGS reanalysis of Hurricane Sandy inundation extents was encapsulated between the 50th and 95th percentile of the forecasted inundation extents, and that of Hurricane Irene was similar but with caveats associated with data availability and reliability. This work highlights the importance of accounting for meteorological uncertainty to represent a range of possible future inundation extents at high resolution (∼m).

  11. Demonstration Project for a Multi-Material Lightweight Prototype Vehicle as Part of the Clean Energy Dialogue with Canada

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Skszek, Tim

    2015-12-29

    The intent of the Multi-Material Lightweight Vehicle (“MMLV”) was to assess the feasibility of achieving a significant level of vehicle mass reduction, enabling engine downsizing resulting in a tangible fuel reduction and environmental benefit. The MMLV project included the development of two (2) lightweight vehicle designs, referred to as Mach-I and Mach-II MMLV variants, based on a 2013 Ford production C/D segment production vehicle (Fusion). Weight comparison, life cycle assessment and limited full vehicle testing are included in the project scope. The Mach-I vehicle variant was comprised of materials and processes that are commercially available or previously demonstrated. The 363more » kg mass reduction associated with the Mach-I design enabled use of a one-liter, three-cylinder, gasoline turbocharged direct injection engine, maintaining the performance and utility of the baseline vehicle. The full MMLV project produced seven (7) MMLV Mach-I “concept vehicles” which were used for testing and evaluation. The full vehicle tests confirmed that MMLV Mach-I concept vehicle performed approximately equivalent to the baseline 2013 Ford Fusion vehicle thereby validating the design of the multi material lightweight vehicle design. The results of the Life Cycle Assessment, conducted by third party consultant, indicated that if the MMLV Mach-I design was built and operated in North America for 250,000 km (155,343 miles) it would produce significant environmental and fuel economy benefits including a 16% reduction in Global Warming Potential (GWP) and 16% reduction in Total Primary Energy (TPE). The LCA calculations estimated the combined fuel economy of 34 mpg (6.9 l/100 km) associated with the MMLV Mach-I Design compared to 28 mpg (8.4 l/100 km) for the 2013 Ford Fusion.« less

  12. Security analysis of cyber-physical system

    NASA Astrophysics Data System (ADS)

    Li, Bo; Zhang, Lichen

    2017-05-01

    In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.

  13. Multi-track financing.

    PubMed

    Kennedy, Steven W; Randolph, John; Taddey, Anthony J

    2012-05-01

    In today's uncertain economic environment, when seeking to finance a capital project, healthcare borrowers should adopt a multi-tracked funding strategy that permits them to change capital-funding routes quickly in response to changing circumstances. The multi-tracking process requires two stages prior to securing a commitment and beginning the closing process: due diligence and indication of interest. This process should present no material additional cost during these two stages, giving healthcare borrowers the flexibility to explore a variety of financing options.

  14. Wireless sensors and sensor networks for homeland security applications.

    PubMed

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  15. Modified Multi Prime RSA Cryptosystem

    NASA Astrophysics Data System (ADS)

    Ghazali Kamardan, M.; Aminudin, N.; Che-Him, Norziha; Sufahani, Suliadi; Khalid, Kamil; Roslan, Rozaini

    2018-04-01

    RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. Then, a modification is made to the Multi prime RSA where another keys is shared secretly between the receiver and the sender to increase the securerity. As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. Key Generation in which the secret and public keys are generated and published. In this phase, the secrecy is improved by adding more prime numbers and addition of secret keys. 2. Encryption of the message using the public and secret keys given. 3. Decryption of the secret message using the secret key generated. For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. Furthermore, in modified Multi prime RSA another secret key is introduced to increase the obstacle to the attacker. Therefore, it is strongly believed that this new algorithm is better and can be an alternative to the RSA.

  16. Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues

    DTIC Science & Technology

    2005-02-07

    joints, and knuckles, has been used for about 30 years to control access to secure facilities such as nuclear power plants. Facial recognition analyzes...this end, however, DOS has also begun phasing in the use of facial recognition technologies with visa and passport photos, but these technologies are...party, have approved interoperable biometric standards, and the baseline biometric will be facial recognition . Member states will also have the option

  17. A randomized, double-blind, placebo-controlled study of the effects of pomegranate extract on rising PSA levels in men following primary therapy for prostate cancer.

    PubMed

    Pantuck, A J; Pettaway, C A; Dreicer, R; Corman, J; Katz, A; Ho, A; Aronson, W; Clark, W; Simmons, G; Heber, D

    2015-09-01

    The primary objective of this study was to compare the effects of pomegranate juice on PSA doubling times (PSADT) in subjects with rising PSA levels after primary therapy for prostate cancer. Double-blind, placebo-controlled multi-institutional study, evaluated the effects of pomegranate liquid extract on serum PSA levels. The primary end point of this study was change in serum PSADT. Additional secondary and exploratory objectives were to evaluate the safety of pomegranate juice and to determine the interaction of manganese superoxide dismutase (MnSOD) AA genotype and pomegranate treatment on PSADT. One-hundred eighty-three eligible subjects were randomly assigned to the active and placebo groups with a ratio of 2:1 (extract N=102; placebo N=64; juice N=17). The majority of adverse events were of moderate or mild grade. Median PSADT increased from 11.1 months at baseline to 15.6 months in the placebo group (P<0.001) compared with an increase from 12.9 months at baseline to 14.5 months in the extract group (P=0.13) and an increase from 12.7 at baseline to 20.3 in the juice group (P=0.004). However, none of these changes were statistically significant between the three groups (P>0.05). Placebo AA patients experienced a 1.8 month change in median PSADT from 10.9 months at baseline to 12.7 months (P=0.22), while extract patients experienced a 12 month change in median PSADT from 13.6 at baseline to 25.6 months (P=0.03). Compared with placebo, pomegranate extract did not significantly prolong PSADT in prostate cancer patients with rising PSA after primary therapy. A significant prolongation in PSADT was observed in both the treatment and placebo arms. Men with the MnSOD AA genotype may represent a group that is more sensitive to the antiproliferative effects of pomegranate on PSADT; however, this finding requires prospective hypothesis testing and validation.

  18. Multi-parameter observation of environmental asbestos pollution at the Institut de Physique du Globe de Paris (Jussieu Campus, France).

    PubMed

    Besson, P; Lalanne, F X; Wang, Y; Guyot, F

    1999-11-01

    An original multi-parameter system has been used to study the nature of dust in the ambient air, particularly the total fibers and asbestos fibers, in eight areas of the Institut de Physique de Globe de Paris (France). These analyses provide a detailed case study of environmental pollution by asbestos fibers at low levels. The levels of total fibers with a length greater than 3 microns, measured with a real time fiber analyser monitor (FAM), give a baseline of 2.5 fibers per l., throughout the duration of sampling. The same levels, calculated during periods of effective presence of staff, are smaller than 10 fb per l. During these periods, the instantaneous value can show high peaks, reaching a maximum of 60 fb per l., but more often of about 5 to 10 fb per l. A direct cause and effect relationship exists between fiber concentrations and the presence of people, and indirectly with the variation of the other environmental parameters (temperature, humidity, air velocity). The baseline concentration of asbestos fibers, determined by analytical transmission electron microscopy (ATEM), is about 10(-1) fb per l., with a mean value during the presence of people always less than 1.5 fb per l. The low levels of asbestos fibers do not allow us to establish a precise correlation between the concentration of total fibers and the asbestos concentration, but a rough estimate suggests that asbestos could represent 10-20% of the airborne fibers monitored with the FAM. The statistical study of fiber sizes shows that 70 and 55% of analyzed chrysotile and amosite fibers respectively are smaller than 5 microns. These numbers are 40 and 35% for fibers smaller than 3 microns, which are undetected by the FAM. Amosite, which characterizes most of the asbestos-containing materials (ACM) in the analyzed areas, is detected in the ambient air in quantities ten times less important than chrysotile. The low asbestos levels and the difference between the nature of building asbestos and airborne fibers, show that the mean measured asbestos contents in the ambient air represent the geochemical background of chrysotile asbestos fibers in the Parisian air.

  19. Household food insecurity is associated with abdominal but not general obesity among Iranian children.

    PubMed

    Jafari, Fateme; Ehsani, Simin; Nadjarzadeh, Azadeh; Esmaillzadeh, Ahmad; Noori-Shadkam, Mahmood; Salehi-Abargouei, Amin

    2017-04-21

    Childhood obesity is increasing all over the world. Food insecurity is mentioned as a possible risk factor; however, previous studies have led to inconsistent results in different societies while data are lacking for the Middle East. We aimed to investigate the relationship between food insecurity and general or abdominal obesity in Iranian children in a cross-sectional study. Anthropometric data including height, weight, and waist circumference were measured by trained nutritionists. General and abdominal obesity were defined based on world health organization (WHO) and Iranian reference curves for age and gender, respectively. Radimer/Cornell food security questionnaire was filled by parents. Data about the physical activity of participants, family socio-economic status, parental obesity and data about perinatal period were also gathered using self-administered questionnaires. Logistic regression was incorporated to investigate the association between food insecurity and obesity in crude and multi-variable adjusted models. A total of 587 children aged 9.30 ± 1.49 years had complete data for analysis. Food insecurity at household level was significantly associated with abdominal obesity (odds ratio (OR) = 1.54; confidence interval (CI):1.01-2.34, p <0.05) and the relationship remained significant after adjusting for all potential confounding variables (OR = 2.02; CI:1.01-4.03, p <0.05). Food insecurity was associated with general obesity neither in crude analysis and multi-variable adjusted models. The slight levels of food insecurity might increase the likelihood of abdominal obesity in Iranian children and macroeconomic policies to improve the food security are necessary. Large-scale prospective studies, particularly in the Middle East, are highly recommended to confirm our results.

  20. A multispectral automatic target recognition application for maritime surveillance, search, and rescue

    NASA Astrophysics Data System (ADS)

    Schoonmaker, Jon; Reed, Scott; Podobna, Yuliya; Vazquez, Jose; Boucher, Cynthia

    2010-04-01

    Due to increased security concerns, the commitment to monitor and maintain security in the maritime environment is increasingly a priority. A country's coast is the most vulnerable area for the incursion of illegal immigrants, terrorists and contraband. This work illustrates the ability of a low-cost, light-weight, multi-spectral, multi-channel imaging system to handle the environment and see under difficult marine conditions. The system and its implemented detecting and tracking technologies should be organic to the maritime homeland security community for search and rescue, fisheries, defense, and law enforcement. It is tailored for airborne and ship based platforms to detect, track and monitor suspected objects (such as semi-submerged targets like marine mammals, vessels in distress, and drug smugglers). In this system, automated detection and tracking technology is used to detect, classify and localize potential threats or objects of interest within the imagery provided by the multi-spectral system. These algorithms process the sensor data in real time, thereby providing immediate feedback when features of interest have been detected. A supervised detection system based on Haar features and Cascade Classifiers is presented and results are provided on real data. The system is shown to be extendable and reusable for a variety of different applications.

  1. Outdoor air 1,3-butadiene monitoring: Comparison of performance of Radiello® passive samplers and active multi-sorbent bed tubes

    NASA Astrophysics Data System (ADS)

    Gallego, Eva; Teixidor, Pilar; Roca, Francisco Javier; Perales, José Francisco; Gadea, Enrique

    2018-06-01

    A comparison was made between the relative performance of active and passive sampling methods for the analysis of 1,3-butadiene in outdoor air. Active and passive sampling was conducted using multi-sorbent bed tubes (Carbotrap, Carbopack X, Carboxen 569) and RAD141 Radiello® diffusive samplers (filled with Carbopack X), respectively. Daily duplicate samples of multi-sorbent bed tubes were taken over a period of 14 days (9 + 5 days) at El Morell (Tarragona, Spain), near the petrochemical area. As 1,3-butadiene is a reactive pollutant and can be rapidly oxidized, half of the samplers were equipped with ozone scrubbers. Samples consisted in two tubes connected in series (front and back) to allow the determination of breakthrough. Quadruplicate samples of Radiello® tubes were taken over a period of 14 days (9 days and 5 days), too. During those days, ozone concentration was measured using RAD172 Radiello® samplers. In addition to this, daily duplicate samples of multi-sorbent bed tubes were taken in the city of Barcelona over a period of 8 days. Simultaneously, 4 samples of Radiello® tubes were exposed to outdoor air. Sampling was done throughout June and July 2017. Analysis was performed by thermal desorption coupled with gas chromatography/mass spectrometry. Analytical performance of the two sampling methods was evaluated by describing several quality assurance parameters, with results showing that performances are quite similar. They display low detection limits, good precision, linearity and desorption efficiency, low levels of blank values, and low breakthrough for multi-sorbent bed tubes. However, Radiello® samplers were not able to uptake episodic 1,3-butadiene high concentrations, leading to underestimation of real values. Hence, we can conclude that Radiello® samplers can be used for baseline 1,3-butadiene levels whereas multi-sorbent bed tubes would be advisable when relevant episodes are expected.

  2. Optimization of airport security lanes

    NASA Astrophysics Data System (ADS)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  3. Potential Effects of a Scenario Earthquake on the Economy of Southern California: Baseline County-Level Migration Characteristics and Trends 1995-2000 and 2001-2010

    USGS Publications Warehouse

    Sherrouse, Benson C.; Hester, David J.

    2008-01-01

    The Multi-Hazards Demonstration Project (MHDP) is a collaboration between the U.S. Geological Survey (USGS) and various partners from the public and private sectors and academia, meant to improve Southern California's resiliency to natural hazards. In support of the MHDP objectives, the ShakeOut Scenario was developed. It describes a magnitude 7.8 earthquake along the southernmost 300 kilometers (200 miles) of the San Andreas Fault, identified by geoscientists as a plausible event that will cause moderate to strong shaking over much of the eight-county (Imperial, Kern, Los Angeles, Orange, Riverside, San Bernardino, San Diego, and Ventura) Southern California region. This report uses historical, estimated, and projected population data from several Federal and State data sources to estimate baseline characteristics and trends of the region's population migration (that is, changes in a person's place of residence over time). The analysis characterizes migration by various demographic, economic, family, and household variables for the period 1995-2000. It also uses existing estimates (beginning in 2001) of the three components of population change - births, deaths, and migration - to extrapolate near-term projections of county-level migration trends through 2010. The 2010 date was chosen to provide baseline projections corresponding to a two-year recovery period following the November 2008 date that was selected for the occurrence of the ShakeOut Scenario earthquake. The baseline characteristics and projections shall assist with evaluating the effects of inflow and outflow migration trends for alternative futures in which the simulated M7.8 earthquake either does or does not occur and the impact of the event on housing and jobs, as well as community composition and regional economy changes based on dispersion of intellectual, physical, economic, and cultural capital.

  4. Performance assessment of multi-frequency processing of ICU chest images for enhanced visualization of tubes and catheters

    NASA Astrophysics Data System (ADS)

    Wang, Xiaohui; Couwenhoven, Mary E.; Foos, David H.; Doran, James; Yankelevitz, David F.; Henschke, Claudia I.

    2008-03-01

    An image-processing method has been developed to improve the visibility of tube and catheter features in portable chest x-ray (CXR) images captured in the intensive care unit (ICU). The image-processing method is based on a multi-frequency approach, wherein the input image is decomposed into different spatial frequency bands, and those bands that contain the tube and catheter signals are individually enhanced by nonlinear boosting functions. Using a random sampling strategy, 50 cases were retrospectively selected for the study from a large database of portable CXR images that had been collected from multiple institutions over a two-year period. All images used in the study were captured using photo-stimulable, storage phosphor computed radiography (CR) systems. Each image was processed two ways. The images were processed with default image processing parameters such as those used in clinical settings (control). The 50 images were then separately processed using the new tube and catheter enhancement algorithm (test). Three board-certified radiologists participated in a reader study to assess differences in both detection-confidence performance and diagnostic efficiency between the control and test images. Images were evaluated on a diagnostic-quality, 3-megapixel monochrome monitor. Two scenarios were studied: the baseline scenario, representative of today's workflow (a single-control image presented with the window/level adjustments enabled) vs. the test scenario (a control/test image pair presented with a toggle enabled and the window/level settings disabled). The radiologists were asked to read the images in each scenario as they normally would for clinical diagnosis. Trend analysis indicates that the test scenario offers improved reading efficiency while providing as good or better detection capability compared to the baseline scenario.

  5. Using a knowledge translation framework to implement asthma clinical practice guidelines in primary care.

    PubMed

    Licskai, Christopher; Sands, Todd; Ong, Michael; Paolatto, Lisa; Nicoletti, Ivan

    2012-10-01

    Quality problem International guidelines establish evidence-based standards for asthma care; however, recommendations are often not implemented and many patients do not meet control targets. Initial assessment Regional pilot data demonstrated a knowledge-to-practice gap. Choice of solutions We engineered health system change in a multi-step approach described by the Canadian Institutes of Health Research knowledge translation framework. Implementation Knowledge translation occurred at multiple levels: patient, practice and local health system. A regional administrative infrastructure and inter-disciplinary care teams were developed. The key project deliverable was a guideline-based interdisciplinary asthma management program. Six community organizations, 33 primary care physicians and 519 patients participated. The program operating cost was $290/patient. Evaluation Six guideline-based care elements were implemented, including spirometry measurement, asthma controller therapy, a written self-management action plan and general asthma education, including the inhaler device technique, role of medications and environmental control strategies in 93, 95, 86, 100, 97 and 87% of patients, respectively. Of the total patients 66% were adults, 61% were female, the mean age was 35.7 (SD = ± 24.2) years. At baseline 42% had two or more symptoms beyond acceptable limits vs. 17% (P< 0.001) post-intervention; 71% reported urgent/emergent healthcare visits at baseline (2.94 visits/year) vs. 45% (1.45 visits/year) (P< 0.001); 39% reported absenteeism (5.0 days/year) vs. 19% (3.0 days/year) (P< 0.001). The mean follow-up interval was 22 (SD = ± 7) months. Lessons learned A knowledge-translation framework can guide multi-level organizational change, facilitate asthma guideline implementation, and improve health outcomes in community primary care practices. Program costs are similar to those of diabetes programs. Program savings offset costs in a ratio of 2.1:1.

  6. Lifetime risk of stroke in young-aged and middle-aged Chinese population: the Chinese Multi-Provincial Cohort Study

    PubMed Central

    Wang, Ying; Liu, Jing; Wang, Wei; Wang, Miao; Qi, Yue; Xie, Wuxiang; Li, Yan; Sun, Jiayi; Liu, Jun; Zhao, Dong

    2016-01-01

    Objective: Stroke is a major cause of premature death in China. Early prevention of stroke requires a more effective method to differentiate the stroke risk among young-aged and middle-aged individuals than the 10-year risk of cardiovascular disease. This study aimed to establish a lifetime stroke risk model and risk charts for the young-aged and middle-aged population in China. Methods: The Chinese Multi-Provincial Cohort Study participants (n = 21 953) aged 35–84 years without cardiovascular disease at baseline were followed for 18 years (263 016 person-years). Modified Kaplan–Meier method was used to estimate the mean lifetime stroke risk up to age of 80 years and the lifetime stroke risk according to major stroke risk factors for the population aged 35–60 years. Results: A total of 917 participants developed first-ever strokes. For the participants aged 35–40 years (98 stroke cases), the lifetime stroke risk was 18.0 and 14.7% in men and women, respectively. Blood pressure most effectively discriminated the lifetime stroke risk. The lifetime risk of stroke for the individuals with all risk factors optimal was 8–10 times lower compared with those with two or more high risk factors at age 35–60 years at baseline. Conclusion: In young-aged and middle-aged population, the lifetime stroke risk will keep very low if major risk factors especially blood pressure level is at optimal levels, but the risk substantially increases even with a slight elevation of major risk factors, which could not be identified using 10-year risk estimation. PMID:27512963

  7. Using a knowledge translation framework to implement asthma clinical practice guidelines in primary care

    PubMed Central

    Licskai, Christopher; Sands, Todd; Ong, Michael; Paolatto, Lisa; Nicoletti, Ivan

    2012-01-01

    Quality problem International guidelines establish evidence-based standards for asthma care; however, recommendations are often not implemented and many patients do not meet control targets. Initial assessment Regional pilot data demonstrated a knowledge-to-practice gap. Choice of solutions We engineered health system change in a multi-step approach described by the Canadian Institutes of Health Research knowledge translation framework. Implementation Knowledge translation occurred at multiple levels: patient, practice and local health system. A regional administrative infrastructure and inter-disciplinary care teams were developed. The key project deliverable was a guideline-based interdisciplinary asthma management program. Six community organizations, 33 primary care physicians and 519 patients participated. The program operating cost was $290/patient. Evaluation Six guideline-based care elements were implemented, including spirometry measurement, asthma controller therapy, a written self-management action plan and general asthma education, including the inhaler device technique, role of medications and environmental control strategies in 93, 95, 86, 100, 97 and 87% of patients, respectively. Of the total patients 66% were adults, 61% were female, the mean age was 35.7 (SD = ±24.2) years. At baseline 42% had two or more symptoms beyond acceptable limits vs. 17% (P< 0.001) post-intervention; 71% reported urgent/emergent healthcare visits at baseline (2.94 visits/year) vs. 45% (1.45 visits/year) (P< 0.001); 39% reported absenteeism (5.0 days/year) vs. 19% (3.0 days/year) (P< 0.001). The mean follow-up interval was 22 (SD = ±7) months. Lessons learned A knowledge-translation framework can guide multi-level organizational change, facilitate asthma guideline implementation, and improve health outcomes in community primary care practices. Program costs are similar to those of diabetes programs. Program savings offset costs in a ratio of 2.1:1 PMID:22893665

  8. The second Symptom Management Research Trial in Oncology (SMaRT Oncology-2): a randomised trial to determine the effectiveness and cost-effectiveness of adding a complex intervention for major depressive disorder to usual care for cancer patients.

    PubMed

    Walker, Jane; Cassidy, Jim; Sharpe, Michael

    2009-03-30

    Depression Care for People with Cancer is a complex intervention delivered by specially trained cancer nurses, under the supervision of a psychiatrist. It is given as a supplement to the usual care for depression, which patients receive from their general practitioner and cancer service. In a 'proof of concept' trial (Symptom Management Research Trials in Oncology-1) Depression Care for People with Cancer improved depression more than usual care alone. The second Symptom Management Research Trial in Oncology (SMaRT Oncology-2 Trial) will test its effectiveness and cost-effectiveness in a 'real world' setting. A two arm parallel group multi-centre randomised controlled trial. TRIAL PROCEDURES: 500 patients will be recruited through established systematic Symptom Monitoring Services, which screen patients for depression. Patients will have: a diagnosis of cancer (of various types); an estimated life expectancy of twelve months or more and a diagnosis of Major Depressive Disorder. Patients will be randomised to usual care or usual care plus Depression Care for People with Cancer. Randomisation will be carried out by telephoning a secure computerised central randomisation system or by using a secure web interface. The primary outcome measure is 'treatment response' measured at 24 week outcome data collection. 'Treatment response' will be defined as a reduction of 50% or more in the patient's baseline depression score, measured using the 20-item Symptom Checklist (SCL-20D). Secondary outcomes include remission of major depressive disorder, depression severity and patients' self-rated improvement of depression. Current controlled trials ISRCTN40568538 TRIAL HYPOTHESES: (1) Depression Care for People with Cancer as a supplement to usual care will be more effective than usual care alone in achieving a 50% reduction in baseline SCL-20D score at 24 weeks. (2) Depression Care for People with Cancer as a supplement to usual care will cost more than usual care alone but will be more cost effective in achieving improvements in patients' depression and quality of life.

  9. Intelligent wear mode identification system for marine diesel engines based on multi-level belief rule base methodology

    NASA Astrophysics Data System (ADS)

    Yan, Xinping; Xu, Xiaojian; Sheng, Chenxing; Yuan, Chengqing; Li, Zhixiong

    2018-01-01

    Wear faults are among the chief causes of main-engine damage, significantly influencing the secure and economical operation of ships. It is difficult for engineers to utilize multi-source information to identify wear modes, so an intelligent wear mode identification model needs to be developed to assist engineers in diagnosing wear faults in diesel engines. For this purpose, a multi-level belief rule base (BBRB) system is proposed in this paper. The BBRB system consists of two-level belief rule bases, and the 2D and 3D characteristics of wear particles are used as antecedent attributes on each level. Quantitative and qualitative wear information with uncertainties can be processed simultaneously by the BBRB system. In order to enhance the efficiency of the BBRB, the silhouette value is adopted to determine referential points and the fuzzy c-means clustering algorithm is used to transform input wear information into belief degrees. In addition, the initial parameters of the BBRB system are constructed on the basis of expert-domain knowledge and then optimized by the genetic algorithm to ensure the robustness of the system. To verify the validity of the BBRB system, experimental data acquired from real-world diesel engines are analyzed. Five-fold cross-validation is conducted on the experimental data and the BBRB is compared with the other four models in the cross-validation. In addition, a verification dataset containing different wear particles is used to highlight the effectiveness of the BBRB system in wear mode identification. The verification results demonstrate that the proposed BBRB is effective and efficient for wear mode identification with better performance and stability than competing systems.

  10. 78 FR 15343 - Multi-State, Multi-Sector Trade Mission to Colombia; September 9-12, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-11

    ... for intellectual property rights (IPR). Colombia's traditional acceptance of U.S. brands as well as U... Colombia as an export destination. With more than 45 million people, an improved security environment, an... participation in the labor market has increased over 11% in the past five years; Use of free trade zones for...

  11. An AIE-active boron-difluoride complex: multi-stimuli-responsive fluorescence and application in data security protection.

    PubMed

    Zhu, Xiaolin; Liu, Rui; Li, Yuhao; Huang, Hai; Wang, Qiang; Wang, Danfeng; Zhu, Xuan; Liu, Shishen; Zhu, Hongjun

    2014-11-04

    A novel AIE-active boron-difluoride complex (PTZ) was synthesized which exhibits multi-stimuli responsive characteristics. Its colours and emissions can be switched by mechanical grinding, organic solvent vapours and acid/base vapours. This complex can be utilized in data encryption and decryption based on the protonation-deprotonation effect.

  12. The application of Firefly algorithm in an Adaptive Emergency Evacuation Centre Management (AEECM) for dynamic relocation of flood victims

    NASA Astrophysics Data System (ADS)

    ChePa, Noraziah; Hashim, Nor Laily; Yusof, Yuhanis; Hussain, Azham

    2016-08-01

    Flood evacuation centre is defined as a temporary location or area of people from disaster particularly flood as a rescue or precautionary measure. Gazetted evacuation centres are normally located at secure places which have small chances from being drowned by flood. However, due to extreme flood several evacuation centres in Kelantan were unexpectedly drowned. Currently, there is no study done on proposing a decision support aid to reallocate victims and resources of the evacuation centre when the situation getting worsens. Therefore, this study proposes a decision aid model to be utilized in realizing an adaptive emergency evacuation centre management system. This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre. The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council's respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.

  13. Multi-agent integrated password management (MIPM) application secured with encryption

    NASA Astrophysics Data System (ADS)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  14. Multi-trigger resist patterning with ASML NXE3300 EUV scanner

    NASA Astrophysics Data System (ADS)

    Vesters, Yannick; McClelland, Alexandra; De Simone, Danilo; Popescu, Carmen; Dawson, Guy; Roth, John; Theis, Wolfgang; Vandenberghe, Geert; Robinson, Alex P. G.

    2018-03-01

    Irresistible Materials (IM) is developing novel resist systems based on the multi-trigger concept, which incorporates a dose dependent quenching-like behaviour. The Multi Trigger Resist (MTR) is a negative tone crosslinking resist that does not need a post exposure bake (PEB), and during the past years, has been mainly tested using interference lithography at PSI. In this study, we present the results that have been obtained using MTR resists, performing EUV exposures on ASML NXE3300B EUV scanner at IMEC. We present the lithography performance of the MTR1 resist series in two formulations - a high-speed baseline, and a formulation designed to enhance the multi-trigger behaviour. Additionally, we present results for the MTR2 resist series, which has been designed for lower line edge roughness. The high-speed baseline resist (MTR1), showed 18 nm resolution at 20mJ/cm2. The MTR2 resist shows 16nm half pitch lines patterned with a dose of 38mJ/cm2, giving a LER of 3.7 nm. Performance across multiple process conditions are discussed. We performed etch rate measurement and the multi-trigger resist showed etch resistance equivalent or better than standard chemically amplified resist. This could compensate for the lower film thickness required to avoid pattern collapse at pitch 32nm.

  15. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP and with the use of Anonymizers we have covered the identity of true source of data. Modifier tokens are generated along encryption of data which are distributed among virtual parties, then sent to TTP and finally used in the computation. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have also given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved.

  16. Matching motivation enhancement treatment to client motivation: re-examining the Project MATCH motivation matching hypothesis.

    PubMed

    Witkiewitz, Katie; Hartzler, Bryan; Donovan, Dennis

    2010-08-01

    The current study was designed to re-examine the motivation matching hypothesis from Project MATCH using growth mixture modeling, an analytical technique that models variation in individual drinking patterns. Secondary data analyses of data from Project MATCH (n = 1726), a large multi-site alcoholism treatment-matching study. Percentage of drinking days was the primary outcome measure, assessed from 1 month to 12 months following treatment. Treatment assignment, alcohol dependence symptoms and baseline percentage of drinking days were included as covariates. The results provided support for the motivation matching hypothesis in the out-patient sample and among females in the aftercare sample: the majority of individuals with lower baseline motivation had better outcomes if assigned to motivation enhancement treatment (MET) compared to those assigned to cognitive behavioral treatment (CBT). In the aftercare sample there was a moderating effect of gender and alcohol dependence severity, whereby males with lower baseline motivation and greater alcohol dependence drank more frequently if assigned to MET compared to those assigned to CBT. Results from the current study lend partial support to the motivation-matching hypothesis and also demonstrated the importance of moderating influences on treatment matching effectiveness. Based upon these findings, individuals with low baseline motivation in out-patient settings and males with low levels of alcohol dependence or females in aftercare settings may benefit more from motivational enhancement techniques than from cognitive-behavioral techniques.

  17. A reassessment of soluble urokinase-type plasminogen activator receptor in glomerular disease

    PubMed Central

    Spinale, Joann M.; Mariani, Laura H.; Kapoor, Shiv; Zhang, Jidong; Weyant, Robert; Song, Peter X.; Wong, Hetty N.; Troost, Jonathan P.; Gadegbeku, Crystal A.; Gipson, Debbie S.; Kretzler, Matthias; Nihalani, Deepak; Holzman, Lawrence B.

    2014-01-01

    It has been suggested that soluble urokinase receptor (suPAR) is a causative circulating factor for and a biomarker of focal and segmental glomerulosclerosis (FSGS). Here we undertook validation of these assumptions in both mouse and human models. Injection of recombinant suPAR in wild-type mice did not induce proteinuria within 24 hours. Moreover, a disease phenotype was not seen in an inducible transgenic mouse model that maintained elevated suPAR concentrations for 6 weeks. Plasma and urine suPAR concentrations were evaluated as clinical biomarkers in 241 patients with glomerular disease from the prospective, longitudinal multi-center observational NEPTUNE cohort. The serum suPAR concentration at baseline inversely correlated with estimated glomerular filtration rate (eGFR) and the urine suPAR/creatinine ratio positively correlated with the urine protein/creatinine ratio. After adjusting for eGFR and urine protein, neither the serum nor urine suPAR level was an independent predictor of FSGS histopathology. A multivariable mixed-effects model of longitudinal data evaluated the association between the change in serum suPAR concentration from baseline with eGFR. After adjusting for baseline suPAR concentration, age, gender, proteinuria and time, the change in suPAR from baseline was associated with eGFR, but this association was not different for patients with FSGS as compared to other diagnoses. Thus, these results do not support a pathological role for suPAR in FSGS. PMID:25354239

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems,more » and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.« less

  19. A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security

    NASA Astrophysics Data System (ADS)

    Okamoto, Eiji

    Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.

  20. Secondhand Smoke Exposure and Smoke-free Policy in Philadelphia Public Housing.

    PubMed

    Klassen, Ann C; Lee, Nora L; Pankiewicz, Aaron; Ward, Rikki; Shuster, Michelle; Ogbenna, Bethany Townsend; Wade, Anita; Boamah, Maxwell; Osayameh, Olufunlayo; Rule, Ana M; Szymkowiak, Dorota; Coffman, Ryan; Bragg, Virginius; Mallya, Giridhar

    2017-04-01

    Multi-unit housing environments remain significant sources of secondhand smoke (SHS) exposure, especially for vulnerable populations in subsidized housing. In Philadelphia, the largest US housing authority to implement smoke-free policies, we measured baseline resident smoking-related behaviors and attitudes, and longitudinal exposures to airborne nicotine, during policy development and implementation. In 4 communities, we collected data in 2013, 2014, and 2016, before and after introduction of comprehensive smoke-free policies, interviewing persons in 172 households, and monitoring air-borne nicotine in non-smoking homes and public areas. Average nicotine level differences across years were estimated with multi-level models. Fifty-six percent of respondents smoked. Only 37% of households were smoke-free, with another 41% restricting smoking by area or time of day. The number of locations with detectable nicotine did not differ before and after policy implementation, with approximately 20% of non-smoking homes and 70%-80% of public areas having detectable nicotine. However, public area nicotine levels were lower in 2016, after policy implementation, than in 2013 and 2014 (-0.19 μg/m 3 , p = .03). Findings suggest that initial policy implementation was associated with reduced SHS exposure in Philadelphia. As HUD strengthens smoke-free policies, SHS monitoring can be useful to educate stakeholders and build support for policy enforcement.

  1. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing

    NASA Astrophysics Data System (ADS)

    Newe, Thomas; O'Connell, Eoin; Meere, Damien; Yuan, Hongwei; Leen, Gabriel; O'Keeffe, Sinead; Lewis, Elfed

    2016-05-01

    Recent advancements in cloud computing technologies in the context of optical and optical fibre based systems are reported. The proliferation of real time and multi-channel based sensor systems represents significant growth in data volume. This coupled with a growing need for security presents many challenges and presents a huge opportunity for an evolutionary step in the widespread application of these sensing technologies. A tiered infrastructural system approach is adopted that is designed to facilitate the delivery of Optical Fibre-based "SENsing as a Service- SENaaS". Within this infrastructure, novel optical sensing platforms, deployed within different environments, are interfaced with a Cloud-based backbone infrastructure which facilitates the secure collection, storage and analysis of real-time data. Feedback systems, which harness this data to affect a change within the monitored location/environment/condition, are also discussed. The cloud based system presented here can also be used with chemical and physical sensors that require real-time data analysis, processing and feedback.

  2. Meeting the privacy requirements for the development of a multi-centre patient registry in Canada: the Rick Hansen Spinal Cord Injury Registry.

    PubMed

    Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F

    2013-05-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.

  3. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    PubMed Central

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  4. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    NASA Astrophysics Data System (ADS)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  5. Programmable Multi-Chip Module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2005-05-24

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  6. Programmable Multi-Chip Module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-11-16

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  7. Programmable multi-chip module

    DOEpatents

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-03-02

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  8. Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention.

    PubMed

    Jacquez, Geoffrey M; Essex, Aleksander; Curtis, Andrew; Kohler, Betsy; Sherman, Recinda; Emam, Khaled El; Shi, Chen; Kaufmann, Andy; Beale, Linda; Cusick, Thomas; Goldberg, Daniel; Goovaerts, Pierre

    2017-07-01

    As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement of science by posing substantial obstacles to the sharing of data to validate research results, but they are obstacles to conducting certain research projects in the first place. Geospatial cryptography involves the specification, design, implementation and application of cryptographic techniques to address privacy, confidentiality and security concerns for geographically referenced data. This article defines geospatial cryptography and demonstrates its application in cancer control and surveillance. Four use cases are considered: (1) national-level de-duplication among state or province-based cancer registries; (2) sharing of confidential data across cancer registries to support case aggregation across administrative geographies; (3) secure data linkage; and (4) cancer cluster investigation and surveillance. A secure multi-party system for geospatial cryptography is developed. Solutions under geospatial cryptography are presented and computation time is calculated. As services provided by cancer registries to the research community, de-duplication, case aggregation across administrative geographies and secure data linkage are often time-consuming and in some instances precluded by confidentiality and security concerns. Geospatial cryptography provides secure solutions that hold significant promise for addressing these concerns and for accelerating the pace of research with human subjects data residing in our nation's cancer registries. Pursuit of the research directions posed herein conceivably would lead to a geospatially encrypted geographic information system (GEGIS) designed specifically to promote the sharing and spatial analysis of confidential data. Geospatial cryptography holds substantial promise for accelerating the pace of research with spatially referenced human subjects data.

  9. Next Generation Space Telescope Integrated Science Module Data System

    NASA Technical Reports Server (NTRS)

    Schnurr, Richard G.; Greenhouse, Matthew A.; Jurotich, Matthew M.; Whitley, Raymond; Kalinowski, Keith J.; Love, Bruce W.; Travis, Jeffrey W.; Long, Knox S.

    1999-01-01

    The Data system for the Next Generation Space Telescope (NGST) Integrated Science Module (ISIM) is the primary data interface between the spacecraft, telescope, and science instrument systems. This poster includes block diagrams of the ISIM data system and its components derived during the pre-phase A Yardstick feasibility study. The poster details the hardware and software components used to acquire and process science data for the Yardstick instrument compliment, and depicts the baseline external interfaces to science instruments and other systems. This baseline data system is a fully redundant, high performance computing system. Each redundant computer contains three 150 MHz power PC processors. All processors execute a commercially available real time multi-tasking operating system supporting, preemptive multi-tasking, file management and network interfaces. These six processors in the system are networked together. The spacecraft interface baseline is an extension of the network, which links the six processors. The final selection for Processor busses, processor chips, network interfaces, and high-speed data interfaces will be made during mid 2002.

  10. Security services negotiation through OAM cells

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LAURENT,MARYLINE; TARMAN,THOMAS D.

    As described in contribution AF99-0335, it is interesting that new security services and mechanisms are allowed to be negotiated during a connection in progress. To do that, new ''negotiation OAM cells'' dedicated to security should be defined, as well as some acknowledgment cells allowing negotiation OAM cells to be exchanged reliably. Remarks which were given at the New Orleans meeting regarding those cell formats are taken into account. This contribution presents some baseline text describing the format of the negotiation and acknowledgment cells, and the using of those cells. All the modifications brought to the specifications are reversible using themore » Word tools.« less

  11. [Spatial-temporal pattern and obstacle factors of cultivated land ecological security in major grain producing areas of northeast China: a case study in Jilin Province].

    PubMed

    Zhao, Hong-Bo; Ma, Yan-Ji

    2014-02-01

    According to the cultivated land ecological security in major grain production areas of Northeast China, this paper selected 48 counties of Jilin Province as the research object. Based on the PSR-EES conceptual framework model, an evaluation index system of cultivated land ecological security was built. By using the improved TOPSIS, Markov chains, GIS spatial analysis and obstacle degree models, the spatial-temporal pattern of cultivated land ecological security and the obstacle factors were analyzed from 1995 to 2011 in Jilin Province. The results indicated that, the composite index of cultivated land ecological security appeared in a rising trend in Jilin Province from 1995 to 2011, and the cultivated land ecological security level changed from being sensitive to being general. There was a pattern of 'Club Convergence' in cultivated land ecological security level in each county and the spatial discrepancy tended to become larger. The 'Polarization' trend of cultivated land ecological security level was obvious. The distributions of sensitive level and critical security level with ribbon patterns tended to be dispersed, the general security level and relative security levels concentrated, and the distributions of security level scattered. The unstable trend of cultivated land ecological security level was more and more obvious. The main obstacle factors that affected the cultivated land ecological security level in Jilin Province were rural net income per capita, economic density, the proportion of environmental protection investment in GDP, degree of machinery cultivation and the comprehensive utilization rate of industrial solid wastes.

  12. UNIX programmer`s environment and configuration control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arnold, T.R.; Wyatt, P.W.

    1993-12-31

    A package of UNIX utilities has been developed which unities the advantages of the public domain utility ``imake`` and a configuration control system. The ``imake`` utility is portable It allows a user to make Makefiles on a wide variety of platforms without worrying about the machine-dependent idiosyncracies of the UNIX utility ``make.`` Makefiles are a labor-saving device for compiling and linking complicated programs, and ``imake`` is a labor-saving device for making Makefiles, as well as other useful software (like a program`s internal dependencies on included files). This ``Environment,`` which has been developed around ``imake,`` allows a programmer to manage amore » complicated project consisting of multiple executables which may each link with multiple user-created libraries. The configuration control aspect consists of a directory hierarchy (a baseline) which is mirrored in a developer`s workspace. The workspace includes a minimum of files copied from the baseline; it employs soft links into the baseline wherever possible. The utilities are a multi-tiered suite of Bourne shells to copy or check out sources, check them back in, import new sources (sources which are not in the baseline) and link them appropriately, create new low-level directories and link them, compare with the baseline, update Makefiles with minimal effort, and handle dependencies. The directory hierarchy utilizes a single source repository, which is mirrored in the baseline and in a workspace for a several platform architectures. The system was originally written to support C code on Sun-4`s and RS6000`s. It has now been extended to support FORTRAN as well as C on SGI and Cray YMP platforms as well as Sun-4`s and RS6000`s.« less

  13. The OCA CCD Camera Controller

    DTIC Science & Technology

    1996-01-01

    multi CCD arrays for wide field telescopes with an array of 8x8 1K CCDs in use at Las Campanas Observatory in Chile . The same group is also involved...Verify key EPROM -292H VIH . VIH Program security bitl 1 29AH . VPP Program security’ bit 2 *. .298H -Vpp Verify security bits - 9HVIH ViI NOTE: 1...Pulsed from V.. to VIL and returned to VIH . EPROM PROGRAMMING AND VERIFICATION ..t= 21’C to-+27 ’rC:-VCC= 5V ±10%VS3 = OV. SYMBOL I .-- PARAMETER MIN MAX

  14. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  15. Household food security and adequacy of child diet in the food insecure region north in Ghana.

    PubMed

    Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B

    2017-01-01

    Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Using data from households and 6-23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID's Food and Nutrition Technical Assistance Project. Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research into factors besides household food security in the search for determinants of child diet adequacy. In this study at least, household food security was a very weak marker of child diet adequacy. This finding is of significance to public health practice, since it calls into question any assumption that having enough food in a household necessarily results in adequately fed children.

  16. Household food security and adequacy of child diet in the food insecure region north in Ghana

    PubMed Central

    Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B.

    2017-01-01

    Background and objectives Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Methods Using data from households and 6–23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID’s Food and Nutrition Technical Assistance Project. Results Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Conclusions Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research into factors besides household food security in the search for determinants of child diet adequacy. In this study at least, household food security was a very weak marker of child diet adequacy. This finding is of significance to public health practice, since it calls into question any assumption that having enough food in a household necessarily results in adequately fed children. PMID:28494024

  17. A Food Retail-Based Intervention on Food Security and Consumption

    PubMed Central

    Sadler, Richard C.; Gilliland, Jason A.; Arku, Godwin

    2013-01-01

    The effect of the built environment on diet (and ensuing health outcomes) is less understood than the effect of diet on obesity. Natural experiments are increasingly advocated in place of cross-sectional studies unable to suggest causality. The central research question of this paper, therefore, asks whether a neighborhood-level food retail intervention will affect dietary habits or food security. The intervention did not have a significant impact on fruit and vegetable consumption, and the intervention population actually purchased prepared meals more frequently. More problematic, only 8% of respondents overall regularly consumed enough fruits and vegetables, and 34% were food insecure. Further complicating this public health issue, the new grocery store closed after 17 months of operation. Results indicate that geographic access to food is only one element of malnutrition, and that multi-pronged dietary interventions may be more effective. The economic failure of the store also suggests the importance of non-retail interventions to combat malnutrition. PMID:23921626

  18. Fourier-Mellin moment-based intertwining map for image encryption

    NASA Astrophysics Data System (ADS)

    Kaur, Manjit; Kumar, Vijay

    2018-03-01

    In this paper, a robust image encryption technique that utilizes Fourier-Mellin moments and intertwining logistic map is proposed. Fourier-Mellin moment-based intertwining logistic map has been designed to overcome the issue of low sensitivity of an input image. Multi-objective Non-Dominated Sorting Genetic Algorithm (NSGA-II) based on Reinforcement Learning (MNSGA-RL) has been used to optimize the required parameters of intertwining logistic map. Fourier-Mellin moments are used to make the secret keys more secure. Thereafter, permutation and diffusion operations are carried out on input image using secret keys. The performance of proposed image encryption technique has been evaluated on five well-known benchmark images and also compared with seven well-known existing encryption techniques. The experimental results reveal that the proposed technique outperforms others in terms of entropy, correlation analysis, a unified average changing intensity and the number of changing pixel rate. The simulation results reveal that the proposed technique provides high level of security and robustness against various types of attacks.

  19. Can trainees design and deliver a national audit of epistaxis management? A pilot of a secure web-based audit tool and research trainee collaboratives.

    PubMed

    Mehta, N; Williams, R J; Smith, M E; Hall, A; Hardman, J C; Cheung, L; Ellis, M P; Fussey, J M; Lakhani, R; McLaren, O; Nankivell, P C; Sharma, N; Yeung, W; Carrie, S; Hopkins, C

    2017-06-01

    To investigate the feasibility of a national audit of epistaxis management led and delivered by a multi-region trainee collaborative using a web-based interface to capture patient data. Six trainee collaboratives across England nominated one site each and worked together to carry out this pilot. An encrypted data capture tool was adapted and installed within the infrastructure of a university secure server. Site-lead feedback was assessed through questionnaires. Sixty-three patients with epistaxis were admitted over a two-week period. Site leads reported an average of 5 minutes to complete questionnaires and described the tool as easy to use. Data quality was high, with little missing data. Site-lead feedback showed high satisfaction ratings for the project (mean, 4.83 out of 5). This pilot showed that trainee collaboratives can work together to deliver an audit using an encrypted data capture tool cost-effectively, whilst maintaining the highest levels of data quality.

  20. EPA's Sustainable Port Communities: Anticipating Changes in ...

    EPA Pesticide Factsheets

    Port Communities Face Many Challenges: • Climate change – Sea Level Rise, Extreme Events: “Assets” become Vulnerabilities; Nuisance flooding; Changes in waste water and stormwater capacity; Changes in near-shore ecology and water quality • Port Expansion: Increasing multi-modal cargo transport, bigger ships; Energy use, transport; Invasive species; Homeland security; Increased development pressure (land use); Population growth • EJ Communities: Hazardous waste, cargo; Changes in emissions (amount, type, distribution) Changes in demographics, real estate values Disproportionately impacted by climate change • Competing Economic Interests Tourism and historical resources Protection of ecosystem services To make other federal agencies involved in resilience research aware of our study and to solicit collaboration.

Top