Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures
ERIC Educational Resources Information Center
Balas, Janet
2005-01-01
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2014 CFR
2014-07-01
... technology and blast standards. Immediate review of ongoing projects may generate savings in the... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2013 CFR
2013-07-01
... construction projects should be reviewed if possible, to incorporate current technology and blast standards... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2012 CFR
2012-07-01
... technology and blast standards. Immediate review of ongoing projects may generate savings in the... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
Joint the Center for Applied Scientific Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gamblin, Todd; Bremer, Timo; Van Essen, Brian
The Center for Applied Scientific Computing serves as Livermore Lab’s window to the broader computer science, computational physics, applied mathematics, and data science research communities. In collaboration with academic, industrial, and other government laboratory partners, we conduct world-class scientific research and development on problems critical to national security. CASC applies the power of high-performance computing and the efficiency of modern computational methods to the realms of stockpile stewardship, cyber and energy security, and knowledge discovery for intelligence applications.
Embossing of optical document security devices
NASA Astrophysics Data System (ADS)
Muke, Sani
2004-06-01
Embossing in the transparent window area of polymer banknotes, such as those seen on the Australian, New Zealand and Romanian currencies, have enormous potential for the development of novel optical security devices. The intaglio printing process can provide an efficient means for embossing of optical security structures such as micro lenses. Embossed micro lens arrays in the transparent window of a polymer banknote can be folded over a corresponding printed image array elsewhere on the note to reveal a series of moire magnified images. Analysis of samples of embossed micro lenses showed that the engraving side and impression side had a similar embossed profile. The embossed micro lens profiles were modelled using Optalix-LX commercial optical ray tracing software in order to determine the focal length of the lenses and compare with the focal length of desired embossed lenses. A fundamental understanding of how the polymer deforms during the embossing process is critical towards developing a micro lens embossing tool which can achieve the desired embossed micro lenses. This work also looks at extending the early research of the Intaglio Research Group (IRG) to better understand the embossibility of polymer substrates such as biaxially oriented polypropylene (BOPP).
Northwest side view showing 3 windows and security light ...
Northwest side view showing 3 windows and security light - U.S. Naval Base, Pearl Harbor, Naval Hospital, Animal House, Near intersection of Hospital Way & Third Street, Pearl City, Honolulu County, HI
Layered virus protection for the operations and administrative messaging system
NASA Technical Reports Server (NTRS)
Cortez, R. H.
2002-01-01
NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
Code of Federal Regulations, 2011 CFR
2011-10-01
... involving the security of overseas posts. The DOSESPP includes a wide range of elements of both physical and... security upgrade. This includes installation of forced entry/ballistic resistant (FE/BR) windows and doors...) Forced entry/ballistic resistant (FE/BR) components. This includes doors, windows, and related facilities...
WinSCP for Windows File Transfers | High-Performance Computing | NREL
WinSCP for Windows File Transfers WinSCP for Windows File Transfers WinSCP for can used to securely transfer files between your local computer running Microsoft Windows and a remote computer running Linux
Wells, Jonathan C K
2014-08-05
Developmental plasticity underlies widespread associations between early-life exposures and many components of adult phenotype, including the risk of chronic diseases. Humans take almost two decades to reach reproductive maturity, and yet the 'critical windows' of physiological sensitivity that confer developmental plasticity tend to close during fetal life or infancy. While several explanations for lengthy human maturation have been offered, the brevity of physiological plasticity has received less attention. I argue that offspring plasticity is only viable within the niche of maternal care, and that as this protection is withdrawn, the offspring is obliged to canalize many developmental traits in order to minimize environmental disruptions. The schedule of maternal care may therefore shape the duration of critical windows, and since the duration of this care is subject to parent-offspring conflict, the resolution of this conflict may shape the duration of critical windows. This perspective may help understand (i) why windows close at different times for different traits, and (ii) why the duration of critical windows may vary across human populations. The issue is explored in relation to population differences in the association between infant weight gain and later body composition. The occupation of more stable environments by western populations may have favoured earlier closure of the critical window during which growth in lean mass is sensitive to nutritional intake. This may paradoxically have elevated the risk of obesity following rapid infant weight gain in such populations. © The Author(s) 2014. Published by Oxford University Press on behalf of the Foundation for Evolution, Medicine, and Public Health.
Resource Sharing in a Network of Personal Computers.
1982-12-01
magnetic card, or a more secure identifier such as a machine-read fingerprint or voiceprint. Security and Protection 57 (3) (R, key) (5) (RB’ B, key) (B...operations are invoked via messages, a program and its terminal can easily be located on separate machines. In Spice, an interface process called Canvas ...request of a process. In Canvas , a process can only subdivide windows that it already has. On the other hand, the window manager treats the screen as a
2009-06-10
CAPE CANAVERAL, Fla. – Workers at NASA's Kennedy Space Center in Florida secure a new window on the Firing Room in the Launch Control Center. New, hurricane-rated window systems for the four Firing Rooms and the vestibule areas between Firing Rooms 1 & 2 and Firing Rooms 3 & 4 are being installed. In order to avoid operational impacts the new windows are being installed on the outside of the existing windows, enclosing the space formerly occupied by the louvers. The old windows will remain in place until the new windows are completely installed and leak tested. This approach will continue to keep the firing rooms from being exposed to the elements. Photo credit: NASA/Jack Pfaller
JPARSS: A Java Parallel Network Package for Grid Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Jie; Akers, Walter; Chen, Ying
2002-03-01
The emergence of high speed wide area networks makes grid computinga reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve bandwidth and to reduce latency on a high speed wide area network. This paper presents a Java package called JPARSS (Java Parallel Secure Stream (Socket)) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a grid environment without the necessity of tuning TCP window size.more » This package enables single sign-on, certificate delegation and secure or plain-text data transfer using several security components based on X.509 certificate and SSL. Several experiments will be presented to show that using Java parallelstreams is more effective than tuning TCP window size. In addition a simple architecture using Web services« less
Adaptive variability in the duration of critical windows of plasticity
Wells, Jonathan C. K.
2014-01-01
Developmental plasticity underlies widespread associations between early-life exposures and many components of adult phenotype, including the risk of chronic diseases. Humans take almost two decades to reach reproductive maturity, and yet the ‘critical windows’ of physiological sensitivity that confer developmental plasticity tend to close during fetal life or infancy. While several explanations for lengthy human maturation have been offered, the brevity of physiological plasticity has received less attention. I argue that offspring plasticity is only viable within the niche of maternal care, and that as this protection is withdrawn, the offspring is obliged to canalize many developmental traits in order to minimize environmental disruptions. The schedule of maternal care may therefore shape the duration of critical windows, and since the duration of this care is subject to parent–offspring conflict, the resolution of this conflict may shape the duration of critical windows. This perspective may help understand (i) why windows close at different times for different traits, and (ii) why the duration of critical windows may vary across human populations. The issue is explored in relation to population differences in the association between infant weight gain and later body composition. The occupation of more stable environments by western populations may have favoured earlier closure of the critical window during which growth in lean mass is sensitive to nutritional intake. This may paradoxically have elevated the risk of obesity following rapid infant weight gain in such populations. PMID:25095791
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Strength. 127.420 Section 127.420 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS CONSTRUCTION AND ARRANGEMENTS Construction of Windows, Visibility, and Operability of Coverings § 127.420 Strength. Each window or porthole...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Strength. 127.420 Section 127.420 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS CONSTRUCTION AND ARRANGEMENTS Construction of Windows, Visibility, and Operability of Coverings § 127.420 Strength. Each window or porthole...
Warren, Joshua L; Son, Ji-Young; Pereira, Gavin; Leaderer, Brian P; Bell, Michelle L
2018-05-01
Identifying periods of increased vulnerability to air pollution during pregnancy with respect to the development of adverse birth outcomes can improve understanding of possible mechanisms of disease development and provide guidelines for protection of the child. Exposure to air pollution during pregnancy is typically based on the mother's residence at delivery, potentially resulting in exposure misclassification and biasing the estimation of critical windows of pregnancy. In this study, we determined the impact of maternal residential mobility during pregnancy on defining weekly exposure to particulate matter less than or equal to 10 μm in aerodynamic diameter (PM10) and estimating windows of susceptibility to term low birth weight. We utilized data sets from 4 Connecticut birth cohorts (1988-2008) that included information on all residential addresses between conception and delivery for each woman. We designed a simulation study to investigate the impact of increasing levels of mobility on identification of critical windows. Increased PM10 exposure during pregnancy weeks 16-18 was associated with an increased probability of term low birth weight. Ignoring residential mobility when defining weekly exposure had only a minor impact on the identification of critical windows for PM10 and term low birth weight in the data application and simulation study. Identification of critical pregnancy windows was robust to exposure misclassification caused by ignoring residential mobility in these Connecticut birth cohorts.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yun, Geun Young; Steemers, Koen
2010-07-15
This paper investigates occupant behaviour of window-use in night-time naturally ventilated offices on the basis of a pilot field study, conducted during the summers of 2006 and 2007 in Cambridge, UK, and then demonstrates the effects of employing night-time ventilation on indoor thermal conditions using predictive models of occupant window-use. A longitudinal field study shows that occupants make good use of night-time natural ventilation strategies when provided with openings that allow secure ventilation, and that there is a noticeable time of day effect in window-use patterns (i.e. increased probability of action on arrival and departure). We develop logistic models ofmore » window-use for night-time naturally ventilated offices, which are subsequently applied to a behaviour algorithm, including Markov chains and Monte Carlo methods. The simulations using the behaviour algorithm demonstrate a good agreement with the observational data of window-use, and reveal how building design and occupant behaviour collectively affect the thermal performance of offices. They illustrate that the provision of secure ventilation leads to more frequent use of the window, and thus contributes significantly to the achievement of a comfortable indoor environment during the daytime occupied period. For example, the maximum temperature for a night-time ventilated office is found to be 3 C below the predicted value for a daytime-only ventilated office. (author)« less
Independent Orbiter Assessment (IOA): Analysis of the purge, vent and drain subsystem
NASA Technical Reports Server (NTRS)
Bynum, M. C., III
1987-01-01
The results of the Independent Orbiter Assessment (IOA) of the Failure Modes and Effects Analysis (FMEA) and Critical Items List (CIL) are presented. The IOA approach features a top-down analysis of the hardware to determine failure modes, criticality, and potential critical items. To preserve independence, this analysis was accomplished without reliance upon the results contained within the NASA FMEA/CIL documentation. This report documents the independent analysis results corresponding to the Orbiter PV and D (Purge, Vent and Drain) Subsystem hardware. The PV and D Subsystem controls the environment of unpressurized compartments and window cavities, senses hazardous gases, and purges Orbiter/ET Disconnect. The subsystem is divided into six systems: Purge System (controls the environment of unpressurized structural compartments); Vent System (controls the pressure of unpressurized compartments); Drain System (removes water from unpressurized compartments); Hazardous Gas Detection System (HGDS) (monitors hazardous gas concentrations); Window Cavity Conditioning System (WCCS) (maintains clear windows and provides pressure control of the window cavities); and External Tank/Orbiter Disconnect Purge System (prevents cryo-pumping/icing of disconnect hardware). Each level of hardware was evaluated and analyzed for possible failure modes and effects. Criticality was assigned based upon the severity of the effect for each failure mode. Four of the sixty-two failure modes analyzed were determined as single failures which could result in the loss of crew or vehicle. A possible loss of mission could result if any of twelve single failures occurred. Two of the criticality 1/1 failures are in the Window Cavity Conditioning System (WCCS) outer window cavity, where leakage and/or restricted flow will cause failure to depressurize/repressurize the window cavity. Two criticality 1/1 failures represent leakage and/or restricted flow in the Orbiter/ET disconnect purge network which prevent cryopumping/icing of disconnect hardware. Each level of hardware was evaluated and analyzed for possible failure modes and effects. Criticality was assigned based upon the severity of the effect for each failure mode.
Total Library Computerization for Windows.
ERIC Educational Resources Information Center
Combs, Joseph, Jr.
1999-01-01
Presents a general review of features of version 2.1 of Total Library Computerization (TLC) for Windows from On Point, Inc. Includes information about pricing, hardware and operating systems, modules/functions available, user interface, security, on-line catalog functions, circulation, cataloging, and documentation and online help. A table…
CRITICAL WINDOWS FOR REPRODUCTIVE HEALTH IN CHILDREN AND ADOLESCENTS
This workgroup report addresses the central question: what are the critical windows during development (pre-conception through puberty) when exposure to xenobiotics may have the greatest adverse impact on subsequent reproductive health. The reproductive system develops in stages...
A Summary of the Evaluation of PPG Herculite XP Glass in Punched Window and Storefront Assemblies
2013-01-01
frames for all IGU windows extruded from existing dies. The glazing was secured to the frame on all four sides with a 1/2-in bead width of DOW 995...lite and non-laminated IGU debris tests. A wood frame with a 4-in wide slit was placed behind the window to transform the debris cloud into a narrow...speed camera DIC Set-up laser deflection gauge shock tube window wood frame with slit high speed camerawell lit backdrop Debris Tracking Set-up laser
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Strength. 177.1020 Section 177.1020 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Window Construction and Visibility § 177.1020 Strength. Each window, port hole, and its means of...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Strength. 177.1020 Section 177.1020 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Window Construction and Visibility § 177.1020 Strength. Each window, port hole, and its means of...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Strength. 177.1020 Section 177.1020 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Window Construction and Visibility § 177.1020 Strength. Each window, port hole, and its means of...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Strength. 177.1020 Section 177.1020 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Window Construction and Visibility § 177.1020 Strength. Each window, port hole, and its means of...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Strength. 177.1020 Section 177.1020 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) CONSTRUCTION AND ARRANGEMENT Window Construction and Visibility § 177.1020 Strength. Each window, port hole, and its means of...
A Trusted Path Design and Implementation for Security Enhanced Linux
2004-09-01
functionality by a member of the team? Witten, et al., [21] provides an excellent discussion of some aspects of the subject. Ultimately, open vs ...terminal window is a program like gnome - terminal that provides a TTY-like environment as a window inside an X Windows session. The phrase computer...Editors selected No sound or video No graphics Check all development boxes except KDE Administrative tools System tools No printing support
Tate, Kevin B; Kohl, Zachary F; Eme, John; Rhen, Turk; Crossley, Dane A
2015-01-01
Environmental conditions fluctuate dramatically in some reptilian nests. However, critical windows of environmental sensitivity for cardiovascular development have not been identified. Continuous developmental hypoxia has been shown to alter cardiovascular form and function in embryonic snapping turtles (Chelydra serpentina), and we used this species to identify critical periods during which hypoxia modifies the cardiovascular phenotype. We hypothesized that incubation in 10% O2 during specific developmental periods would have differential effects on the cardiovascular system versus overall somatic growth. Two critical windows were identified with 10% O2 from 50% to 70% of incubation, resulting in relative heart enlargement, either via preservation of or preferential growth of this tissue, while exposure to 10% O2 from 20% to 70% of incubation resulted in a reduction in arterial pressure. The deleterious or advantageous aspects of these embryonic phenotypes in posthatching snapping turtles have yet to be explored. However, identification of these critical windows has provided insight into how the developmental environment alters the phenotype of reptiles and will also be pivotal in understanding its impact on the fitness of egg-laying reptiles.
Secure video communications system
Smith, Robert L.
1991-01-01
A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.
Gopalakrishnan, Kalpana; Teitelbaum, Susan L; Lambertini, Luca; Wetmur, James; Manservisi, Fabiana; Falcioni, Laura; Panzacchi, Simona; Belpoggi, Fiorella; Chen, Jia
2017-01-01
Exposure to environmental chemicals has been linked to altered mammary development and cancer risk at high doses using animal models. Effects at low doses comparable to human exposure remain poorly understood, especially during critical developmental windows. We investigated the effects of two environmental phenols commonly used in personal care products - methyl paraben (MPB) and triclosan (TCS) - on the histology and transcriptome of normal mammary glands at low doses mimicking human exposure during critical windows of development. Sprague-Dawley rats were exposed during perinatal, prepubertal and pubertal windows, as well as from birth to lactation. Low-dose exposure to MPB and TCS induced measurable changes in both mammary histology (by Masson's Trichrome Stain) and transcriptome (by microarrays) in a window-specific fashion. Puberty represented a window of heightened sensitivity to MPB, with increased glandular tissue and changes of expression in 295 genes with significant enrichment in functions such as DNA replication and cell cycle regulation. Long-term exposure to TCS from birth to lactation was associated with increased adipose and reduced glandular and secretory tissue, with expression alterations in 993 genes enriched in pathways such as cholesterol synthesis and adipogenesis. Finally, enrichment analyses revealed that genes modified by MPB and TCS were over-represented in human breast cancer gene signatures, suggesting possible links with breast carcinogenesis. These findings highlight the issues of critical windows of susceptibility that may confer heightened sensitivity to environmental insults and implicate the potential health effects of these ubiquitous environmental chemicals in breast cancer. Copyright © 2016 Elsevier Inc. All rights reserved.
Gopalakrishnan, Kalpana; Teitelbaum, Susan L.; Lambertini, Luca; Wetmur, James; Manservisi, Fabiana; Falcioni, Laura; Panzacchi, Simona; Belpoggi, Fiorella; Chen, Jia
2016-01-01
Exposure to environmental chemicals has been linked to altered mammary development and cancer risk at high doses using animal models. Effects at low doses comparable to human exposure remain poorly understood, especially during critical developmental windows. We investigated the effects of two environmental phenols commonly used in personal care products – methyl paraben (MPB) and triclosan (TCS) – on the histology and transcriptome of normal mammary glands at low doses mimicking human exposure during critical windows of development. Sprague-Dawley rats were exposed during perinatal, prepubertal and pubertal windows, as well as from birth to lactation. Low-dose exposure to MPB and TCS induced measurable changes in both mammary histology (by Masson’s Trichrome Stain) and transcriptome (by microarrays) in a window-specific fashion. Puberty represented a window of heightened sensitivity to MPB, with increased glandular tissue and changes of expression in 295 genes with significant enrichment in functions such as DNA replication and cell cycle regulation. Long-term exposure to TCS from birth to lactation was associated with increased adipose and reduced glandular and secretory tissue, with expression alterations in 993 genes enriched in pathways such as cholesterol synthesis and adipogenesis. Finally, enrichment analyses revealed that genes modified by MPB and TCS were over-represented in human breast cancer gene signatures, suggesting possible links with breast carcinogenesis. These findings highlight the issues of critical windows of susceptibility that may confer heightened sensitivity to environmental insults and implicate the potential health effects of these ubiquitous environmental chemicals in breast cancer. PMID:27810681
NASA Technical Reports Server (NTRS)
Ko, William L.; Gong, Leslie
2000-01-01
To visually record the initial free flight event of the Hyper-X research flight vehicle immediately after separation from the Pegasus(registered) booster rocket, a video camera was mounted on the bulkhead of the adapter through which Hyper-X rides on Pegasus. The video camera was shielded by a protecting camera window made of heat-resistant quartz material. When Hyper-X separates from Pegasus, this camera window will be suddenly exposed to Mach 7 stagnation thermal shock and dynamic pressure loading (aerothermal loading). To examine the structural integrity, thermoelastic analysis was performed, and the stress distributions in the camera windows were calculated. The critical stress point where the tensile stress reaches a maximum value for each camera window was identified, and the maximum tensile stress level at that critical point was found to be considerably lower than the tensile failure stress of the camera window material.
This workgroup report addresses the central question: what are the critical windows during development (pre-conception through puberty) when exposure to xenobiotics may have the greatest adverse impact on subsequent reproductive health. The reproductive system develops in stages...
Continuation of research in software for space operations support
NASA Technical Reports Server (NTRS)
Collier, Mark D.
1989-01-01
Software technologies relevant to workstation executives are discussed. Evaluations of problems, potential or otherwise, seen with IBM's Workstation Executive (WEX) 2.5 preliminary design and applicable portions of the 2.5 critical design are presented. Diverse graphics requirements of the Johnson Space Center's Mission Control Center Upgrade (MCCU) are also discussed. The key is to use tools that are portable, compatible with the X window system, and best suited to the requirements of the associated application. This will include a User Interface Language (UIL), an interactive display builder, and a graphic plotting/modeling system. Work sheets are provided for POSIX 1003.4 real-time extensions and the requirements for the Center's automated information systems security plan, referred to as POSIX 1003.6, are discussed.
Potential for Bias When Estimating Critical Windows for Air Pollution in Children's Health.
Wilson, Ander; Chiu, Yueh-Hsiu Mathilda; Hsu, Hsiao-Hsien Leon; Wright, Robert O; Wright, Rosalind J; Coull, Brent A
2017-12-01
Evidence supports an association between maternal exposure to air pollution during pregnancy and children's health outcomes. Recent interest has focused on identifying critical windows of vulnerability. An analysis based on a distributed lag model (DLM) can yield estimates of a critical window that are different from those from an analysis that regresses the outcome on each of the 3 trimester-average exposures (TAEs). Using a simulation study, we assessed bias in estimates of critical windows obtained using 3 regression approaches: 1) 3 separate models to estimate the association with each of the 3 TAEs; 2) a single model to jointly estimate the association between the outcome and all 3 TAEs; and 3) a DLM. We used weekly fine-particulate-matter exposure data for 238 births in a birth cohort in and around Boston, Massachusetts, and a simulated outcome and time-varying exposure effect. Estimates using separate models for each TAE were biased and identified incorrect windows. This bias arose from seasonal trends in particulate matter that induced correlation between TAEs. Including all TAEs in a single model reduced bias. DLM produced unbiased estimates and added flexibility to identify windows. Analysis of body mass index z score and fat mass in the same cohort highlighted inconsistent estimates from the 3 methods. © The Author(s) 2017. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Warren, Joshua; Fuentes, Montserrat; Herring, Amy; Langlois, Peter
2012-12-01
Exposure to high levels of air pollution during the pregnancy is associated with increased probability of preterm birth (PTB), a major cause of infant morbidity and mortality. New statistical methodology is required to specifically determine when a particular pollutant impacts the PTB outcome, to determine the role of different pollutants, and to characterize the spatial variability in these results. We develop a new Bayesian spatial model for PTB which identifies susceptible windows throughout the pregnancy jointly for multiple pollutants (PM(2.5) , ozone) while allowing these windows to vary continuously across space and time. We geo-code vital record birth data from Texas (2002-2004) and link them with standard pollution monitoring data and a newly introduced EPA product of calibrated air pollution model output. We apply the fully spatial model to a region of 13 counties in eastern Texas consisting of highly urban as well as rural areas. Our results indicate significant signal in the first two trimesters of pregnancy with different pollutants leading to different critical windows. Introducing the spatial aspect uncovers critical windows previously unidentified when space is ignored. A proper inference procedure is introduced to correctly analyze these windows. © 2012, The International Biometric Society.
Design and Verification of Critical Pressurised Windows for Manned Spaceflight
NASA Astrophysics Data System (ADS)
Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.
2014-06-01
The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.
Overview of Fabrication Techniques and Lessons Learned with Accelerator Vacuum Windows
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ader, C. R.; McGee, M. W.; Nobrega, L. E.
Vacuum thin windows have been used in Fermilab's accelerators for decades and typically have been overlooked in terms of their criticality and fragility. Vacuum windows allow beam to pass through while creating a boundary between vacuum and air or high vacuum and low vacuum areas. The design of vacuum windows, including Titanium and Beryllium windows, will be discussed as well as fabrication, testing, and operational concerns. Failure of windows will be reviewed as well as safety approaches to mitigating failures and extending the lifetimes of vacuum windows. Various methods of calculating the strengths of vacuum windows will be explored, includingmore » FEA.« less
Angle-Beam Shear Wave Scattering from Buried Crack-like Defects in Bonded Specimens (Postprint)
2017-02-01
wavenumber filtering and spatial windowing is proposed and implemented as an alternative approach to quantify scattering from damage. 15. SUBJECT...TERMS Backscattering . Ultrasonography . Spatial filtering . Ultrasonic scattering . Scattering measurement 16. SECURITY CLASSIFICATION OF: 17...of frequency- wavenumber filtering and spatial windowing is proposed and implemented as an alternative approach to quantify scattering from damage
Fiber optic sensor based on Mach-Zehnder interferometer for securing entrance areas of buildings
NASA Astrophysics Data System (ADS)
Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Mec, Pavel; Novak, Martin; Bednarek, Lukas; Vasinek, Vladimir
2017-10-01
Authors of this article focused on the utilization of fiber optic sensors based on interferometric measurements for securing entrance areas of buildings such as windows and doors. We described the implementation of the fiber-optic interferometer (type Mach-Zehnder) into the window frame or door, sensor sensitivity, analysis of the background noise and methods of signal evaluation. The advantage of presented solution is the use of standard telecommunication fiber standard G.652.D, high sensitivity, immunity of sensor to electromagnetic interference (EMI) and passivity of the sensor regarding power supply. Authors implemented the Graphical User Interface (GUI) which offers the possibility of remote monitoring presented sensing solution.
Windows of Opportunity: East Timor and Australian Strategic Decision Making (1975-1999)
2014-06-01
could not be further from the truth. Australia has always been consistent, adjusting its foreign policy to take advantage of shifting international ... International Security. Cambridge; New York: Cambridge University Press, 2003. Carey, P. B. R, and G. Carter Bentley. East Timor at the Crossroads: The...DISTRIBUTION A. Approved for public release: distribution unlimited. WINDOWS OF OPPORTUNITY: EAST TIMOR AND AUSTRALIAN STRATEGIC DECISION
2016-09-01
is a Windows Presentation Foundation (WPF) control developed using the .NET framework in Microsoft Visual Studio. As a WPF control, it can be used in...any WPF application as a graphical visual element. The purpose of the control is to visually display time-related events as vertical lines on a...available on the control. 15. SUBJECT TERMS Windows Presentation Foundation, WPF, control, C#, .NET framework, Microsoft Visual Studio 16. SECURITY
A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools
2015-07-14
computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network
2009-03-01
the Distrustful Decomposition pattern: • a number of separate programs, each running in a separate process . For more complete sepa- ration, each...be used in place of fork(). For example, under various versions of Windows, the CreateProcess() func- tion is used to spawn a child process . Figure...list contains the SIDs of the client processes that are allowed to connect to the server, that is, the Windows service. For more information about
ERIC Educational Resources Information Center
Kennedy, Mike
2003-01-01
Offers ten suggestions for schools and universities to maximize their budgets: energy upgrades, security technology, maintenance management systems, partnerships, modernized washrooms, windows, facilities assessment, outsourcing, alternative fuels, and building commissioning. (EV)
[Level of microwave radiation from mobile phone base stations built in residential districts].
Hu, Ji; Lu, Yiyang; Zhang, Huacheng; Xie, Hebing; Yang, Xinwen
2009-11-01
To investigate the condition of microwave radiation pollution from mobile phone base station built in populated area. Random selected 18 residential districts where had base station and 10 residential districts where had no base stations. A TES-92 electromagnetic radiation monitor were used to measure the intensity of microwave radiation in external and internal living environment. The intensities of microwave radiation in the exposure residential districts were more higher than those of the control residential districts (p < 0.05). There was a intensity peak at about 10 m from the station, it would gradually weaken with the increase of the distance. The level of microwave radiation in antenna main lobe region is not certainly more higher than the side lobe direction, and the side lobe direction also is not more lower. At the same district, where there were two base stations, the electromagnetic field nestification would take place in someplace. The intensities of microwave radiation outside the exposure windows in the resident room not only changed with distance but also with the height of the floor. The intensities of microwave radiation inside the aluminum alloys security net were more lower than those of outside the aluminum alloys security net (p < 0.05), but the inside or outside of glass-window appears almost no change (p > 0.05). Although all the measure dates on the ground around the base station could be below the primary standard in "environment electromagnetic wave hygienic standard" (GB9175-88), there were still a minorities of windows which exposed to the base station were higher, and the outside or inside of a few window was even higher beyond the primary safe level defined standard. The aluminum alloys security net can partly shield the microwave radiation from the mobile phone base station.
Utilization of A PBPK model to predict the distribution of 2,3,7,8-Tetrachlorodibenzo-p-dioxin (TCDD) in humans during critical windows of development.
C Emond1, MJ DeVito2 and LS Birnbaum2
1National Research Council, US EPA, ORD, NHEERL, (ETD, PK), RTP, NC, 27711, USA 2 US...
Solar radiation control using nematic curvilinear aligned phase (NCAP) liquid crystal technology
NASA Astrophysics Data System (ADS)
vanKonynenburg, Peter; Marsland, Stephen; McCoy, James
1987-11-01
A new, advanced liquid crystal technology has made economical, large area, electrically-controlled windows a commercial reality. The new technology, Nematic Curvilinear Aligned Phase (NCAP), is based on a polymeric material containing small droplets of nematic liquid crystal which is coated and laminated between transparent electrodes and fabricated into large area field effect devices. NCAP windows feature variable solar transmission and reflection through a voltage-controlled scattering mechanism. Laminated window constructions provide the excellent transmission and visibility of glass in the powered condition. In the unpowered condition, the windows are highly translucent, and provide 1) blocked vision for privacy, security, and obscuration of information, and 2) glare control and solar shading. The stability is excellent during accelerated aging tests. Degradation mechanisms which can limit performance and lifetime are discussed. Maximum long term stability is achieved by product designs that incorporate the appropriate window materials to provide environmental protection.
Kirschman, Lucas J; Crespi, Erica J; Warne, Robin W
2018-01-01
Ubiquitous environmental stressors are often thought to alter animal susceptibility to pathogens and contribute to disease emergence. However, duration of exposure to a stressor is likely critical, because while chronic stress is often immunosuppressive, acute stress can temporarily enhance immune function. Furthermore, host susceptibility to stress and disease often varies with ontogeny; increasing during critical developmental windows. How the duration and timing of exposure to stressors interact to shape critical windows and influence disease processes is not well tested. We used ranavirus and larval amphibians as a model system to investigate how physiological stress and pathogenic infection shape development and disease dynamics in vertebrates. Based on a resource allocation model, we designed experiments to test how exposure to stressors may induce resource trade-offs that shape critical windows and disease processes because the neuroendocrine stress axis coordinates developmental remodelling, immune function and energy allocation in larval amphibians. We used wood frog larvae (Lithobates sylvaticus) to investigate how chronic and acute exposure to corticosterone, the dominant amphibian glucocorticoid hormone, mediates development and immune function via splenocyte immunohistochemistry analysis in association with ranavirus infection. Corticosterone treatments affected immune function, as both chronic and acute exposure suppressed splenocyte proliferation, although viral replication rate increased only in the chronic corticosterone treatment. Time to metamorphosis and survival depended on both corticosterone treatment and infection status. In the control and chronic corticosterone treatments, ranavirus infection decreased survival and delayed metamorphosis, although chronic corticosterone exposure accelerated rate of metamorphosis in uninfected larvae. Acute corticosterone exposure accelerated metamorphosis increased survival in infected larvae. Interactions between stress exposure (via glucocorticoid actions) and infection impose resource trade-offs that shape optimal allocation between development and somatic function. As a result, critical disease windows are likely shaped by stress exposure because any conditions that induce changes in differentiation rates will alter the duration and susceptibility of organisms to stressors or disease. © 2017 The Authors. Journal of Animal Ecology © 2017 British Ecological Society.
Apparatus for testing high pressure injector elements
NASA Technical Reports Server (NTRS)
Myers, William Neill (Inventor); Scott, Ewell M. (Inventor); Forbes, John C. (Inventor); Shadoan, Michael D. (Inventor)
1995-01-01
An apparatus for testing and evaluating the spray pattern of high pressure fuel injector elements for use in supplying fuel to combustion engines is presented. Prior art fuel injector elements were normally tested by use of low pressure apparatuses which did not provide a purge to prevent mist from obscuring the injector element or to prevent frosting of the view windows; could utilize only one fluid during each test; and had their viewing ports positioned one hundred eighty (180 deg) apart, thus preventing optimum use of laser diagnostics. The high pressure fluid injector test apparatus includes an upper hub, an upper weldment or housing, a first clamp and stud/nut assembly for securing the upper hub to the upper weldment, a standoff assembly within the upper weldment, a pair of window housings having view glasses within the upper weldment, an injector block assembly and purge plate within the upper weldment for holding an injector element to be tested and evaluated, a lower weldment or housing, a second clamp and stud/nut assembly for securing the lower weldment to the upper hub, a third clamp and stud/nut assembly for securing the lower hub to the lower weldment, mechanisms for introducing fluid under high pressure for testing an injector element, and mechanisms for purging the apparatus to prevent frosting of view glasses within the window housings and to permit unobstructed viewing of the injector element.
Apparatus for testing high pressure injector elements
NASA Technical Reports Server (NTRS)
Myers, William Neill (Inventor); Scott, Ewell M. (Inventor); Forbes, John C. (Inventor); Shadoan, Michael D. (Inventor)
1993-01-01
An apparatus for testing and evaluating the spray pattern of high pressure fuel injector elements for use in supplying fuel to combustion engines is presented. Prior art fuel injector elements were normally tested by use of low pressure apparatuses which did not provide a purge to prevent mist from obscuring the injector element or to prevent frosting of the view windows; could utilize only one fluid during each test; and had their viewing ports positioned one hundred eighty (180 deg) apart, thus preventing optimum use of laser diagnostics. The high pressure fluid injector test apparatus includes an upper hub, an upper weldment or housing, a first clamp and stud/nut assembly for securing the upper hub to the upper weldment, a standoff assembly within the upper weldment, a pair of window housings having view glasses within the upper weldment, an injector block assembly and purge plate within the upper weldment for holding an injector element to be tested and evaluated, a lower weldment or housing, a second clamp and stud/nut assembly for securing the lower weldment to the upper weldment, a lower hub, a third clamp and stud/nut assembly for securing the lower hub to the lower weldment, mechanisms for introducing fluid under high pressure for testing an injector element, and mechanisms for purging the apparatus to prevent frosting of view glasses within the window housings and to permit unobstructed viewing of the injector element.
Windows of sensitivity to toxic chemicals in the motor effects development.
Ingber, Susan Z; Pohl, Hana R
2016-02-01
Many chemicals currently used are known to elicit nervous system effects. In addition, approximately 2000 new chemicals introduced annually have not yet undergone neurotoxicity testing. This review concentrated on motor development effects associated with exposure to environmental neurotoxicants to help identify critical windows of exposure and begin to assess data needs based on a subset of chemicals thoroughly reviewed by the Agency for Toxic Substances and Disease Registry (ATSDR) in Toxicological Profiles and Addenda. Multiple windows of sensitivity were identified that differed based on the maturity level of the neurological system at the time of exposure, as well as dose and exposure duration. Similar but distinct windows were found for both motor activity (GD 8-17 [rats], GD 12-14 and PND 3-10 [mice]) and motor function performance (insufficient data for rats, GD 12-17 [mice]). Identifying specific windows of sensitivity in animal studies was hampered by study designs oriented towards detection of neurotoxicity that occurred at any time throughout the developmental process. In conclusion, while this investigation identified some critical exposure windows for motor development effects, it demonstrates a need for more acute duration exposure studies based on neurodevelopmental windows, particularly during the exposure periods identified in this review. Published by Elsevier Inc.
Windows of sensitivity to toxic chemicals in the motor effects development✩
Ingber, Susan Z.; Pohl, Hana R.
2017-01-01
Many chemicals currently used are known to elicit nervous system effects. In addition, approximately 2000 new chemicals introduced annually have not yet undergone neurotoxicity testing. This review concentrated on motor development effects associated with exposure to environmental neurotoxicants to help identify critical windows of exposure and begin to assess data needs based on a subset of chemicals thoroughly reviewed by the Agency for Toxic Substances and Disease Registry (ATSDR) in Toxicological Profiles and Addenda. Multiple windows of sensitivity were identified that differed based on the maturity level of the neurological system at the time of exposure, as well as dose and exposure duration. Similar but distinct windows were found for both motor activity (GD 8–17 [rats], GD 12–14 and PND 3–10 [mice]) and motor function performance (insufficient data for rats, GD 12–17 [mice]). Identifying specific windows of sensitivity in animal studies was hampered by study designs oriented towards detection of neurotoxicity that occurred at any time throughout the developmental process. In conclusion, while this investigation identified some critical exposure windows for motor development effects, it demonstrates a need for more acute duration exposure studies based on neurodevelopmental windows, particularly during the exposure periods identified in this review. PMID:26686904
Hoch, Stephan; Vomhof, Thomas; Teymoortash, Afshin
2015-03-01
Rupture of the round window membrane with consecutive development of a perilymphatic fistula (PLF) is still a matter of controversial debate in the pathogenesis of idiopathic sudden sensorineural hearing loss (SSHL). Until now no consensus exists about whether these patients benefit from performing an exploratory tympanotomy with sealing of the round window. The aim of the present study was to analyze critically the effectiveness of sealing the round window membrane in patients with SSHL. The clinical data of 51 patients with SSHL and a mean hearing decline of at least 60 dB over 5 frequencies who were treated with tympanotomy and sealing of the round window membrane were retrospectively analyzed. The results have been compared to the current state of the literature. Intraoperatively a round window membrane rupture or fluid leak was observed in none of the patients. After performing tympanotomy the mean improvement of hearing level was 32.7 dB. Twenty of 51 examined patients (39.2%) showed a mean improvement of the hearing level of more than 30 dB and a complete remission could be detected in 12 patients (23.5%). Reviewing the literature revealed no standard guidelines for definition or treatment of SSHL as well as for evaluation of hearing loss and its recovery. The results of the present study and the literature should be discussed critically. It is unclear whether tympanotomy and sealing of the round window membrane may be a meaningful treatment for SSHL. Therefore this procedure should be discussed as a therapeutic option only in selected patients with sudden deafness or profound hearing loss in which PLF is strongly suspicious or conservative treatment failed.
Liu, Shelley H; Bobb, Jennifer F; Lee, Kyu Ha; Gennings, Chris; Claus Henn, Birgit; Bellinger, David; Austin, Christine; Schnaas, Lourdes; Tellez-Rojo, Martha M; Hu, Howard; Wright, Robert O; Arora, Manish; Coull, Brent A
2018-07-01
The impact of neurotoxic chemical mixtures on children's health is a critical public health concern. It is well known that during early life, toxic exposures may impact cognitive function during critical time intervals of increased vulnerability, known as windows of susceptibility. Knowledge on time windows of susceptibility can help inform treatment and prevention strategies, as chemical mixtures may affect a developmental process that is operating at a specific life phase. There are several statistical challenges in estimating the health effects of time-varying exposures to multi-pollutant mixtures, such as: multi-collinearity among the exposures both within time points and across time points, and complex exposure-response relationships. To address these concerns, we develop a flexible statistical method, called lagged kernel machine regression (LKMR). LKMR identifies critical exposure windows of chemical mixtures, and accounts for complex non-linear and non-additive effects of the mixture at any given exposure window. Specifically, LKMR estimates how the effects of a mixture of exposures change with the exposure time window using a Bayesian formulation of a grouped, fused lasso penalty within a kernel machine regression (KMR) framework. A simulation study demonstrates the performance of LKMR under realistic exposure-response scenarios, and demonstrates large gains over approaches that consider each time window separately, particularly when serial correlation among the time-varying exposures is high. Furthermore, LKMR demonstrates gains over another approach that inputs all time-specific chemical concentrations together into a single KMR. We apply LKMR to estimate associations between neurodevelopment and metal mixtures in Early Life Exposures in Mexico and Neurotoxicology, a prospective cohort study of child health in Mexico City.
Extender for securing a closure
Thomas, II, Patrick A.
2012-10-02
An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.
FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks
Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A.; Zulkarnain, Zuriati A.
2016-01-01
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol’s semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery. PMID:27338411
FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.
Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A
2016-06-22
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
2017-11-01
7 Fig. 10 Build executable code ........................................................................... 8 Fig. 11 3DWF GUI’s main web ...can be designed in any Windows operating system with internet access via Microsoft’s Internet Explorer (IE) web browser. For this particular project...Therefore, it is advised to have network security safeguards in place and operate only in a trusted PC. The GUI’s Hypertext Markup Language (HTML) web
Design and implementation of face recognition system based on Windows
NASA Astrophysics Data System (ADS)
Zhang, Min; Liu, Ting; Li, Ailan
2015-07-01
In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.
Operationalizing Cyberspace for Today’s Combat Air Force
2010-04-01
rootkit techniques to run inside common Windows services (sometimes bundled with fake antivirus software ) or in Windows safe mode, and it can hide...has shifted to downloading other malware, with its main focus on fake alerts and rogue antivirus software . 5. TR/Dldr.Agent.JKH - Compromised U.S...patch, software update, or security breech away from failure. In short, what works AU/ACSC/SIMMONS/AY10 5 today, may not work tomorrow; this fact
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-31
... Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October 1, 2013 AGENCY... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry...
ERIC Educational Resources Information Center
Piper, Jim
1998-01-01
Discusses the importance of paying attention to facility requirements when selecting windows during a school building retrofit. Facility requirements to consider include security needs, lighting, energy conservation, and ease the cost of maintenance. (GR)
Implementing Information Assurance - Beyond Process
2009-01-01
disabled or properly configured. Tools and scripts are available to expedite the configuration process on some platforms, For example, approved Windows...in the System Security Plan (SSP) or Information Security Plan (lSP). Any PPSs not required for operation by the system must be disabled , This...Services must be disabled , Implementing an 1M capability within the boundary carries many policy and documentation requirements. Usemame and passwords
... the site again. The following web browsers and operating systems are sufficiently secure and advanced. These version numbers ... also acceptable. Microsoft Internet Explorer 7, if your operating system is Windows Vista or later. No version of ...
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
Window decompression in laser-heated MagLIF targets
NASA Astrophysics Data System (ADS)
Woodbury, Daniel; Peterson, Kyle; Sefkow, Adam
2015-11-01
The Magnetized Liner Inertial Fusion (MagLIF) concept requires pre-magnetized fuel to be pre-heated with a laser before undergoing compression by a thick solid liner. Recent experiments and simulations suggest that yield has been limited to date by poor laser preheat and laser-induced mix in the fuel region. In order to assess laser energy transmission through the pressure-holding window, as well as resultant mix, we modeled window disassembly under different conditions using 1D and 2D simulations in both Helios and HYDRA. We present results tracking energy absorption, time needed for decompression, risk of laser-plasma interaction (LPI) that may scatter laser light, and potential for mix from various window thicknesses, laser spot sizes and gas fill densities. These results indicate that using thinner windows (0.5-1 μm windows) and relatively large laser spot radii (600 μm and above) can avoid deleterious effects and improve coupling with the fuel. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the National Nuclear Security Administration under DE-AC04- 94AL85000.
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2013 CFR
2013-01-01
... protected use regarding the security of critical infrastructure or protected systems, analysis, warning... expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL...
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2014 CFR
2014-01-01
... protected use regarding the security of critical infrastructure or protected systems, analysis, warning... expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL...
LISA, the next generation: from a web-based application to a fat client.
Pierlet, Noëlla; Aerts, Werner; Vanautgaerden, Mark; Van den Bosch, Bart; De Deurwaerder, André; Schils, Erik; Noppe, Thomas
2008-01-01
The LISA application, developed by the University Hospitals Leuven, permits referring physicians to consult the electronic medical records of their patients over the internet in a highly secure way. We decided to completely change the way we secured the application, discard the existing web application and build a completely new application, based on the in-house developed hospital information system, used in the University Hospitals Leuven. The result is a fat Java client, running on a Windows Terminal Server, secured by a commercial SSL-VPN solution.
Fisher, Ronald E; Norman, Michael
2010-07-01
The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.
Computer Center Reference Manual. Volume 1
1990-09-30
Unlimited o- 0 0 91o1 UNCLASSI FI ED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE...with connection to INTERNET ) (host tables allow transfer to some other networks) OASYS - the DTRC Office Automation System The following can be reached...and buffers, two windows, and some word processing commands. Advanced editing commands are entered through the use of a command line. EVE las its own
Tate, Kevin B.; Rhen, Turk; Eme, John; Kohl, Zachary F.; Crossley, Janna; Elsey, Ruth M.
2016-01-01
During embryonic development, environmental perturbations can affect organisms' developing phenotype, a process known as developmental plasticity. Resulting phenotypic changes can occur during discrete, critical windows of development. Critical windows are periods when developing embryos are most susceptible to these perturbations. We have previously documented that hypoxia reduces embryo size and increases relative heart mass in American alligator, and this study identified critical windows when hypoxia altered morphological, cardiovascular function and cardiac gene expression of alligator embryos. We hypothesized that incubation in hypoxia (10% O2) would increase relative cardiac size due to cardiac enlargement rather than suppression of somatic growth. We exposed alligator embryos to hypoxia during discrete incubation periods to target windows where the embryonic phenotype is altered. Hypoxia affected heart growth between 20 and 40% of embryonic incubation, whereas somatic growth was affected between 70 and 90% of incubation. Arterial pressure was depressed by hypoxic exposure during 50–70% of incubation, whereas heart rate was depressed in embryos exposed to hypoxia during a period spanning 70–90% of incubation. Expression of Vegf and PdgfB was increased in certain hypoxia-exposed embryo treatment groups, and hypoxia toward the end of incubation altered β-adrenergic tone for arterial pressure and heart rate. It is well known that hypoxia exposure can alter embryonic development, and in the present study, we have identified brief, discrete windows that alter the morphology, cardiovascular physiology, and gene expression in embryonic American alligator. PMID:27101296
A Survey on Cyber Security awareness among college students in Tamil Nadu
NASA Astrophysics Data System (ADS)
Senthilkumar, K.; Easwaramoorthy, Sathishkumar
2017-11-01
The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.
NASA Astrophysics Data System (ADS)
Ham, Boo-Hyun; Kim, Il-Hwan; Park, Sung-Sik; Yeo, Sun-Young; Kim, Sang-Jin; Park, Dong-Woon; Park, Joon-Soo; Ryu, Chang-Hoon; Son, Bo-Kyeong; Hwang, Kyung-Bae; Shin, Jae-Min; Shin, Jangho; Park, Ki-Yeop; Park, Sean; Liu, Lei; Tien, Ming-Chun; Nachtwein, Angelique; Jochemsen, Marinus; Yan, Philip; Hu, Vincent; Jones, Christopher
2017-03-01
As critical dimensions for advanced two dimensional (2D) DUV patterning continue to shrink, the exact process window becomes increasingly difficult to determine. The defect size criteria shrink with the patterning critical dimensions and are well below the resolution of current optical inspection tools. As a result, it is more challenging for traditional bright field inspection tools to accurately discover the hotspots that define the process window. In this study, we use a novel computational inspection method to identify the depth-of-focus limiting features of a 10 nm node mask with 2D metal structures (single exposure) and compare the results to those obtained with a traditional process windows qualification (PWQ) method based on utilizing a focus modulated wafer and bright field inspection (BFI) to detect hotspot defects. The method is extended to litho-etch litho-etch (LELE) on a different test vehicle to show that overlay related bridging hotspots also can be identified.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
The mammalian respiratory system and critical windows of exposure for children's health.
Pinkerton, K E; Joad, J P
2000-01-01
The respiratory system is a complex organ system composed of multiple cell types involved in a variety of functions. The development of the respiratory system occurs from embryogenesis to adult life, passing through several distinct stages of maturation and growth. We review embryonic, fetal, and postnatal phases of lung development. We also discuss branching morphogenesis and cellular differentiation of the respiratory system, as well as the postnatal development of xenobiotic metabolizing systems within the lungs. Exposure of the respiratory system to a wide range of chemicals and environmental toxicants during perinatal life has the potential to significantly affect the maturation, growth, and function of this organ system. Although the potential targets for exposure to toxic factors are currently not known, they are likely to affect critical molecular signals expressed during distinct stages of lung development. The effects of exposure to environmental tobacco smoke during critical windows of perinatal growth are provided as an example leading to altered cellular and physiological function of the lungs. An understanding of critical windows of exposure of the respiratory system on children's health requires consideration that lung development is a multistep process and cannot be based on studies in adults. Images Figure 1 Figure 4 PMID:10852845
2009-09-01
DIFFIE-HELLMAN KEY EXCHANGE .......................14 III. GHOSTNET SETUP .........................................15 A. INSTALLATION OF OPENVPN FOR...16 3. Verifying the Secure Connection ..............16 B. RUNNING OPENVPN AS A SERVER ON WINDOWS ............17 1. Creating...Generating Server and Client Keys ............20 5. Keys to Transfer to the Client ...............21 6. Configuring OpenVPN to Use Certificates
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-05
...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.
Kahle, Logan Q; Flannery, Maureen E; Dumbacher, John P
2016-01-01
Bird-window collisions are a major and poorly-understood generator of bird mortality. In North America, studies of this topic tend to be focused east of the Mississippi River, resulting in a paucity of data from the Western flyways. Additionally, few available data can critically evaluate factors such as time of day, sex and age bias, and effect of window pane size on collisions. We collected and analyzed 5 years of window strike data from a 3-story building in a large urban park in San Francisco, California. To evaluate our window collision data in context, we collected weekly data on local bird abundance in the adjacent parkland. Our study asks two overarching questions: first-what aspects of a bird's biology might make them more likely to fatally strike windows; and second, what characteristics of a building's design contribute to bird-window collisions. We used a dataset of 308 fatal bird strikes to examine the relationships of strikes relative to age, sex, time of day, time of year, and a variety of other factors, including mitigation efforts. We found that actively migrating birds may not be major contributors to collisions as has been found elsewhere. We found that males and young birds were both significantly overrepresented relative to their abundance in the habitat surrounding the building. We also analyzed the effect of external window shades as mitigation, finding that an overall reduction in large panes, whether covered or in some way broken up with mullions, effectively reduced window collisions. We conclude that effective mitigation or design will be required in all seasons, but that breeding seasons and migratory seasons are most critical, especially for low-rise buildings and other sites away from urban migrant traps. Finally, strikes occur throughout the day, but mitigation may be most effective in the morning and midday.
Kahle, Logan Q.; Flannery, Maureen E.; Dumbacher, John P.
2016-01-01
Bird-window collisions are a major and poorly-understood generator of bird mortality. In North America, studies of this topic tend to be focused east of the Mississippi River, resulting in a paucity of data from the Western flyways. Additionally, few available data can critically evaluate factors such as time of day, sex and age bias, and effect of window pane size on collisions. We collected and analyzed 5 years of window strike data from a 3-story building in a large urban park in San Francisco, California. To evaluate our window collision data in context, we collected weekly data on local bird abundance in the adjacent parkland. Our study asks two overarching questions: first–what aspects of a bird’s biology might make them more likely to fatally strike windows; and second, what characteristics of a building’s design contribute to bird-window collisions. We used a dataset of 308 fatal bird strikes to examine the relationships of strikes relative to age, sex, time of day, time of year, and a variety of other factors, including mitigation efforts. We found that actively migrating birds may not be major contributors to collisions as has been found elsewhere. We found that males and young birds were both significantly overrepresented relative to their abundance in the habitat surrounding the building. We also analyzed the effect of external window shades as mitigation, finding that an overall reduction in large panes, whether covered or in some way broken up with mullions, effectively reduced window collisions. We conclude that effective mitigation or design will be required in all seasons, but that breeding seasons and migratory seasons are most critical, especially for low-rise buildings and other sites away from urban migrant traps. Finally, strikes occur throughout the day, but mitigation may be most effective in the morning and midday. PMID:26731417
Opto-mechanical design of optical window for aero-optics effect simulation instruments
NASA Astrophysics Data System (ADS)
Wang, Guo-ming; Dong, Dengfeng; Zhou, Weihu; Ming, Xing; Zhang, Yan
2016-10-01
A complete theory is established for opto-mechanical systems design of the window in this paper, which can make the design more rigorous .There are three steps about the design. First, the universal model of aerodynamic environment is established based on the theory of Computational Fluid Dynamics, and the pneumatic pressure distribution and temperature data of optical window surface is obtained when aircraft flies in 5-30km altitude, 0.5-3Ma speed and 0-30°angle of attack. The temperature and pressure distribution values for the maximum constraint is selected as the initial value of external conditions on the optical window surface. Then, the optical window and mechanical structure are designed, which is also divided into two parts: First, mechanical structure which meet requirements of the security and tightness is designed. Finally, rigorous analysis and evaluation are given about the structure of optics and mechanics we have designed. There are two parts to be analyzed. First, the Fluid-Solid-Heat Coupled Model is given based on finite element analysis. And the deformation of the glass and structure can be obtained by the model, which can assess the feasibility of the designed optical windows and ancillary structure; Second, the new optical surface is fitted by Zernike polynomials according to the deformation of the surface of the optical window, which can evaluate imaging quality impact of spectral camera by the deformation of window.
Interview with Violet Oaklander, Author of "Windows to Our Children."
ERIC Educational Resources Information Center
Campbell, Chari A.
1993-01-01
Presents interview with Dr. Violent Oaklander, experienced child therapist and author of "Windows to Our Children: A Gestalt Therapy with Children and Adolescents." Discusses critical components of successful therapy with children. Explains how developmental stage of child affects therapeutic process, and provides specific examples of working with…
Exploring Shop Window Displays
ERIC Educational Resources Information Center
Christopoulou, Martha
2011-01-01
Using visual resources from everyday life in art lessons can enrich students' knowledge about the creation of visual images, artifacts, and sites, and develop their critical understanding about the cultural impact of these images and their effects on people's lives. Through examining an exhibition in the windows of Selfridges department store in…
Active two-phase cooling of an IR window for a hypersonic interceptor
NASA Astrophysics Data System (ADS)
Burzlaff, B. H.; Chivian, Jay S.; Cotten, W. D.; Hemphill, R. B.; Huhlein, Michael A.
1993-06-01
A novel actively cooled window for an IR sensor on a hypersonic interceptor is envisioned which achieves an IR window with high transmittance, low emittance, and low image distortion under high aerodynamic heat flux. The cooling concept employs two-phase convective boiling of liquid ammonia. Coolant is confined to narrow, parallel channels within the window to minimize obscuration of the aperture. The high latent heat of vaporization of ammonia minimizes coolant mass-flow requirements. Low boiling temperatures at projected operating pressures promote high thermal conductivity and low emissivity in the window. The concept was tested with thermal measurements on sub-mm width coolant channels in Si. High values for heat transfer coefficient and critical heat flux were obtained. Thermal gradients within the window can be controlled by the coolant channel configuration. Design options are investigated by predicting the effect of aerodynamic heat flux on the image produced by an IR sensor with a cooled window. Ammonia-cooled IR windows will function in the anticipated aerothermal environment.
2015-01-01
by the graduate fellow’s faculty committee. C O R P O R A T I O N Dissertation Critical Rare Earths, National Security, and U.S.-China Interactions A...Portfolio Approach to Dysprosium Policy Design David L. An Dissertation Critical Rare Earths, National Security, and U.S.-China Interactions A...Permanent Magnet ................................................ xxiv Dysprosium, the Most Critical Rare Earth
Longhi, M. Paula; Hoti, Mimoza; Patel, Minal B.; O’Dwyer, Michael; Nourshargh, Sussan; Barnes, Michael R.; Brohi, Karim
2017-01-01
Background Severe trauma induces a widespread response of the immune system. This “genomic storm” can lead to poor outcomes, including Multiple Organ Dysfunction Syndrome (MODS). MODS carries a high mortality and morbidity rate and adversely affects long-term health outcomes. Contemporary management of MODS is entirely supportive, and no specific therapeutics have been shown to be effective in reducing incidence or severity. The pathogenesis of MODS remains unclear, and several models are proposed, such as excessive inflammation, a second-hit insult, or an imbalance between pro- and anti-inflammatory pathways. We postulated that the hyperacute window after trauma may hold the key to understanding how the genomic storm is initiated and may lead to a new understanding of the pathogenesis of MODS. Methods and findings We performed whole blood transcriptome and flow cytometry analyses on a total of 70 critically injured patients (Injury Severity Score [ISS] ≥ 25) at The Royal London Hospital in the hyperacute time period within 2 hours of injury. We compared transcriptome findings in 36 critically injured patients with those of 6 patients with minor injuries (ISS ≤ 4). We then performed flow cytometry analyses in 34 critically injured patients and compared findings with those of 9 healthy volunteers. Immediately after injury, only 1,239 gene transcripts (4%) were differentially expressed in critically injured patients. By 24 hours after injury, 6,294 transcripts (21%) were differentially expressed compared to the hyperacute window. Only 202 (16%) genes differentially expressed in the hyperacute window were still expressed in the same direction at 24 hours postinjury. Pathway analysis showed principally up-regulation of pattern recognition and innate inflammatory pathways, with down-regulation of adaptive responses. Immune deconvolution, flow cytometry, and modular analysis suggested a central role for neutrophils and Natural Killer (NK) cells, with underexpression of T- and B cell responses. In the transcriptome cohort, 20 critically injured patients later developed MODS. Compared with the 16 patients who did not develop MODS (NoMODS), maximal differential expression was seen within the hyperacute window. In MODS versus NoMODS, 363 genes were differentially expressed on admission, compared to only 33 at 24 hours postinjury. MODS transcripts differentially expressed in the hyperacute window showed enrichment among diseases and biological functions associated with cell survival and organismal death rather than inflammatory pathways. There was differential up-regulation of NK cell signalling pathways and markers in patients who would later develop MODS, with down-regulation of neutrophil deconvolution markers. This study is limited by its sample size, precluding more detailed analyses of drivers of the hyperacute response and different MODS phenotypes, and requires validation in other critically injured cohorts. Conclusions In this study, we showed how the hyperacute postinjury time window contained a focused, specific signature of the response to critical injury that led to widespread genomic activation. A transcriptomic signature for later development of MODS was present in this hyperacute window; it showed a strong signal for cell death and survival pathways and implicated NK cells and neutrophil populations in this differential response. PMID:28715416
Transmission-geometry electrochemical cell for in-situ scattering and spectroscopy investigations
Chupas, Peter J.; Chapman, Karena W.; Kurtz, Charles A.; Borkiewicz, Olaf J.; Wiaderek, Kamila Magdelena; Shyam, Badri
2015-05-05
The present invention relates to a test chamber that can be used to perform a variety of X-ray and neutron spectroscopy experiments including powder diffraction, small-angle scattering, X-ray absorption spectroscopy, and pair distribution functions, such chamber comprising a first electrode with an X-ray transparent window; a second electrode with an X-ray transparent window; a plurality of insulating gaskets providing a hermetic seal around the sample and preventing contact between said first and second electrodes; and an insulating housing into which the first electrode is secured.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false General. 611.602 Section 611.602 Federal Acquisition Regulations System DEPARTMENT OF STATE COMPETITION AND ACQUISITION... security upgrade. This includes installation of forced entry/ballistic resistant (FE/BR) windows and doors...
78 FR 57644 - Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-19
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2103-0050] Critical Infrastructure Partnership... management; Notice of an open Federal Advisory Committee Meeting. SUMMARY: The Critical Infrastructure... involving critical infrastructure security and resiliency. Off-topic questions or comments will not be...
Proper Installation of Replacement Windows | Efficient Windows
. Quality installation is critical for an airtight fit and a continuous water barrier to prevent drafts , water damage and condensation. The complexity of the installation depends on whether you are considering and specifications. Install level, plumb, and square. Install water tight: water must be prevented
Hegarty, F; Roche, D; McCabe, C; McCann, S
2009-01-01
The Open Window project was established with the aim of creating a "virtual window" for each patient who is confined to protective isolation due to treatment for illness. This virtual window as developed provides a range of media or experiences. This paper describes the approach taken to the system design and discusses initial experiences with implementing such a system in a critical care setting. The system design was predicated on two guiding principles. Firstly it should be intuitive to use and the technology used to create the virtual window hidden from patient view. Secondly the system must be able to be installed at the point of care in a way that delivers the experience under the patient's control, without compromising the function or safety of the clinical environment. Patient acceptance of the system is being measured as part of an on-going trial and at this interim phase of data analysis 100% (n=55) of participants in the intervention group have reported that the technology was easy to use. We conclude that the system as designed and installed is an effective, robust and reliable system upon which to base a multimedia interventions in a critical care room.
Laser-induced damage and fracture in fused silica vacuum windows
NASA Astrophysics Data System (ADS)
Campbell, John H.; Hurst, Patricia A.; Heggins, Dwight D.; Steele, William A.; Bumpas, Stanley E.
1997-05-01
Laser induced damage, that initiates catastrophic fracture, has been observed in large, fused silica lenses that also serve as vacuum barriers in high-fluence positions on the Nova and Beamlet lasers. In nearly all cases damage occurs on the vacuum side of the lens. The damage can lead to catastrophic crack growth if the flaw size exceeds the critical flaw size for SiO2. If the elastic stored energy in the lens in high enough, the lens will fracture into many pieces resulting in an implosion. The consequences of such an implosion can be severe, particularly for large vacuum systems. Three parameters control the degree of fracture in the vacuum barrier window: (1) the elastic stored energy, (2) the ratio of the window thickness to flaw depth and (3) secondary crack propagation. Fracture experiments have ben carried our on 15-cm diameter fused silica windows that contain surface flaws caused by laser damage. The results of these experiments, combined with data from window failures on Beamlet and Nova have been sued to develop design criteria for a 'fail-safe' lens. Specifically the window must be made thick enough such that the peak tensile stress is less than 500 psi and the corresponding ratio of the thickness to critical flaw size is less than 6. Under these conditions a properly mounted window, upon failure, will break into only tow pieces and will not implode. One caveat to these design criteria is that the air leak through the window before secondary crack growth occurs. Finite element stress calculations of a window before and immediately following fracture into two pieces show that the elastic stored energy is redistributed if the fragments 'lock' in place and thereby bridge the opening. In such cases, the peak stresses at the flaw site can increase leading to further crack growth.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thiede, Christian, E-mail: christian.thiede@uni-muenster.de; Schmidt, Anke B.; Donath, Markus
2015-08-15
Bandpass photon detectors are widely used in inverse photoemission in the isochromat mode at energies in the vacuum-ultraviolet spectral range. The energy bandpass of gas-filled counters is usually formed by the ionization threshold of the counting gas as high-pass filter and the transmission cutoff of an alkaline earth fluoride window as low-pass filter. The transmission characteristics of the window have, therefore, a crucial impact on the detector performance. We present transmission measurements in the vacuum-ultraviolet spectral range for alkaline earth fluoride window crystals in the vicinity of the transmission cutoff as a function of crystal purity, surface finish, surface contamination,more » temperature, and thickness. Our findings reveal that the transmission characteristics of the window crystal and, thus, the detector performance depend critically on these window parameters.« less
USB Storage Device Forensics for Windows 10.
Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider
2018-05-01
Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.
Code of Federal Regulations, 2014 CFR
2014-07-01
... growers Moderate to severe black root rot or crown rot.Moderate to severe yellow or purple nutsedge... meet a critical market window, such as during the holiday season. Dry Cured Pork Products Members of...
Strengthening DoD Cyber Security with the Vulnerability Market
2014-01-01
50,000 – $100,000 Windows $60,000 – $120,000 Firefox or Safari $60,000 – $150,000 Chrome or Internet Explorer $80,000 – $200,000 iOS $100,000...the CTB metric for the Google Chrome OS at $110,000. Accordingly, this metric could be used by Google to compare its security to other operating...Mozilla Foundation. (n.d.). Mozilla. Retrieved from https://www.mozilla. org/en-US/foundation/ Thomson, I. (2013, March 8). Pwn2Own: IE10, Firefox
Censored Glauber Dynamics for the Mean Field Ising Model
NASA Astrophysics Data System (ADS)
Ding, Jian; Lubetzky, Eyal; Peres, Yuval
2009-11-01
We study Glauber dynamics for the Ising model on the complete graph on n vertices, known as the Curie-Weiss Model. It is well known that at high temperature ( β<1) the mixing time is Θ( nlog n), whereas at low temperature ( β>1) it is exp ( Θ( n)). Recently, Levin, Luczak and Peres considered a censored version of this dynamics, which is restricted to non-negative magnetization. They proved that for fixed β>1, the mixing-time of this model is Θ( nlog n), analogous to the high-temperature regime of the original dynamics. Furthermore, they showed cutoff for the original dynamics for fixed β<1. The question whether the censored dynamics also exhibits cutoff remained unsettled. In a companion paper, we extended the results of Levin et al. into a complete characterization of the mixing-time for the Curie-Weiss model. Namely, we found a scaling window of order 1/sqrt{n} around the critical temperature β c =1, beyond which there is cutoff at high temperature. However, determining the behavior of the censored dynamics outside this critical window seemed significantly more challenging. In this work we answer the above question in the affirmative, and establish the cutoff point and its window for the censored dynamics beyond the critical window, thus completing its analogy to the original dynamics at high temperature. Namely, if β=1+ δ for some δ>0 with δ 2 n→∞, then the mixing-time has order ( n/ δ)log ( δ 2 n). The cutoff constant is (1/2+[2(ζ2 β/ δ-1)]-1), where ζ is the unique positive root of g( x)=tanh ( β x)- x, and the cutoff window has order n/ δ.
The uncrowded window of object recognition
Pelli, Denis G; Tillman, Katharine A
2009-01-01
It is now emerging that vision is usually limited by object spacing rather than size. The visual system recognizes an object by detecting and then combining its features. ‘Crowding’ occurs when objects are too close together and features from several objects are combined into a jumbled percept. Here, we review the explosion of studies on crowding—in grating discrimination, letter and face recognition, visual search, selective attention, and reading—and find a universal principle, the Bouma law. The critical spacing required to prevent crowding is equal for all objects, although the effect is weaker between dissimilar objects. Furthermore, critical spacing at the cortex is independent of object position, and critical spacing at the visual field is proportional to object distance from fixation. The region where object spacing exceeds critical spacing is the ‘uncrowded window’. Observers cannot recognize objects outside of this window and its size limits the speed of reading and search. PMID:18828191
Sensitive Security Information (SSI) and Transportation Security: Background and Controversies
2004-02-05
with airport security procedures, employee accountability, passenger screening, and airport secrecy agreements. In January 2003, the Dallas/Fort... Airport Security Flaws Bring Criticism,” Los Angeles Times, July 2, 2002, p. A8. 16 Charles Piller and Ricardo Alonso-Zaldivar, “A Suspect Computer...Secrecy in Airport Security Contract Criticized,” Des Moines Register, Sept. 27, 2003, p. 1A; James Andrews, “Here in Tristate, Security’s Tighter
6 CFR 29.3 - Effect of provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...
6 CFR 29.3 - Effect of provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...
6 CFR 29.3 - Effect of provisions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...
6 CFR 29.3 - Effect of provisions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...
6 CFR 29.3 - Effect of provisions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...
Bradbury science museum: your window to Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Deck, Linda Theresa
The Bradbury Science Museum is the public's window to Los Alamos National Laboratory and supports the Community Program Office's mission to develop community support to accomplish LANL's national security and science mission. It does this by stimulating interest in and increasing basic knowledge of science and technology in northern New Mexico audiences, and increasing public understanding and appreciation of how LANL science and technology solve our global problems. In performing these prime functions, the Museum also preserves the history of scientific accomplishment at the Lab by collecting and preserving artifacts of scientific and historical importance.
2015-02-01
instructions on how to build and use RTEMS in two different operating environments. 15. SUBJECT TERMS RTEMS, SPARC simulator, Raspberry Pi . 16. SECURITY...system .............................................. 15 3. Hardware requirements for the Raspberry Pi console ................................ 16 4...requirements for the Raspberry Pi console ................................... 16 8. Software requirements for the Windows system
2015-01-01
Robust team exercise and simulation • Air-gapped; isolation from production networks • “Train as you fight” scenarios • Advanced user and Internet...Security Onion • SIFT (Linux/Windows) • Kali • Rucksack • Docker • VTS 18 GCD Overview January 2015 © 2014 Carnegie Mellon University TEXN Architecture
76 FR 81956 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... through the Secretary of Homeland Security with advice on the security of the critical infrastructure... critical infrastructure as directed by the President. At this meeting, the committee will receive work from... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0117] National Infrastructure Advisory...
76 FR 36137 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-21
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0034] National Infrastructure Advisory...
Beyond Mirrors and Windows: A Critical Content Analysis of Latinx Children's Books
ERIC Educational Resources Information Center
Braden, Eliza G.; Rodriguez, Sanjuana C.
2016-01-01
This critical content analysis examines the representation of Latinx characters in 15 picture books published in 2013 and identified by Children's Cooperative Book Center (CCBC) as having significant Latinx content. The theoretical framework undergirding this study is Critical Race Theory (Ladson-Billings, 1998; Solórzano & Yosso, 2002;…
A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
6 CFR 29.1 - Purpose and scope.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...
76 FR 20995 - Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0028] Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-17
... Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau... Federal agencies, conducts assessments of U.S. industrial base sectors deemed critical to U.S. national... needs of these critical market segments in order to maintain a strong U.S. industrial base. II. Method...
76 FR 70730 - The Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-15
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0112] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...
76 FR 29775 - The Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-23
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0038] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...
78 FR 16861 - The Critical Infrastructure Partnership Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0077] The Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council (CIPAC) in a Federal...
75 FR 48983 - The Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-12
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0062] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, Department of Homeland Security, 245...
A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks
Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad
2017-01-01
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992
A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.
Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad
2017-01-01
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.
[Agricultural occupational health and social security].
Lancry, Pierre-Jean; Crochet, Benoît; Richard-Hamelin, Géraldine; Grillet, Jean-Pierre
2007-06-15
The Mutualité Sociale Agricole (MSA) is the French social security agency for all agricultural wage earners and non-wage earners. It is the second French social security scheme after the general scheme, providing coverage for wage earners in commerce and industry. The MSA covers the whole spectrum of benefits (recovery, illness, family, retirement, occupational injury and disease) within a unique business window. The management of the MSA is overseen by elected representatives, thus creating a unique social democracy in the world of social security. Among the services managed by the MSA, occupational health and safety hold an original position: the MSA is indeed the only social security agency dealing with occupational health. 350 occupational physicians and 250 prevention consultants work in a multidisciplinary environment for the benefit of agricultural wage earners, as well as farmers, since the MSA implemented in 2002 an occupational risk prevention scheme for farmers.
Integral window/photon beam position monitor and beam flux detectors for x-ray beams
Shu, Deming; Kuzay, Tuncer M.
1995-01-01
A monitor/detector assembly in a synchrotron for either monitoring the position of a photon beam or detecting beam flux may additionally function as a vacuum barrier between the front end and downstream segment of the beamline in the synchrotron. A base flange of the monitor/detector assembly is formed of oxygen free copper with a central opening covered by a window foil that is fused thereon. The window foil is made of man-made materials, such as chemical vapor deposition diamond or cubic boron nitrate and in certain configurations includes a central opening through which the beams are transmitted. Sensors of low atomic number materials, such as aluminum or beryllium, are laid on the window foil. The configuration of the sensors on the window foil may be varied depending on the function to be performed. A contact plate of insulating material, such as aluminum oxide, is secured to the base flange and is thereby clamped against the sensor on the window foil. The sensor is coupled to external electronic signal processing devices via a gold or silver lead printed onto the contact plate and a copper post screw or alternatively via a copper screw and a copper spring that can be inserted through the contact plate and coupled to the sensors. In an alternate embodiment of the monitor/detector assembly, the sensors are sandwiched between the window foil of chemical vapor deposition diamond or cubic boron nitrate and a front foil made of similar material.
The European cooperative approach to securing critical information infrastructure.
Purser, Steve
2011-10-01
This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
Method of identifying features in indexed data
Jarman, Kristin H [Richland, WA; Daly, Don Simone [Richland, WA; Anderson, Kevin K [Richland, WA; Wahl, Karen L [Richland, WA
2001-06-26
The present invention is a method of identifying features in indexed data, especially useful for distinguishing signal from noise in data provided as a plurality of ordered pairs. Each of the plurality of ordered pairs has an index and a response. The method has the steps of: (a) providing an index window having a first window end located on a first index and extending across a plurality of indices to a second window end; (b) selecting responses corresponding to the plurality of indices within the index window and computing a measure of dispersion of the responses; and (c) comparing the measure of dispersion to a dispersion critical value. Advantages of the present invention include minimizing signal to noise ratio, signal drift, varying baseline signal and combinations thereof.
Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System
2016-03-31
for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
NASA Astrophysics Data System (ADS)
Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.
2005-04-01
Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.
12. Interior view of reception and secretarial space for legal ...
12. Interior view of reception and secretarial space for legal offices; showing wall mounted shelving and exterior window; center and south side of main section of building on top floor; view to southwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
Security Procedures for Golden Laboratories and Administration Offices |
photo identification (for example driver's license, passport, or military ID). Upon arrival to NREL's and should park in the Research Support Facility (RSF) Visitor Parking Lot. Visitors will then enter ) window. Visitors need to be prepared to show government-issued photo identification (for example driver's
Optimizing Secure Communication Standards for Disadvantaged Networks
2009-09-01
created using LATEX with the editor Kile [5]. 5.1.2 Libraries and APIs Several libraries were important to the successful completion of this study. The...Explorer. http://www.microsoft.com/windows/ internet-explorer/default.aspx. [5] Kile - An Integrated LaTeX Environment. http://kile.sourceforge.net/. [6
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Strength. 116.1020 Section 116.1020 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150 PASSENGERS OR WITH... Visibility § 116.1020 Strength. Each window, port hole, and its means of attachment to the hull or deck house...
77 FR 6675 - Premium Penalty Relief for Certain Delinquent Plans
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-09
... Delinquent Plans AGENCY: Pension Benefit Guaranty Corporation. ACTION: Policy statement. SUMMARY: Executive... limited window for covered plans that have never paid required premiums to pay past-due premiums without... Security Act of 1974 (ERISA). Under sections 4006 and 4007 of ERISA, plans covered by title IV must pay...
77 FR 19300 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...
The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)
2001-10-16
default/ passwd file in UNIX. Administrators should obtain and run password-guessing programs (i.e., “John the Ripper,’’ “L0phtCrack,” and “Crack...system on which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM database for Windows and the /etc/ passwd and /etc...ownership by root and group sys. The /etc/ passwd file should have permissions 644 with owner root and group root. n Be cracked every month to find
Network Penetration Testing and Research
NASA Technical Reports Server (NTRS)
Murphy, Brandon F.
2013-01-01
This paper will focus the on research and testing done on penetrating a network for security purposes. This research will provide the IT security office new methods of attacks across and against a company's network as well as introduce them to new platforms and software that can be used to better assist with protecting against such attacks. Throughout this paper testing and research has been done on two different Linux based operating systems, for attacking and compromising a Windows based host computer. Backtrack 5 and BlackBuntu (Linux based penetration testing operating systems) are two different "attacker'' computers that will attempt to plant viruses and or NASA USRP - Internship Final Report exploits on a host Windows 7 operating system, as well as try to retrieve information from the host. On each Linux OS (Backtrack 5 and BlackBuntu) there is penetration testing software which provides the necessary tools to create exploits that can compromise a windows system as well as other operating systems. This paper will focus on two main methods of deploying exploits 1 onto a host computer in order to retrieve information from a compromised system. One method of deployment for an exploit that was tested is known as a "social engineering" exploit. This type of method requires interaction from unsuspecting user. With this user interaction, a deployed exploit may allow a malicious user to gain access to the unsuspecting user's computer as well as the network that such computer is connected to. Due to more advance security setting and antivirus protection and detection, this method is easily identified and defended against. The second method of exploit deployment is the method mainly focused upon within this paper. This method required extensive research on the best way to compromise a security enabled protected network. Once a network has been compromised, then any and all devices connected to such network has the potential to be compromised as well. With a compromised network, computers and devices can be penetrated through deployed exploits. This paper will illustrate the research done to test ability to penetrate a network without user interaction, in order to retrieve personal information from a targeted host.
NASA Astrophysics Data System (ADS)
Pellerin, Morgane; Castaing, Victor; Gourier, Didier; Chanéac, Corinne; Viana, Bruno
2018-02-01
Persistent luminescence materials present many applications including security lighting and bio-imaging. Many progresses have been made in the elaboration of persistent luminescent nanoparticles suitable for the first NIR partial transparency window (650 - 950 nm). Moving to the second and third near-infrared partial transparency windows (1000 nm - 1800 nm) allows further reducing of scattering, absorption and tissue autofluorescence effects. In this work, we present the synthesis of Co2+ and Ni2+ doped zinc-gallate nanoparticles with broad emission covering the NIR-II range. Site occupancy, energy levels, optical features and persistent phenomena are presented.
2003-02-06
KENNEDY SPACE CENTER, FLA. -- Technicians secure the aeroshell for Mars Exploration Rover 2 to a workstand in the Payload Hazardous Servicing Facility. Set to launch in 2003, the MER Mission will consist of two identical rovers designed to cover roughly 110 yards each Martian day. Each rover will carry five scientific instruments that will allow it to search for evidence of liquid water that may have been present in the planet's past. The rovers will be identical to each other, but will land at different regions of Mars. The first rover has a launch window opening May 30, and the second rover, a window opening June 25, 2003.
Secure Video Surveillance System Acquisition Software
DOE Office of Scientific and Technical Information (OSTI.GOV)
2009-12-04
The SVSS Acquisition Software collects and displays video images from two cameras through a VPN, and store the images onto a collection controller. The software is configured to allow a user to enter a time window to display up to 2 1/2, hours of video review. The software collects images from the cameras at a rate of 1 image per second and automatically deletes images older than 3 hours. The software code operates in a linux environment and can be run in a virtual machine on Windows XP. The Sandia software integrates the different COTS software together to build themore » video review system.« less
Liu, Yun-Hen; Wu, Yi-Cheng; Chen, Tzu-Ping; Ko, Po-Jen
2011-09-01
To evaluate the effectiveness of surgical sealant (CoSeal) in sealing the tracheal assess sites after transtracheal thoracoscopy. Two dogs underwent transtracheal thoracic exploration and pericardial window creation. The thoracic cavity was approached with flexible bronchoscope through a 9-mm tracheal incision. The pericardial window was performed with a needle knife via the working channel of the bronchoscope, and the tracheal assess site was closed with CoSeal using a rubber catheter. The integrity of tracheal healing was evaluated under positive pressure ventilation. Transtracheal creation of pericardial window and closure of tracheal incision with CoSeal was successfully performed in both dogs. There was no evidence of air leaks from the chest tube during positive pressure ventilation. Autopsy revealed no injury to the mediastinum and intrathoracic structure. Endoscopic closure of tracheal access site of NOTES with CoSeal appears to be a feasible technique.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
Critical Infrastructure Protection- Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bofman, Ryan K.
Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.
NASA Astrophysics Data System (ADS)
Francisco, Glen; Brown, Todd
2012-06-01
Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.
Prevedello, Luciano M; Erdal, Barbaros S; Ryu, John L; Little, Kevin J; Demirer, Mutlu; Qian, Songyue; White, Richard D
2017-12-01
Purpose To evaluate the performance of an artificial intelligence (AI) tool using a deep learning algorithm for detecting hemorrhage, mass effect, or hydrocephalus (HMH) at non-contrast material-enhanced head computed tomographic (CT) examinations and to determine algorithm performance for detection of suspected acute infarct (SAI). Materials and Methods This HIPAA-compliant retrospective study was completed after institutional review board approval. A training and validation dataset of noncontrast-enhanced head CT examinations that comprised 100 examinations of HMH, 22 of SAI, and 124 of noncritical findings was obtained resulting in 2583 representative images. Examinations were processed by using a convolutional neural network (deep learning) using two different window and level configurations (brain window and stroke window). AI algorithm performance was tested on a separate dataset containing 50 examinations with HMH findings, 15 with SAI findings, and 35 with noncritical findings. Results Final algorithm performance for HMH showed 90% (45 of 50) sensitivity (95% confidence interval [CI]: 78%, 97%) and 85% (68 of 80) specificity (95% CI: 76%, 92%), with area under the receiver operating characteristic curve (AUC) of 0.91 with the brain window. For SAI, the best performance was achieved with the stroke window showing 62% (13 of 21) sensitivity (95% CI: 38%, 82%) and 96% (27 of 28) specificity (95% CI: 82%, 100%), with AUC of 0.81. Conclusion AI using deep learning demonstrates promise for detecting critical findings at noncontrast-enhanced head CT. A dedicated algorithm was required to detect SAI. Detection of SAI showed lower sensitivity in comparison to detection of HMH, but showed reasonable performance. Findings support further investigation of the algorithm in a controlled and prospective clinical setting to determine whether it can independently screen noncontrast-enhanced head CT examinations and notify the interpreting radiologist of critical findings. © RSNA, 2017 Online supplemental material is available for this article.
77 FR 64818 - The Critical Infrastructure Partnership Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0033] The Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the [[Page 64819
Wilson, Ander; Chiu, Yueh-Hsiu Mathilda; Hsu, Hsiao-Hsien Leon; Wright, Robert O; Wright, Rosalind J; Coull, Brent A
2017-07-01
Epidemiological research supports an association between maternal exposure to air pollution during pregnancy and adverse children's health outcomes. Advances in exposure assessment and statistics allow for estimation of both critical windows of vulnerability and exposure effect heterogeneity. Simultaneous estimation of windows of vulnerability and effect heterogeneity can be accomplished by fitting a distributed lag model (DLM) stratified by subgroup. However, this can provide an incomplete picture of how effects vary across subgroups because it does not allow for subgroups to have the same window but different within-window effects or to have different windows but the same within-window effect. Because the timing of some developmental processes are common across subpopulations of infants while for others the timing differs across subgroups, both scenarios are important to consider when evaluating health risks of prenatal exposures. We propose a new approach that partitions the DLM into a constrained functional predictor that estimates windows of vulnerability and a scalar effect representing the within-window effect directly. The proposed method allows for heterogeneity in only the window, only the within-window effect, or both. In a simulation study we show that a model assuming a shared component across groups results in lower bias and mean squared error for the estimated windows and effects when that component is in fact constant across groups. We apply the proposed method to estimate windows of vulnerability in the association between prenatal exposures to fine particulate matter and each of birth weight and asthma incidence, and estimate how these associations vary by sex and maternal obesity status in a Boston-area prospective pre-birth cohort study. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Bird-Window Collisions: A Critical Animal Welfare and Conservation Issue.
Klem, Daniel
2015-01-01
Sheet glass and plastic in the form of clear and reflective windows are universally lethal to birds. Reasonable interpretation of available scientific evidence describes windows as a principal human-associated avian mortality factor that is an indiscriminant killer of common species as well as species of conservation concern. A conservative toll estimates 1 billion or more annual fatalities in the United States alone. The injury and death from birds striking windows are foreseeable and preventable, but the most promising legal measures and commercial products are not being applied or made available to protect defenseless victims. Avian window casualties are important for birds and people, and they have nonhuman animal welfare, biodiversity, sustainability, legal, and ethical and moral value justifying responsible human action. Preventing this unintended and unwanted lethal hazard for free-flying birds should be an obligation. Short-term solutions include retrofitting existing panes with a variety of proven measures that among others include applying various materials to cover the outside surface of windows. Long-term solutions include current and proposed bird-safe sheet glass and plastic for remodeling and new construction that have patterns that transform windows into barriers that birds see and avoid.
Critical field-exponents for secure message-passing in modular networks
NASA Astrophysics Data System (ADS)
Shekhtman, Louis M.; Danziger, Michael M.; Bonamassa, Ivan; Buldyrev, Sergey V.; Caldarelli, Guido; Zlatić, Vinko; Havlin, Shlomo
2018-05-01
We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order parameter (the size of the giant secure component) at the critical point to the field strength (average number of interlinks per node), and γ, which describes the susceptibility near criticality. These are found to be δ = 2 and γ = 1 (with the scaling of the order parameter near the critical point given by β = 1). When two or more vulnerabilities are equally present in a module we find δ = 1 and γ = 0 (with β ≥ 2). Apart from defining a previously unidentified universality class, these exponents show that increasing connections between modules is more beneficial for security than increasing connections within modules. We also measure the correlation critical exponent ν, and the upper critical dimension d c , finding that ν {d}c=3 as for ordinary percolation, suggesting that for secure message-passing d c = 6. These results provide an interesting analogy between secure message-passing in modular networks and the physics of magnetic spin-systems.
Illinois Kids Count 2003: The Window of Opportunity.
ERIC Educational Resources Information Center
Parente, Julie
This Kids Count report examines trends in the well-being of Illinois' children. The statistical portrait is based on 25 indicators in the areas of family, economic security, education, safety, and health. The indicators are: (1) child population and births; (2) language spoken at home; (3) children in two-parent families; (4) grandparents raising…
Keeping PCs up to Date Can Be Fun
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
The "joy" of computer maintenance takes many forms. These days, automation is the byword. Operating systems such as Microsoft Windows and utility suites such as Symantec's Norton Internet Security let you automatically keep crucial parts of your computer system up to date. It's fun to watch the technology keep tabs on itself. This document offers…
24 CFR 3285.801 - Exterior close-up.
Code of Federal Regulations, 2011 CFR
2011-04-01
... close-up strips/trim must be fastened securely and sealed with exterior sealant (see figure A to this... rear end walls. 2. The manufacturer must install doors/windows trimmed with J-rail or the equivalent... transport. Siding, starter trim, and vents may be shipped loose in the home for installation on set-up. 3...
An Empirical Measure of Computer Security Strength for Vulnerability Remediation
ERIC Educational Resources Information Center
Villegas, Rafael
2010-01-01
Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…
7 CFR 3560.103 - Maintaining housing projects.
Code of Federal Regulations, 2013 CFR
2013-01-01
... metal, free of rust. The housing project must have windows which are easily operated, free of bent... housing which is sound and the finish is free of chips, damage, or signs of rust. The range hood fan and... cooler and freezer are operating properly, the shelves and door containers are secure and free of rust...
7 CFR 3560.103 - Maintaining housing projects.
Code of Federal Regulations, 2012 CFR
2012-01-01
... metal, free of rust. The housing project must have windows which are easily operated, free of bent... housing which is sound and the finish is free of chips, damage, or signs of rust. The range hood fan and... cooler and freezer are operating properly, the shelves and door containers are secure and free of rust...
7 CFR 3560.103 - Maintaining housing proj-ects.
Code of Federal Regulations, 2014 CFR
2014-01-01
... metal, free of rust. The housing project must have windows which are easily operated, free of bent... housing which is sound and the finish is free of chips, damage, or signs of rust. The range hood fan and... cooler and freezer are operating properly, the shelves and door containers are secure and free of rust...
46 CFR 92.15-15 - Ventilation for crew quarters and, where provided, passenger spaces.
Code of Federal Regulations, 2014 CFR
2014-10-01
... spaces as are so located that under all ordinary conditions of weather, windows, ports, skylights, etc..., passenger spaces. 92.15-15 Section 92.15-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... quarters and, where provided, passenger spaces. (a) All living spaces shall be adequately ventilated in a...
46 CFR 92.15-15 - Ventilation for crew quarters and, where provided, passenger spaces.
Code of Federal Regulations, 2013 CFR
2013-10-01
... spaces as are so located that under all ordinary conditions of weather, windows, ports, skylights, etc..., passenger spaces. 92.15-15 Section 92.15-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... quarters and, where provided, passenger spaces. (a) All living spaces shall be adequately ventilated in a...
46 CFR 92.15-15 - Ventilation for crew quarters and, where provided, passenger spaces.
Code of Federal Regulations, 2012 CFR
2012-10-01
... spaces as are so located that under all ordinary conditions of weather, windows, ports, skylights, etc..., passenger spaces. 92.15-15 Section 92.15-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... quarters and, where provided, passenger spaces. (a) All living spaces shall be adequately ventilated in a...
46 CFR 92.15-15 - Ventilation for crew quarters and, where provided, passenger spaces.
Code of Federal Regulations, 2011 CFR
2011-10-01
... spaces as are so located that under all ordinary conditions of weather, windows, ports, skylights, etc..., passenger spaces. 92.15-15 Section 92.15-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... quarters and, where provided, passenger spaces. (a) All living spaces shall be adequately ventilated in a...
46 CFR 92.15-15 - Ventilation for crew quarters and, where provided, passenger spaces.
Code of Federal Regulations, 2010 CFR
2010-10-01
... spaces as are so located that under all ordinary conditions of weather, windows, ports, skylights, etc..., passenger spaces. 92.15-15 Section 92.15-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... quarters and, where provided, passenger spaces. (a) All living spaces shall be adequately ventilated in a...
Elmonoufy, Nourhan A.
2017-01-01
Hypoxia during embryonic growth in embryos is frequently a powerful determinant of development, but at least in avian embryos the effects appear to show considerable intra- and inter-specific variation. We hypothesized that some of this variation may arise from different protocols that may or may not result in exposure during the embryo’s critical window for hypoxic effects. To test this hypothesis, quail embryos (Coturnix coturnix) in the intact egg were exposed to hypoxia (~15% O2) during “early” (Day 0 through Day 5, abbreviated as D0-D5), “middle” (D6-D10) or “late” (D11-D15) incubation or for their entire 16–18 day incubation (“continuous hypoxia”) to determine critical windows for viability and growth. Viability, body mass, beak and toe length, heart mass, and hematology (hematocrit and hemoglobin concentration) were measured on D5, D10, D15 and at hatching typically between D16 and D18 Viability rate was ~50–70% immediately following the exposure period in the early, middle and late hypoxic groups, but viability improved in the early and late groups once normoxia was restored. Middle hypoxia groups showed continuing low viability, suggesting a critical period from D6-D10 for embryo viability. The continuous hypoxia group experienced viability reaching <10% after D15. Hypoxia, especially during late and continuous hypoxia, also inhibited growth of body, beak and toe when measured at D15. Full recovery to normal body mass upon hatching occurred in all other groups except for continuous hypoxia. Contrary to previous avian studies, heart mass, hematocrit and hemoglobin concentration were not altered by any hypoxic incubation pattern. Although hypoxia can inhibit embryo viability and organ growth during most incubation periods, the greatest effects result from continuous or middle incubation hypoxic exposure. Hypoxic inhibition of growth can subsequently be “repaired” by catch-up growth if a final period of normoxic development is available. Collectively, these data indicate a critical developmental window for hypoxia susceptibility during the mid-embryonic period of development. PMID:28926567
Burggren, Warren W; Elmonoufy, Nourhan A
2017-01-01
Hypoxia during embryonic growth in embryos is frequently a powerful determinant of development, but at least in avian embryos the effects appear to show considerable intra- and inter-specific variation. We hypothesized that some of this variation may arise from different protocols that may or may not result in exposure during the embryo's critical window for hypoxic effects. To test this hypothesis, quail embryos (Coturnix coturnix) in the intact egg were exposed to hypoxia (~15% O2) during "early" (Day 0 through Day 5, abbreviated as D0-D5), "middle" (D6-D10) or "late" (D11-D15) incubation or for their entire 16-18 day incubation ("continuous hypoxia") to determine critical windows for viability and growth. Viability, body mass, beak and toe length, heart mass, and hematology (hematocrit and hemoglobin concentration) were measured on D5, D10, D15 and at hatching typically between D16 and D18 Viability rate was ~50-70% immediately following the exposure period in the early, middle and late hypoxic groups, but viability improved in the early and late groups once normoxia was restored. Middle hypoxia groups showed continuing low viability, suggesting a critical period from D6-D10 for embryo viability. The continuous hypoxia group experienced viability reaching <10% after D15. Hypoxia, especially during late and continuous hypoxia, also inhibited growth of body, beak and toe when measured at D15. Full recovery to normal body mass upon hatching occurred in all other groups except for continuous hypoxia. Contrary to previous avian studies, heart mass, hematocrit and hemoglobin concentration were not altered by any hypoxic incubation pattern. Although hypoxia can inhibit embryo viability and organ growth during most incubation periods, the greatest effects result from continuous or middle incubation hypoxic exposure. Hypoxic inhibition of growth can subsequently be "repaired" by catch-up growth if a final period of normoxic development is available. Collectively, these data indicate a critical developmental window for hypoxia susceptibility during the mid-embryonic period of development.
Liu, Jingli; Yu, Pan; Qian, Wenyi; Li, Yan; Zhao, Jingjing; Huan, Fei; Wang, Jun; Xiao, Hang
2013-01-01
Bisphenol A (BPA) is a widespread endocrine-disrupting chemical used as the building block for polycarbonate plastics. Epidemiological evidence has correlated BPA exposure with higher risk of heart disease and type 2 diabetes. However, it remains unknown whether there are critical windows of susceptibility to BPA exposure on the development of dysglycemia. This study was an attempt to investigate the critical windows and the long-term consequences of perinatal exposure to BPA on glucose homeostasis. Pregnant mice were given either vehicle or BPA (100 µg/kg/day) at different time of perinatal stage: 1) on days 1–6 of pregnancy (P1–P6, preimplantation exposure); 2) from day 6 of pregnancy until postnatal day (PND) 0 (P6–PND0, fetal exposure); 3) from lactation until weaning (PND0–PND21, neonatal exposure); and 4) from day 6 of gestation until weaning (P6–PND21, fetal and neonatal exposure). At 3, 6 and 8 months of age, offspring in each group were challenged with glucose and insulin tolerance tests. Then islet morphometry and β-cell function were measured. The glucose homeostasis was impaired in P6-PND0 mice from 3 to 6 months of age, and this continued to 8 months in males, but not females. While in PND0-PND21 and P6-PND21 BPA-treated groups, only the 3-month-old male offspring developed glucose intolerance. Moreover, at the age of 3 months, perinatal exposure to BPA resulted in the increase of β-cell mass mainly due to the coordinate changes in cell replication, neogenesis, and apoptosis. The alterations of insulin secretion and insulin sensitivity, rather than β-cell mass, were consistent with the development of glucose intolerance. Our findings suggest that BPA may contribute to metabolic disorders relevant to glucose homeostasis and the effects of BPA were dose, sex, and time-dependent. Fetal development stage may be the critical window of susceptibility to BPA exposure. PMID:23675523
Social Security: Strengthening a Vital Safety Net for Latinos
ERIC Educational Resources Information Center
Cruz, Jeff
2012-01-01
Since 1935, Social Security has provided a vital safety net for millions of Americans who cannot work because of age or disability. This safety net has been especially critical for Americans of Latino decent, who number more than 50 million or nearly one out of every six Americans. Social Security is critical to Latinos because it is much more…
NASA Astrophysics Data System (ADS)
Ivanov, A. V.; Reva, I. L.; Babin, A. A.
2018-04-01
The article deals with influence of various ways to place vibration transmitters on efficiency of rooms safety for negotiations. Standing for remote vibration listening of window glass, electro-optical channel, the most typical technical channel of information leakage, was investigated. The modern system “Sonata-AB” of 4B model is used as an active protection tool. Factors influencing on security tools configuration efficiency have been determined. The results allow utilizer to reduce masking interference level as well as parasitic noise with keeping properties of room safety.
75 FR 21011 - Critical Infrastructure Partnership Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-22
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0032] Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council (CIPAC) charter renewal. SUMMARY: The Department of Homeland Security... and Outreach Division, Office of Infrastructure Protection, National Protection and Programs...
Exploring Windows Domain-Level Defenses Against Authentication Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, Jeff A.; Curtis, Laura
2016-01-01
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less
Ozone and hypertensive disorders of pregnancy in Florida: Identifying critical windows of exposure.
Hu, Hui; Ha, Sandie; Xu, Xiaohui
2017-02-01
Ozone (O 3 ) has been linked to hypertensive disorders of pregnancy (HDP). However, inconsistent results have been reported, and no study has examined the critical exposure windows during pregnancy. We used Florida birth vital statistics records to investigate the association between HDP and O 3 exposure among 655,529 pregnancies with conception dates between 2005 and 2007. Individual O 3 exposure was assessed at mothers' home address at the time of delivery using the Hierarchical Bayesian space-time statistical model. We examined the association during three predefined exposure windows including trimester 1, trimester 2, and trimesters 1&2, as well as in each week of the first two trimesters using distributed lag models. Pregnancies with HDP had a higher mean exposure to O 3 (39.07 in trimester 1, 39.02 in trimester 2, and 39.06 in trimesters 1&2, unit: ppb) than those without HDP (38.65 in trimester 1, 38.57 in trimester 2, and 38.61 in trimesters 1&2, unit: ppb). In the adjusted logistic regression model, increased odds of HDP were observed for each 5 ppb increase in O 3 (OR Trimester1 =1.04, 95% CI: 1.03, 1.06; OR Trimester2 =1.03, 95% CI: 1.02, 1.04; OR Trimester1&2 =1.07, 95% CI: 1.05, 1.08). In the distributed lag models, elevated odds of HDP were observed with increased O 3 exposure during the 1st to 24th weeks of gestation, with higher odds during early pregnancy. O 3 exposure during pregnancy is related to increased odds of HDP, and early pregnancy appears to be a potentially critical window of exposure. Copyright © 2016 Elsevier Inc. All rights reserved.
Kaschner, Holger; Jordan, Tim
The German government is seeking to enhance the resilience of critical national infrastructures via its new IT Security Law. This paper analyses the content of the law, as well as the limitations and constraints arising from the conflicting interests of affected stakeholders. The paper also offers solutions to help the IT Security Law fulfil its potential despite the constraints.
Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jason Wright
Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less
ERIC Educational Resources Information Center
Dowd, Jason E.; Thompson, Robert J., Jr.; Schif, Leslie A.; Reynolds, Julie A.
2018-01-01
Developing critical-thinking and scientific reasoning skills are core learning objectives of science education, but little empirical evidence exists regarding the interrelationships between these constructs. Writing effectively fosters students' development of these constructs, and it offers a unique window into studying how they relate. In this…
Multilayer Anti-Reflective Coating Development for PMMA Fresnel Lenses
2010-06-07
been sputter deposited on UV transparent polymethylmethacrylate (UVT-PMMA) windows. The amorphous coatings are deposited using reactive sputtering in a...SUBJECT TERMS Anti-reflective coatings, Fresnel lens, polymethylmethacrylate , PMMA 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...high quality dielectric materials deposited on a variety of substrates including polymethylmethacrylate (PMMA) Highly amorphous films achieved
Investigating the Limitations of Advanced Design Methods through Real World Application
2016-03-31
36 War Room Laptop Display ( MySQL , JMP 9 Pro, 64-bit Windows) Georgia Tech Secure Collaborative Visualization Environment ( MySQL , JMP 9 Pro...investigate expanding the EA for VC3ATS • Would like to consider both an expansion of the use of current Java -based BPM approach and other potential EA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
...] through Web CRD [System], by a Member immediately following the date of termination, but in no event later...) above, in the event that the Member learns of facts or circumstances causing any information set forth... through a window or by video monitor. The individual responsible for proctoring at each administration...
South Carolina's SC LENDS: Optimizing Libraries, Transforming Lending
ERIC Educational Resources Information Center
Hamby, Rogan; McBride, Ray; Lundberg, Maria
2011-01-01
Since SC LENDS started operating in June 2009, more public libraries have come on board. All of this on the back end connects to a Mozilla-based staff client that has distributions for Mac OS X and Microsoft Windows, using SSL encryption to keep communications secure and private between remote libraries and the servers hosted at a high-end…
Top 10 Threats to Computer Systems Include Professors and Students
ERIC Educational Resources Information Center
Young, Jeffrey R.
2008-01-01
User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…
The round window region and contiguous areas: endoscopic anatomy and surgical implications.
Marchioni, Daniele; Alicandri-Ciufelli, Matteo; Pothier, David D; Rubini, Alessia; Presutti, Livio
2015-05-01
The round window region is a critical area of the middle ear; the aim of this paper is to describe its anatomy from an endoscopic perspective, emphasizing some structures, the knowledge of which could have important implications during surgery, as well as to evaluate what involvement cholesteatoma may have with these structures. Retrospective review of video recordings of endoscopic ear surgeries and retrospective database review were conducted in Tertiary university referral center. Videos from endoscopic middle ear procedures carried out between June 2010 and September 2012 and stored in a shared database were reviewed retrospectively. Surgeries in which an endoscopic magnification of the round window region and the inferior retrotympanum area was performed intraoperatively were included in the study. Involvement by cholesteatoma of those regions was also documented based on information obtained from the surgical database. Conformation of the tegmen of the round window niche may influence the surgical view of round window membrane. A structure connecting the round window area to the petrous apex, named the subcochlear canaliculus, is described. Cholesteatoma can invade the round window areas in some patients. Endoscopic approaches can guarantee a very detailed view and allow the exploration of the round window region. Exact anatomical knowledge of this region can have important advantages during surgery, since some pathology can invade inside cavities or tunnels otherwise not seen by instrumentation that produces a straight-line view (e.g. microscope).
Round window chamber and fustis: endoscopic anatomy and surgical implications.
Marchioni, Daniele; Soloperto, Davide; Colleselli, Elena; Tatti, Maria Fatima; Patel, Nirmal; Jufas, Nicholas
2016-11-01
The round window region is of critical importance in the anatomy of the middle ear. The aim of this paper is to describe its anatomy from an endoscopic point of view, emphasizing structures that have important surgical implications, in particular the fustis and the subcochlear canaliculus. The fustis, a smooth bony structure that forms the floor of the round window region, is a constant and important structure. It seems to indicate the round window membrane and the correct position of scala tympani. A structure connecting the round window region to the petrous apex, named the subcochlear canaliculus, is also described. A retrospective review of video recordings of endoscopic dissection and surgical procedures, carried out between June 2014 and February 2015, was conducted across two Tertiary university referral centers. A total of 42 dissections were analyzed in the study. We observed the fustis in all the cases and we identify two different anatomical conformations. The subcochlear canaliculus was found in 81.0 %, with a pneumatization direct to the petrous apex in 47.7 %. Conformation and limits of the round window niche may influence the surgical view of the round window membrane. Endoscopic approaches allow a very detailed view, which enables a comprehensive exploration of the round window region. Accurate knowledge of the anatomical relationships of this region has important advantages during middle ear surgery.
Proactive Security Testing and Fuzzing
NASA Astrophysics Data System (ADS)
Takanen, Ari
Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.
ERIC Educational Resources Information Center
Morsey, Christopher
2017-01-01
In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…
NASA Astrophysics Data System (ADS)
Cybulskis, Viktor J.; Harris, James W.; Zvinevich, Yury; Ribeiro, Fabio H.; Gounder, Rajamani
2016-10-01
A design is presented for a versatile transmission infrared cell that can interface with an external vacuum manifold to undergo in situ gas treatments and receive controlled doses of various adsorbates and probe molecules, allowing characterization of heterogeneous catalyst surfaces in order to identify and quantify active sites and adsorbed surface species. Critical design characteristics include customized temperature control for operation between cryogenic and elevated temperatures (100-1000 K) and modified Cajon fittings for operation over a wide pressure range (10-2-103 Torr) that eliminates the complications introduced when using sealants or flanges to secure cell windows. The customized, hand-tightened Cajon fittings simplify operation of the cell compared to previously reported designs, because they allow for rapid cell assembly and disassembly and, in turn, replacement of catalyst samples. In order to validate the performance of the cell, transmission infrared spectroscopic experiments are reported to characterize the Brønsted and Lewis acid sites present in H-beta and H-mordenite zeolites using cryogenic adsorption of CO (<150 K).
PlaIMoS: A Remote Mobile Healthcare Platform to Monitor Cardiovascular and Respiratory Variables
Miramontes, Ramses; Aquino, Raúl; Flores, Arturo; Rodríguez, Guillermo; Anguiano, Rafael; Ríos, Arturo; Edwards, Arthur
2017-01-01
The number of elderly and chronically ill patients has grown significantly over the past few decades as life expectancy has increased worldwide, leading to increased demands on the health care system and significantly taxing traditional health care practices. Consequently, there is an urgent need to use technology to innovate and more constantly and intensely monitor, report and analyze critical patient physiological parameters beyond conventional clinical settings in a more efficient and cost effective manner. This paper presents a technological platform called PlaIMoS which consists of wearable sensors, a fixed measurement station, a network infrastructure that employs IEEE 802.15.4 and IEEE 802.11 to transmit data with security mechanisms, a server to analyze all information collected and apps for iOS, Android and Windows 10 mobile operating systems to provide real-time measurements. The developed architecture, designed primarily to record and report electrocardiogram and heart rate data, also monitors parameters associated with chronic respiratory illnesses, including patient blood oxygen saturation and respiration rate, body temperature, fall detection and galvanic resistance. PMID:28106832
PlaIMoS: A Remote Mobile Healthcare Platform to Monitor Cardiovascular and Respiratory Variables.
Miramontes, Ramses; Aquino, Raúl; Flores, Arturo; Rodríguez, Guillermo; Anguiano, Rafael; Ríos, Arturo; Edwards, Arthur
2017-01-19
The number of elderly and chronically ill patients has grown significantly over the past few decades as life expectancy has increased worldwide, leading to increased demands on the health care system and significantly taxing traditional health care practices. Consequently, there is an urgent need to use technology to innovate and more constantly and intensely monitor, report and analyze critical patient physiological parameters beyond conventional clinical settings in a more efficient and cost effective manner. This paper presents a technological platform called PlaIMoS which consists of wearable sensors, a fixed measurement station, a network infrastructure that employs IEEE 802.15.4 and IEEE 802.11 to transmit data with security mechanisms, a server to analyze all information collected and apps for iOS, Android and Windows 10 mobile operating systems to provide real-time measurements. The developed architecture, designed primarily to record and report electrocardiogram and heart rate data, also monitors parameters associated with chronic respiratory illnesses, including patient blood oxygen saturation and respiration rate, body temperature, fall detection and galvanic resistance.
Cybulskis, Viktor J; Harris, James W; Zvinevich, Yury; Ribeiro, Fabio H; Gounder, Rajamani
2016-10-01
A design is presented for a versatile transmission infrared cell that can interface with an external vacuum manifold to undergo in situ gas treatments and receive controlled doses of various adsorbates and probe molecules, allowing characterization of heterogeneous catalyst surfaces in order to identify and quantify active sites and adsorbed surface species. Critical design characteristics include customized temperature control for operation between cryogenic and elevated temperatures (100-1000 K) and modified Cajon fittings for operation over a wide pressure range (10 -2 -10 3 Torr) that eliminates the complications introduced when using sealants or flanges to secure cell windows. The customized, hand-tightened Cajon fittings simplify operation of the cell compared to previously reported designs, because they allow for rapid cell assembly and disassembly and, in turn, replacement of catalyst samples. In order to validate the performance of the cell, transmission infrared spectroscopic experiments are reported to characterize the Brønsted and Lewis acid sites present in H-beta and H-mordenite zeolites using cryogenic adsorption of CO (<150 K).
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
NASA Astrophysics Data System (ADS)
Spafford, Eugene H.
The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.
Leap Frog Digital Sensors and Definition, Integration & Testing FY 2003 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Shoemaker, Steven V.
2003-12-31
The objective of Leap Frog is to develop a comprehensive security tool that is transparent to the user community and more effective than current methods for preventing and detecting security compromises of critical physical and digital assets. Current security tools intrude on the people that interact with these critical assets by requiring them to perform additional functions or having additional visible sensors. Leap Frog takes security to the next level by being more effective and reducing the adverse impact on the people interacting with protected assets.
Model Analyst’s Toolkit User Guide, Version 7.1.0
2015-08-01
Help > About) Environment details ( operating system ) metronome.log file, located in your MAT 7.1.0 installation folder Any log file that...requirements to run the Model Analyst’s Toolkit: Windows XP operating system (or higher) with Service Pack 2 and all critical Windows updates installed...application icon on your desktop Create a Quick Launch icon – Creates a MAT application icon on the taskbar for operating systems released
Olshavsky, Megan E; Song, Bryan J; Powell, Daniel J; Jones, Carolyn E; Monfils, Marie-H; Lee, Hongjoo J
2013-01-01
When presented with a light cue followed by food, some rats simply approach the foodcup (Nonorienters), while others first orient to the light in addition to displaying the food-cup approach behavior (Orienters). Cue-directed orienting may reflect enhanced attentional and/or emotional processing of the cue, suggesting divergent natures of cue-information processing in Orienters and Nonorienters. The current studies investigate how differences in cue processing might manifest in appetitive memory retrieval and updating using a paradigm developed to persistently attenuate fear responses (Retrieval-extinction paradigm; Monfils et al., 2009). First, we examined whether the retrieval-extinction paradigm could attenuate appetitive responses in Orienters and Nonorienters. Next, we investigated if the appetitive memory could be updated using reversal learning (fear conditioning) during the reconsolidation window (as opposed to repeated unreinforced trials, i.e., extinction). Both extinction and new fear learning given within the reconsolidation window were effective at persistently updating the initial appetitive memory in the Orienters, but not the Nonorienters. Since conditioned orienting is mediated by the amygdala central nucleus (CeA), our final experiment examined the CeA's role in the retrieval-extinction process. Bilateral CeA lesions interfered with the retrieval-extinction paradigm-did not prevent spontaneous recovery of food-cup approach. Together, our studies demonstrate the critical role of conditioned orienting behavior and the CeA in updating appetitive memory during the reconsolidation window.
Security for safety critical space borne systems
NASA Technical Reports Server (NTRS)
Legrand, Sue
1987-01-01
The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.
Sound Velocity and Strength of Beryllium along the Principal Hugoniot using Quartz Windows
NASA Astrophysics Data System (ADS)
McCoy, Chad; Knudson, Marcus; Desjarlais, Michael
2017-06-01
The measurement of the interface wave profile is a traditional method to determine the strength of a shocked material. A novel technique was developed to enable wave profile measurements with quartz windows, extending the range of pressures where wave profile measurements are possible beyond lithium fluoride windows. The technique uses the quartz sound velocity to map Lagrangian characteristics from the shock front back to the material interface and determine the particle velocity profile in a sample. This technique was applied to experiments conducted on beryllium at the Sandia Z Accelerator. We present measurements of the longitudinal and bulk sound velocity across the beryllium shock-melt transition and the strength of solid beryllium for pressures from 130 to 200 GPa. Sandia National Laboratories is a multi-mission laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
Romine, Jason G.; Benjamin, Joseph R.; Perry, Russell W.; Casal, Lynne; Connolly, Patrick J.; Sauter, Sally S.
2013-01-01
Marine subsidies can play an important role in the growth, survival, and migratory behavior of rearing juvenile salmonids. Availability of high-energy, marine-derived food sources during critical decision windows may influence the timing of emigration or the decision to forego emigration completely and remain in the freshwater environment. Increasing growth and growth rate during these decision windows may result in an altered juvenile population structure, which will ultimately affect the adult population age-structure. We used a state dependent model to understand how the juvenile Oncorhynchus mykiss population structure may respond to increased availability of salmon eggs in their diet during critical decision windows. Our models predicted an increase in smolt production until coho salmon eggs comprised more than 50 percent of juvenile O. mykiss diet at the peak of the spawning run. At higher-than intermediate levels of egg consumption, smolt production decreased owing to increasing numbers of fish adopting a resident life-history strategy. Additionally, greater growth rates decreased the number of age-3 smolts and increased the number of age-2 smolts. Increased growth rates with higher egg consumption also decreased the age at which fish adopted the resident pathway. Our models suggest that the introduction of a high-energy food source during critical periods of the year could be sufficient to increase smolt production.
Federal Funding for Health Security in FY2017.
Boddie, Crystal; Watson, Matthew; Sell, Tara Kirk
2016-01-01
This latest article in the Federal Funding for Health Security series assesses FY2017 US government funding in 5 domains critical to strengthening health security: biosecurity, radiological and nuclear security, chemical security, pandemic influenza and emerging infectious disease, and multiple-hazard and general preparedness.
Design and RF measurements of a 5 GHz 500 kW window for the ITER LHCD system
NASA Astrophysics Data System (ADS)
Hillairet, J.; Achard, J.; Bae, Y. S.; Bernard, J. M.; Dechambre, N.; Delpech, L.; Ekedahl, A.; Faure, N.; Goniche, M.; Kim, J.; Larroque, S.; Magne, R.; Marfisi, L.; Namkung, W.; Park, H.; Park, S.; Poli, S.; Vulliez, K.
2014-02-01
CEA/IRFM is conducting R&D efforts in order to validate the critical RF components of the 5 GHz ITER LHCD system, which is expected to transmit 20 MW of RF power to the plasma. Two 5 GHz 500 kW BeO pill-box type window prototypes have been manufactured in 2012 by the PMB Company, in close collaboration with CEA/IRFM. Both windows have been validated at low power, showing good agreement between measured and modeling, with a return loss better than 32 dB and an insertion loss below 0.05 dB. This paper reports on the window RF design and the low power measurements. The high power tests up to 500kW have been carried out in March 2013 in collaboration with NFRI. Results of these tests are also reported.
Investigations on the carbon contaminations on the alkali cells of DPAL with hydrocarbon buffer gas
NASA Astrophysics Data System (ADS)
Li, Zhiyong; Tan, Rongqing; Wang, Yujie; Ye, Qing; Bian, Jintian; Huang, Wei; Li, Hui; Han, Gaoce
2017-10-01
Diode pumped alkali laser (DPAL) with hydrocarbon buffer gases has the features of low threshold and high efficiency. The chemical reaction between alkali and hydrocarbon gases affects the life time of DPAL. In this paper, a method based on Fourier transform infrared spectroscopy and Lambert-Beer law is adopted to find a safe temperature at which DPAL runs for a long term. A theoretical model is established to figure out ways to reduce the peak temperature in the cell window. The results indicates that 170 °C is a safe temperature. Although the absorbance of the cell window to the pump light and alkali laser is lower, there is temperature increase. Small light-transmitting area and air blowing on the windows can reduce the peak temperature effectively. Cooling the cell window is essential and critical in a long-term running DPAL.
Low-E Storm Windows Gain Acceptance as a Home Weatherization Measure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gilbride, Theresa L.; Cort, Katherine A.
This article for Home Energy Magazine describes work by the U.S. Department of Energy to develop low-emissivity storm windows as an energy efficiency-retrofit option for existing homes. The article describes the low-emissivity invisible silver metal coatings on the glass, which reflect heat back into the home in winter or back outside in summer and the benefits of low-e storm windows including insulation, air sealing, noise blocking, protection of antique windows, etc. The article also describes Pacific Northwest National Laboratory's efforts on behalf of DOE to overcome market barriers to adoption of the technology, including performance validation studies in the PNNLmore » Lab Homes, cost effectiveness analysis, production of reports, brochures, how-to guides on low-e storm window installation for the Building America Solution Center, and a video posted on YouTube. PNNL's efforts were reviewed by the Pacific Northwest Regional Technical Forum (RTF), which serves as the advisory board to the Pacific Northwest Electric Power Planning Council and Bonneville Power Administration. In late July 2015, the RTF approved the low-e storm window measure’s savings and specifications, a critical step in integrating low-e storm windows into energy-efficiency planning and utility weatherization and incentive programs. PNNL estimates that more than 90 million homes in the United States with single-pane or low-performing double-pane windows would benefit from the technology. Low-e storm windows are suitable not only for private residences but also for small commercial buildings, historic properties, and facilities that house residents, such as nursing homes, dormitories, and in-patient facilities. To further assist in the market transformation of low-e storm windows and other high-efficiency window attachments, DOE helped found the window Attachment Energy Rating Council (AERC) in 2015. AERC is an independent, public interest, non-profit organization whose mission is to rate, label, and certify the performance of window attachments.« less
Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets
2001-11-09
COMPUTER SECURITY Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Statement of Robert F. Dacey Director, Information...Improvements Needed to Reduce Risk to Critical Federal Operations and Assets Contract Number Grant Number Program Element Number Author(s...The benefits have been enormous. Vast amounts of information are now literally at our fingertips, facilitating research on virtually every topic
NASA Astrophysics Data System (ADS)
Yan, Xin; Zhang, Ling; Wu, Yang; Luo, Youlong; Zhang, Xiaoxing
2017-02-01
As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.
Federal Funding for Health Security in FY2017
Watson, Matthew; Sell, Tara Kirk
2016-01-01
This latest article in the Federal Funding for Health Security series assesses FY2017 US government funding in 5 domains critical to strengthening health security: biosecurity, radiological and nuclear security, chemical security, pandemic influenza and emerging infectious disease, and multiple-hazard and general preparedness. PMID:27575382
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
Space Commerce 1994 Forum: The 10th National Space Symposium. Proceedings report
NASA Astrophysics Data System (ADS)
Lipskin, Beth Ann; Patterson, Sara; Aragon, Larry; Brescia, David A.; Flannery, Jack; Mossey, Roberty; Regan, Christopher; Steeby, Kurt; Suhr, Stacy; Zimkas, Chuck
1994-04-01
The theme of the 10th National Space Symposium was 'New Windows of Opportunity'. These proceedings cover the following: Business Trends in High Tech Commercialization; How to Succeed in Space Technology Business -- Making Dollars and Sense; Obstacles and Opportunities to Success in Technology Commercialization NASA's Commercial Technology Mission -- a New Way of Doing Business: Policy and Practices; Field Center Practices; Practices in Action -- A New Way: Implementation and Business Opportunities; Space Commerce Review; Windows of Opportunity; the International Space Station; Space Support Forum; Spacelift Update; Competitive Launch Capabilities; Supporting Life on Planet Earth; National Security Space Issues; NASA in the Balance; Earth and Space Observations -- Did We Have Cousins on Mars?; NASA: A New Vision for Science; and Space Technology Hall of Fame.
Space Commerce 1994 Forum: The 10th National Space Symposium. Proceedings report
NASA Technical Reports Server (NTRS)
Lipskin, Beth Ann (Editor); Patterson, Sara (Editor); Aragon, Larry (Editor); Brescia, David A. (Editor); Flannery, Jack (Editor); Mossey, Roberty (Editor); Regan, Christopher (Editor); Steeby, Kurt (Editor); Suhr, Stacy (Editor); Zimkas, Chuck (Editor)
1994-01-01
The theme of the 10th National Space Symposium was 'New Windows of Opportunity'. These proceedings cover the following: Business Trends in High Tech Commercialization; How to Succeed in Space Technology Business -- Making Dollars and Sense; Obstacles and Opportunities to Success in Technology Commercialization NASA's Commercial Technology Mission -- a New Way of Doing Business: Policy and Practices; Field Center Practices; Practices in Action -- A New Way: Implementation and Business Opportunities; Space Commerce Review; Windows of Opportunity; the International Space Station; Space Support Forum; Spacelift Update; Competitive Launch Capabilities; Supporting Life on Planet Earth; National Security Space Issues; NASA in the Balance; Earth and Space Observations -- Did We Have Cousins on Mars?; NASA: A New Vision for Science; and Space Technology Hall of Fame.
1989-01-01
heart disease as described by the National Institutes of Health Conference on Obesity. Fat is clearly the culprit, not total body weight. Overweight is...requiring high-level security clearance, long lead time and specialized training, or overseas screening. This expanded window will allow most personnel with ...replaced with a comprehensive Career Leader Development Program (CLDP). CLDP will include Petty officer Indoctrination Course (POIC); Chief Petty officer
17. Interior view of courtroom looking towards judge's bench; showing ...
17. Interior view of courtroom looking towards judge's bench; showing built in linear seating on both ends of room, clerical desk and equipment, through wall air conditioning units, exterior windows and door; north end of west wing on top floor; view to northwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
Investigation of Antiangiogenic Mechanisms Using Novel Imaging Techniques
2010-02-01
of the tumor environment can sensitize the tumor to conventional cytotoxic therapies. To this end, we employ the window chamber model to optically ...facilitate longitudinal, in vivo investigation into the parameters of interest. These include Doppler Optical Coherence Tomography for the measurement of... Optical Techniques, Tumor Pathophysiology, Treatment Response, Vascular Normalization 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18
Doing Windows: Non-Traditional Military Responses to Complex Emergencies
1997-09-01
achieving civil stability and durable peace in states embroiled in complex emergencies. A complex emergency is one which draws every sector of society ...a stable, civil society ? The project involved three distinct phases. First, we conducted an extensive literature review to frame the issues used in...Pursue sustainable security through prevention, mitigation, and preparedness Integrate existing capacities of all elements of society
Report on Progress Toward Security and Stability in Afghanistan
2013-11-01
administered by the World Bank; contributors are Australia ($5.9 million), Finland ($2.5 million) and the United States ($50 million). Window B is...workshops for female extension personnel, launched on- farm grain storage trials, and conducted training on agro-ecosystem observation and analysis...Upcoming training will focus on wheat and vegetable production, marketing, post-harvest storage, farm financial management, and participatory
Critical theory as an approach to the ethics of information security.
Stahl, Bernd Carsten; Doherty, Neil F; Shaw, Mark; Janicke, Helge
2014-09-01
Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.
NASA Astrophysics Data System (ADS)
Bashutin, O. A.; Savelov, A. S.; Sidorov, P. P.
2017-12-01
Mechanical and thermal impact of the plasma focus discharge on structural elements of diagnostic windows of the PFM-72m discharge installation are calculated. The absence of critical impact at early discharge stages and during the first 300 ns after the "plasma focus" formation is shown. The possibility of shock impact on the surface of diagnostic windows at later times, which may result in their substantial deformation and destruction, is demonstrated.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... from TSA's Corporate Security Review (CSR) in that a CSR looks at corporate or company-wide security... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent to Request Renewal... of the Top 100 Most Critical Pipelines AGENCY: Transportation Security Administration, DHS. ACTION...
Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure
2013-03-01
protection has become a matter of national security, public safety, and economic stability . It is imperative the U.S. Government (USG) examine current...recommendations for federal responsibilities and legislation to direct nation critical infrastructure efforts to ensure national security, public safety and economic stability .
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-27
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Directorate; National Infrastructure Advisory Council Meeting AGENCY: National Protection and Programs...
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miles McQueen; Annarita Giani
2011-09-01
This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhancedmore » resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.« less
Mueller, Casey A; Eme, John; Manzon, Richard G; Somers, Christopher M; Boreham, Douglas R; Wilson, Joanna Y
2015-04-01
The timing, success and energetics of fish embryonic development are strongly influenced by temperature. However, it is unclear if there are developmental periods, or critical windows, when oxygen use, survival and hatchling phenotypic characteristics are particularly influenced by changes in the thermal environment. Therefore, we examined the effects of constant incubation temperature and thermal shifts on survival, hatchling phenotype, and cost of development in lake whitefish (Coregonus clupeaformis) embryos. We incubated whitefish embryos at control temperatures of 2, 5, or 8 °C, and shifted embryos across these three temperatures at the end of gastrulation or organogenesis. We assessed hatch timing, mass at hatch, and yolk conversion efficiency (YCE). We determined cost of development, the amount of oxygen required to build a unit of mass, for the periods from fertilization-organogenesis, organogenesis-fin flutter, fin flutter-hatch, and for total development. An increase in incubation temperature decreased time to 50 % hatch (164 days at 2 °C, 104 days at 5 °C, and 63 days at 8 °C), survival decreased from 55 % at 2 °C, to 38 % at 5 °C, and 17 % at 8 °C, and hatchling yolk-free dry mass decreased from 1.27 mg at 2 °C to 0.61 mg at 8 °C. Thermal shifts altered time to 50 % hatch and hatchling yolk-free dry mass and revealed a critical window during gastrulation in which a temperature change reduced survival. YCE decreased and cost of development increased with increased incubation temperature, but embryos that hatched at 8 °C and were incubated at colder temperatures during fertilization-organogenesis had reduced cost. The relationship between cost of development and temperature was altered during fin flutter-hatch, indicating it may be a critical window during which temperature has the greatest impact on energetic processes. The increase in cost of development with an increase in temperature has not been documented in other fishes and suggests whitefish embryos are more energy efficient at colder temperatures.
Eme, J; Mueller, C A; Manzon, R G; Somers, C M; Boreham, D R; Wilson, J Y
2015-01-01
Critical windows are periods of developmental susceptibility when the phenotype of an embryonic, juvenile or adult animal may be vulnerable to environmental fluctuations. Temperature has pervasive effects on poikilotherm physiology, and embryos are especially vulnerable to temperature shifts. To identify critical windows, we incubated whitefish embryos at control temperatures of 2°C, 5°C, or 8°C, and shifted treatments among temperatures at the end of gastrulation or organogenesis. Heart rate (fH) and oxygen consumption ( [Formula: see text] ) were measured across embryonic development, and [Formula: see text] was measured in 1-day old hatchlings. Thermal shifts, up or down, from initial incubation temperatures caused persistent changes in fH and [Formula: see text] compared to control embryos measured at the same temperature (2°C, 5°C, or 8°C). Most prominently, when embryos were measured at organogenesis, shifting incubation temperature after gastrulation significantly lowered [Formula: see text] or fH. Incubation at 2°C or 5°C through gastrulation significantly lowered [Formula: see text] (42% decrease) and fH (20% decrease) at 8°C, incubation at 2°C significantly lowered [Formula: see text] (40% decrease) and fH (30% decrease) at 5°C, and incubation at 5°C and 8°C significantly lowered [Formula: see text] at 2°C (27% decrease). Through the latter half of development, [Formula: see text] and fH in embryos were not different from control values for thermally shifted treatments. However, in hatchlings measured at 2°C, [Formula: see text] was higher in groups incubated at 5°C or 8°C through organogenesis, compared to 2°C controls (43 or 65% increase, respectively). Collectively, these data suggest that embryonic development through organogenesis represents a critical window of embryonic and hatchling phenotypic plasticity. This study presents an experimental design that identified thermally sensitive periods for fish embryos. Crown Copyright © 2014. Published by Elsevier Inc. All rights reserved.
3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009
Code of Federal Regulations, 2010 CFR
2010-01-01
... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...
Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A
2014-08-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.
Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.
2014-01-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148
76 FR 63202 - Security Zones; Captain of the Port Lake Michigan Zone
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-12
...-AA87 Security Zones; Captain of the Port Lake Michigan Zone AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: Based on a review of safety and security zones around critical infrastructure in the... Chicago Harbor & Burnham Park Harbor--Safety and Security Zone regulation and the Security Zones; Captain...
DOT National Transportation Integrated Search
2001-09-20
A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...
Window of visibility - A psychophysical theory of fidelity in time-sampled visual motion displays
NASA Technical Reports Server (NTRS)
Watson, A. B.; Ahumada, A. J., Jr.; Farrell, J. E.
1986-01-01
A film of an object in motion presents on the screen a sequence of static views, while the human observer sees the object moving smoothly across the screen. Questions related to the perceptual identity of continuous and stroboscopic displays are examined. Time-sampled moving images are considered along with the contrast distribution of continuous motion, the contrast distribution of stroboscopic motion, the frequency spectrum of continuous motion, the frequency spectrum of stroboscopic motion, the approximation of the limits of human visual sensitivity to spatial and temporal frequencies by a window of visibility, the critical sampling frequency, the contrast distribution of staircase motion and the frequency spectrum of this motion, and the spatial dependence of the critical sampling frequency. Attention is given to apparent motion, models of motion, image recording, and computer-generated imagery.
Software For Computer-Security Audits
NASA Technical Reports Server (NTRS)
Arndt, Kate; Lonsford, Emily
1994-01-01
Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.
2015-06-01
National Instruments. The National Instruments DAQ is a full-featured PC running Windows 7. The DAQ, electromagnetic transmitter , and batteries for the... electromagnetic induction Environet Environet, Inc. ESTCP Environmental Security Technology Certification Program ftp file transfer protocol FUDS formerly used...capabilities of a currently available advanced electromagnetic induction sensor developed specifically for discrimination on real sites under operational
ERIC Educational Resources Information Center
Sahito, Zafarullah; Vaisanen, Pertti
2017-01-01
This research paper is a reflection of the results of collected data from Teacher Educators (TEs) regarding their skills and expertise in Information and Communication Technologies (ICT). Seven themes were inductively identified and called, 7Es like as: (a). Expertise in use of windows programmes; (b). Expertise in use of security measures; (c).…
Lessons Learned in Cyberspace Security
2014-06-01
software; something undesirable is packaged together with something desirable. A classic example was Elf Bowling attachment, which ran rampant through...the authors’ former school. It combined a fun program featuring elves as bowling pins, however it was packaged with SubSeven (Sub7) malware that...allowed remote access to the infected machine. IExpress, which is delivered in the Windows OS, is one of the legitimate tools for packaging multiple
Religious Radicalism and Security in South Asia
2004-01-01
terrorists from visiting “schools, colleges … theaters, cinemas , fairs, amusement parks, hotels, clubs, restaurants, tea shops … railway stations...captured one Malaysian and one or two supporters from Burma.”45 428 BERTIL LINTNER 41. See also Jim Garamone, “Bin Laden and the Al-Qaeda Network...history, tragedy, drama, comedy, mime, painting, stained glass windows, cinema , comics, news items, and conversation. See Roland Barthes, “Introduction
DOE Office of Scientific and Technical Information (OSTI.GOV)
Werner, Mike
Why this utility? After years of upgrading the Java Runtime Environment (JRE) or the Java Software Development Kit (JDK/SDK), a Windows computer becomes littered with so many old versions that the machine may become a security risk due to exploits targeted at those older versions. This utility helps mitigate those vulnerabilities by searching for, and removing, versions 1.3.x thru 1.7.x of the Java JRE and/or JDK/SDK.
Comparative U.S.-Israeli Homeland Security
2006-06-01
perception is the economic benefit that the United States receives from such a porous border in the form of inexpensive guest labor. Taking this argument...housing Israeli families have been back-fitted with bulletproof glass in windows that face Palestinian neighborhoods. On a much larger scale, Israel has...without requiring a metal cover; dealing with ceilings ; and creating and enforcing building codes for commercial structures so they can withstand
Cyr, Maeve; Pasalich, Dave S; McMahon, Robert J; Spieker, Susan J
2014-10-01
This study examined whether infant attachment security moderates the association between parenting in preschool and later aggressive behavior among a sample of children at high risk for developing conduct problems. Participants were 82 adolescent mother-child dyads recruited from the community. Infant attachment status at age 1 year was measured using the Strange Situation. When children were aged 4.5 years, mothers reported on their self-efficacy in regards to parenting, and mothers' positive parenting and criticism were coded from direct observations of parent-child interactions. In grade 1, mothers reported on their children's aggressive behavior. Infant secure attachment significantly moderated the association between observed maternal criticism and child aggression. That is, among insecurely attached children, higher levels of maternal criticism were associated with more severe aggression. This longitudinal finding suggests that a secure attachment may buffer the deleterious effects of harsh parenting on child aggression.
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
DOT National Transportation Integrated Search
2013-07-29
The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...
NASA Astrophysics Data System (ADS)
Mohammadi, Hadi
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.
Optical Studies of Pure Fluids about Their Critical Points
NASA Astrophysics Data System (ADS)
Pang, Kian Tiong
Three optical experiments were performed on pure fluids near their critical points. In the first two setups, CH_3F and H_2C:CF _2 were each tested in a temperature -controlled, prism-shaped cell and a thin parallel-windows cell. In the prism cell, a laser beam was additionally deflected by the fluid present. From the deflection data, the refractive index was related to the density to find the Lorentz-Lorenz function. Critical temperature (T _{c}), density, refractive index and electronic polarizability were found. In the second experiment, a critically-filled, thin parallel-windows cell was placed in one arm of a Mach-Zehnder interoferometer. Fluid density was monitored by changes in the fringe pattern with changing cell temperature. The aim was to improve on the precision of T_{c}: T_{c}{rm (CH}_3 F) = (44cdot9087 +/- 0cdot0002)C; T _{c}{rm(H}_2C:CF _2) = (29cdot7419 +/- 0cdot0001)C; and, to study the coexistence curve and diameter as close to T_{c} as possible. The critical behaviour was compared to the theoretical renormalization group calculations. The derived coefficients were tested against a proposed three-body interaction to explain the field-mixing term in the diameter near the critical point. It was found that H_2C:CF_2 behaved as predicted by such an interaction; CH _3F (and CHF_3) did not. The third experiment was a feasibility study to find out if (critical) isotherms could be measured optically in a setup which combined the prism and parallel-windows cells. The aim was to map isotherms in as wide a range of pressure and density as possible and to probe the critical region directly. Pressure was monitored by a precise digital pressure gauge. CH_3F and CHF _3 were tested in this system. It was found that at low densities, the calculated second and third virial coefficients agreed with reference values. However, the data around the critical point were not accurate enough for use to calculate the critical exponent, delta . The calculated value was consistently smaller than the expected value. It was believed that the present setup had thermal isolation problems. Suggestions were made as to the improvements of this isotherm cell setup. Lastly, a joint project with the Department of Ophthalmology, UBC to assemble a vitreous fluorophotometer is discussed in Appendix F. The upgrading of the instrument took up the initial two years of this PhD programme.
Effect of the time window on the heat-conduction information filtering model
NASA Astrophysics Data System (ADS)
Guo, Qiang; Song, Wen-Jun; Hou, Lei; Zhang, Yi-Lu; Liu, Jian-Guo
2014-05-01
Recommendation systems have been proposed to filter out the potential tastes and preferences of the normal users online, however, the physics of the time window effect on the performance is missing, which is critical for saving the memory and decreasing the computation complexity. In this paper, by gradually expanding the time window, we investigate the impact of the time window on the heat-conduction information filtering model with ten similarity measures. The experimental results on the benchmark dataset Netflix indicate that by only using approximately 11.11% recent rating records, the accuracy could be improved by an average of 33.16% and the diversity could be improved by 30.62%. In addition, the recommendation performance on the dataset MovieLens could be preserved by only considering approximately 10.91% recent records. Under the circumstance of improving the recommendation performance, our discoveries possess significant practical value by largely reducing the computational time and shortening the data storage space.
Du, Yifeng; Kemper, Timothy; Qiu, Jiange; Jiang, Jianxiong
2016-01-01
Neuroinflammation is a common feature in nearly all neurological and some psychiatric disorders. Resembling its extraneural counterpart, neuroinflammation can be both beneficial and detrimental depending on the responding molecules. The overall effect of inflammation on disease progression is highly dependent on the extent of inflammatory mediator production and the duration of inflammatory induction. The time-dependent aspect of inflammatory responses suggests that the therapeutic time window for quelling neuroinflammation might vary with molecular targets and injury types. Therefore, it is important to define the therapeutic time window for anti-inflammatory therapeutics, as contradicting or negative results might arise when different treatment regimens are utilized even in similar animal models. Herein, we discuss a few critical factors that can help define the therapeutic time window and optimize treatment paradigm for suppressing the cyclooxygenase-2/prostaglandin-mediated inflammation after status epilepticus. These determinants should also be relevant to other anti-inflammatory therapeutic strategies for the CNS diseases. PMID:26689339
Microeconomics of process control in semiconductor manufacturing
NASA Astrophysics Data System (ADS)
Monahan, Kevin M.
2003-06-01
Process window control enables accelerated design-rule shrinks for both logic and memory manufacturers, but simple microeconomic models that directly link the effects of process window control to maximum profitability are rare. In this work, we derive these links using a simplified model for the maximum rate of profit generated by the semiconductor manufacturing process. We show that the ability of process window control to achieve these economic objectives may be limited by variability in the larger manufacturing context, including measurement delays and process variation at the lot, wafer, x-wafer, x-field, and x-chip levels. We conclude that x-wafer and x-field CD control strategies will be critical enablers of density, performance and optimum profitability at the 90 and 65nm technology nodes. These analyses correlate well with actual factory data and often identify millions of dollars in potential incremental revenue and cost savings. As an example, we show that a scatterometry-based CD Process Window Monitor is an economically justified, enabling technology for the 65nm node.
NASA Astrophysics Data System (ADS)
White, Jonathan; Panda, Brajendra
A major concern for computer system security is the threat from malicious insiders who target and abuse critical data items in the system. In this paper, we propose a solution to enable automatic identification of critical data items in a database by way of data dependency relationships. This identification of critical data items is necessary because insider threats often target mission critical data in order to accomplish malicious tasks. Unfortunately, currently available systems fail to address this problem in a comprehensive manner. It is more difficult for non-experts to identify these critical data items because of their lack of familiarity and due to the fact that data systems are constantly changing. By identifying the critical data items automatically, security engineers will be better prepared to protect what is critical to the mission of the organization and also have the ability to focus their security efforts on these critical data items. We have developed an algorithm that scans the database logs and forms a directed graph showing which items influence a large number of other items and at what frequency this influence occurs. This graph is traversed to reveal the data items which have a large influence throughout the database system by using a novel metric based formula. These items are critical to the system because if they are maliciously altered or stolen, the malicious alterations will spread throughout the system, delaying recovery and causing a much more malignant effect. As these items have significant influence, they are deemed to be critical and worthy of extra security measures. Our proposal is not intended to replace existing intrusion detection systems, but rather is intended to complement current and future technologies. Our proposal has never been performed before, and our experimental results have shown that it is very effective in revealing critical data items automatically.
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
Zhu, Guo; Jiang, Li-Yuan; Yi, Zhang; Ping, Li; Duan, Chun-Yue; Yong, Cao; Liu, Jin-Yang; Hu, Jian-Zhong
2017-11-29
Sacroiliac joint tuberculosis(SJT) is relatively uncommon, but it may cause severe sacroiliac joint destruction and functional disorder. Few studies in the literature have been presented on SJT, reports of surgical treatment for SJT are even fewer. In this study, we retrospectively reviewed surgical management of patients with severe SJT of 3 different types and proposed to reveal the clinical manifestations and features and aim to determine the efficiency and security of such surgical treatment. We reviewed 17 patients with severe SJT of 3 different types who underwent posterior open-window focal debridement and bone graft for joint fusion. Among them,five patients with anterior sacral abscess had anterior abscess curettage before debridement. Two patients with lumbar vertebral tuberculosis received one-stage posterior tuberculous debridement, interbody fusion and instrumentation. Follow-up was performed 36 months (26 to 45 months) using the following parameters: erythrocyte sedimentation rate(ESR), status of joint bony fusion on CT scan, visual analogue scale (VAS) and the Oswestry Disability Index (ODI). Buttock pain and low back pain were progressively relieved with time. 6 months later, pain was not obvious, and ESR resumed to normal levels within 3 months. Solid fusion of the sacroiliac joint occurred within 12 months in all cases. No complications or recurrence occurred. At final follow-up, all patients had no pain or only minimal discomfort over the affected joint and almost complete functional recovery. Posterior open-window focal debridement and joint fusion is an efficient and secure surgical method to treat severe SJT. If there is an abscess in the front of the sacroiliac joint, anterior abscess curettage should be performed as a supplement.
Borromean Windows for Three-Particle Systems under Screened Coulomb Interactions
NASA Astrophysics Data System (ADS)
Jiang, Zi-Shi; Song, Xiu-Dan; Zhou, Lin; Kar, Sabyasachi
2017-05-01
We have carried out calculations to search Borromean windows (BWs) for 11 different three-body systems interacting with screened Coulomb (Yukawa-type) potentials using Hylleraas-type wave functions within the framework of a variational approach. The critical values of the screening parameters for the ground states of the systems under consideration are reported for which the three-body systems are stable, while all the possible fragments are unbound; that is, it shows windows for Borromean binding. Supported by the National Natural Science Foundation of China under Grant No. 11304086, the University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province of China under Grant No. UNPYSCT-2015019, and the Natural Science Foundation for Distinguished Young Scholars in Heilongjiang University under Grant No. JCL201503
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-11
... Review (CFSR) Form. The CFSR will differ from TSA's Corporate Security Review (CSR) in that a CSR looks at corporate or company-wide security management plans and practices while the CFSR will look at... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
NASA Astrophysics Data System (ADS)
Fakhruddin, S. H. M.; Babel, Mukand S.; Kawasaki, Akiyuki
2014-05-01
Coastal inundations are an increasing threat to the lives and livelihoods of people living in low-lying, highly-populated coastal areas. According to a World Bank Report in 2005, at least 2.6 million people may have drowned due to coastal inundation, particularly caused by storm surges, over the last 200 years. Forecasting and prediction of natural events, such as tropical and extra-tropical cyclones, inland flooding, and severe winter weather, provide critical guidance to emergency managers and decision-makers from the local to the national level, with the goal of minimizing both human and economic losses. This guidance is used to facilitate evacuation route planning, post-disaster response and resource deployment, and critical infrastructure protection and securing, and it must be available within a time window in which decision makers can take appropriate action. Recognizing this extreme vulnerability of coastal areas to inundation/flooding, and with a view to improve safety-related services for the community, research should strongly enhance today's forecasting, prediction and early warning capabilities in order to improve the assessment of coastal vulnerability and risks and develop adequate prevention, mitigation and preparedness measures. This paper tries to develop an impact-oriented quantitative coastal inundation forecasting and early warning system with social and economic assessment to address the challenges faced by coastal communities to enhance their safety and to support sustainable development, through the improvement of coastal inundation forecasting and warning systems.
Ciamarra, Massimo Pica; Cheong, Siew Ann
2018-01-01
There is growing interest in the use of critical slowing down and critical fluctuations as early warning signals for critical transitions in different complex systems. However, while some studies found them effective, others found the opposite. In this paper, we investigated why this might be so, by testing three commonly used indicators: lag-1 autocorrelation, variance, and low-frequency power spectrum at anticipating critical transitions in the very-high-frequency time series data of the Australian Dollar-Japanese Yen and Swiss Franc-Japanese Yen exchange rates. Besides testing rising trends in these indicators at a strict level of confidence using the Kendall-tau test, we also required statistically significant early warning signals to be concurrent in the three indicators, which must rise to appreciable values. We then found for our data set the optimum parameters for discovering critical transitions, and showed that the set of critical transitions found is generally insensitive to variations in the parameters. Suspecting that negative results in the literature are the results of low data frequencies, we created time series with time intervals over three orders of magnitude from the raw data, and tested them for early warning signals. Early warning signals can be reliably found only if the time interval of the data is shorter than the time scale of critical transitions in our complex system of interest. Finally, we compared the set of time windows with statistically significant early warning signals with the set of time windows followed by large movements, to conclude that the early warning signals indeed provide reliable information on impending critical transitions. This reliability becomes more compelling statistically the more events we test. PMID:29538373
Wen, Haoyu; Ciamarra, Massimo Pica; Cheong, Siew Ann
2018-01-01
There is growing interest in the use of critical slowing down and critical fluctuations as early warning signals for critical transitions in different complex systems. However, while some studies found them effective, others found the opposite. In this paper, we investigated why this might be so, by testing three commonly used indicators: lag-1 autocorrelation, variance, and low-frequency power spectrum at anticipating critical transitions in the very-high-frequency time series data of the Australian Dollar-Japanese Yen and Swiss Franc-Japanese Yen exchange rates. Besides testing rising trends in these indicators at a strict level of confidence using the Kendall-tau test, we also required statistically significant early warning signals to be concurrent in the three indicators, which must rise to appreciable values. We then found for our data set the optimum parameters for discovering critical transitions, and showed that the set of critical transitions found is generally insensitive to variations in the parameters. Suspecting that negative results in the literature are the results of low data frequencies, we created time series with time intervals over three orders of magnitude from the raw data, and tested them for early warning signals. Early warning signals can be reliably found only if the time interval of the data is shorter than the time scale of critical transitions in our complex system of interest. Finally, we compared the set of time windows with statistically significant early warning signals with the set of time windows followed by large movements, to conclude that the early warning signals indeed provide reliable information on impending critical transitions. This reliability becomes more compelling statistically the more events we test.
Harrop, Wayne; Matteson, Ashley
This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.
Shen, Zhe; Zheng, Yanrong; Wu, Jiaying; Chen, Ying; Wu, Xiaoli; Zhou, Yiting; Yuan, Yang; Lu, Shousheng; Jiang, Lei; Qin, Zhenghong; Chen, Zhong; Hu, Weiwei; Zhang, Xiangnan
2017-03-04
Prompt reperfusion after cerebral ischemia is critical for neuronal survival. Any strategies that extend the limited reperfusion window will be of great importance. Acidic postconditioning (APC) is a mild acidosis treatment that involves inhaling CO 2 during reperfusion following ischemia. APC attenuates ischemic brain injury although the underlying mechanisms have not been elucidated. Here we report that APC reinforces ischemia-reperfusion-induced mitophagy in middle cortical artery occlusion (MCAO)-treated mice, and in oxygen-glucose deprivation (OGD)-treated brain slices and neurons. Inhibition of mitophagy compromises neuroprotection conferred by APC. Furthermore, mitophagy and neuroprotection are abolished in Park2 knockout mice, indicating that APC-induced mitophagy is facilitated by the recruitment of PARK2 to mitochondria. Importantly, in MCAO mice, APC treatment extended the effective reperfusion window from 2 to 4 h, and this window was further extended to 6 h by exogenously expressing PARK2. Taken together, we found that PARK2-dependent APC-induced mitophagy renders the brain resistant to ischemic injury. APC treatment could be a favorable strategy to extend the thrombolytic time window for stroke therapy.
ERIC Educational Resources Information Center
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler
2018-01-01
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports
NASA Astrophysics Data System (ADS)
Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard
Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.
Nawrotzki, Raphael J.; Robson, Kristin; Gutilla, Margaret J.; Hunter, Lori M.; Twine, Wayne; Norlund, Petra
2015-01-01
Recurring food crises endanger the livelihoods of millions of households in developing countries around the globe. Owing to the importance of this issue, we explore recent changes in food security between the years 2004 and 2010 in a rural district in Northeastern South Africa. Our study window spans the time of the 2008 global food crises and allows the investigation of its impacts on rural South African populations. Grounded in the sustainable livelihood framework, we examine differences in food security trajectories among vulnerable sub populations. A unique panel data set of 8,147 households, provided by the Agincourt Health and Demographic Surveillance System (Agincourt HDSS), allows us to employ a longitudinal multilevel modeling approach to estimate adjusted growth curves for the differential change in food security across time. We observe an overall improvement in food security that leveled off after 2008, most likely resulting from the global food crisis. In addition, we discover significant differences in food security trajectories for various sub populations. For example, female-headed households and those living in areas with better access to natural resources differentially improved their food security situation, compared to male-headed households and those households with lower levels of natural resource access. However, former Mozambican refugees witnessed a decline in food security. Therefore, poverty alleviation programs for the Agincourt region should work to improve the food security of vulnerable households, such as former Mozambican refugees. PMID:26594259
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
NEURODEVELOPMENTAL EFFECTS OF ENVIRONMENTAL EXPOSURES
Neurodevelopmental Effects of Environmental Exposures
Sherry G. Selevan, Pauline Mendola, Deborah C. Rice (US EPA, Washington,
DC)
The nervous system starts development early in gestation and continues to develop through adolescence. Thus, critical windows of vuln...
IDENTIFYING CRITICAL WINDOWS OF EXPOSURE FOR CHILDREN'S HEALTH
Several authors have considered the importance of exposure timing and how this affects the outcomes observed, but no one has systematically compiled preconceptional, prentatal, and postnatal developmental exposures and subsequent outcomes. Efforts were undertaken to examine the ...
Developmental programming of the metabolic syndrome - critical windows for intervention
Vickers, Mark H
2011-01-01
Metabolic disease results from a complex interaction of many factors, including genetic, physiological, behavioral and environmental influences. The recent rate at which these diseases have increased suggests that environmental and behavioral influences, rather than genetic causes, are fuelling the present epidemic. In this context, the developmental origins of health and disease hypothesis has highlighted the link between the periconceptual, fetal and early infant phases of life and the subsequent development of adult obesity and the metabolic syndrome. Although the mechanisms are yet to be fully elucidated, this programming was generally considered an irreversible change in developmental trajectory. Recent work in animal models suggests that developmental programming of metabolic disorders is potentially reversible by nutritional or targeted therapeutic interventions during the period of developmental plasticity. This review will discuss critical windows of developmental plasticity and possible avenues to ameliorate the development of postnatal metabolic disorders following an adverse early life environment. PMID:21954418
Report on Progress Toward Security and Stability in Afghanistan
2013-07-01
Finland : 3 UK: 13 Croatia: 4 Hungary: 3 Italy: 22 Lithuania: 2 Netherlands: 6 Poland: 9 Portugal: 1 Romania: 3 Slovenia: 1 Slovakia: 1...civilian casualties resulting from operations by pro -government forces compared with the same period in 2011, and more specifically, a 42 percent...Window A is administered by the World Bank; contributors are Australia ($5.9 million), Finland ($2.5 million), and the United States ($50 million
Daylight Redirecting Window Films
2013-09-01
58) • Energy Independence and Security Act of 2007 (P.L. 110-140) • National Defense Authorization Act for FY 2007 (P.L. 109-364) • National Defense...Authorization Act for FY 2008 (P.L. 110-181) • National Defense Authorization Act for FY 2009 (P.L. 10-417) • Executive Order 13423 • Executive...green-house gas equivalents based on national averages Green-house- gas-equivalent conversion factor for national level usage. Embedded
The Continuing Evolution of Effective IT Security Practices
ERIC Educational Resources Information Center
Voloudakis, John
2006-01-01
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Definitions. 29.2 Section 29.2 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.2... Homeland Security Act of 2002 (referencing the term used in section 1016(e) of Public Law 107-56 (42 U.S.C...
Exploring Factors that Influence Students' Behaviors in Information Security
ERIC Educational Resources Information Center
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary
2012-01-01
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
78 FR 66038 - Critical Infrastructure Partnership Advisory Council (CIPAC); Correction.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... DEPARTMENT OF HOMELAND SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC... Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting on November 5, 2013. The... Murphy, Critical Infrastructure Partnership Advisory Council Alternate Designated Federal Officer...
Cyclopamine-induced synophthalmia in sheep: defining a critical window and toxicokinetic evaluation.
Welch, K D; Panter, K E; Lee, S T; Gardner, D R; Stegelmeier, B L; Cook, D
2009-07-01
Cyclopamine, a steroidal alkaloid, from the plant Veratrum californicum is teratogenic, causing a range of different birth defects. The critical window for cyclopamine-induced synophthalmia formation has been reported to be gestational day (GD) 14. The objectives of this study were to better describe cyclopamine-induced craniofacial deformities, to better define the window of susceptibility to synophthalmia formation, and to characterize cyclopamine toxicokinetics in sheep. Ewes were dosed i.v. with purified cyclopamine for toxicokinetic analysis. Another four groups of ewes were dosed orally twice daily with 0.88 g/kg of V. californicum on GD 13, 14 or 15 or consecutively on GD days 13-15. Pregnancy and pre-partum fetal malformations were determined by ultrasound imaging on GD 60. At parturition lambs were assessed for gross malformations. The elimination half-life of cyclopamine in ewes was determined to be 1.1 +/- 0.1 h. The rapid clearance of cyclopamine indicates that ingestion of V. californicum must occur during a very narrow window for synophthalmia formation to occur. Ewes dosed with V. californicum on GD 13 or 14 had lambs with various craniofacial malformations including cyclopia, maxillary dysplasia and mandibular micrognathia. Ewes dosed on GD 15 delivered normal lambs. Ewes dosed consecutively on GD 13-15 were not pregnant at GD 60 and Veratrum-induced embryonic death was assumed to be the cause. Interestingly, lambs with cyclopia were smaller, under-developed and appeared premature even though their twin appeared fully developed. Initial evaluations suggest this was due to placental dysplasia. 2009 by John Wiley & Sons, Ltd.
31Cl beta decay and the 30P31S reaction rate in nova nucleosynthesis
NASA Astrophysics Data System (ADS)
Bennett, Michael; Wrede, C.; Brown, B. A.; Liddick, S. N.; Pérez-Loureiro, D.; NSCL e12028 Collaboration
2016-03-01
The 30P31S reaction rate is critical for modeling the final isotopic abundances of ONe nova nucleosynthesis, identifying the origin of presolar nova grains, and calibrating proposed nova thermometers. Unfortunately, this rate is essentially experimentally unconstrained because the strengths of key 31S proton capture resonances are not known, due to uncertainties in their spins and parities. Using a 31Cl beam produced at the National Superconducting Cyclotron Laboratory, we have populated several 31S states for study via beta decay and devised a new decay scheme which includes updated beta feedings and gamma branchings as well as multiple states previously unobserved in 31Cl beta decay. Results of this study, including the unambiguous identification due to isospin mixing of a new l = 0 , Jπ = 3 /2+ 31S resonance directly in the middle of the Gamow Window, will be presented, and significance to the evaluation of the 30P31S reaction rate will be discussed. Work supported by U.S. Natl. Sci. Foundation (Grants No. PHY-1102511, PHY-1404442, PHY-1419765, and PHY-1431052); U.S. Dept. of Energy, Natl. Nucl. Security Administration (Award No. DE-NA0000979); Nat. Sci. and Eng. Research Council of Canada.
2017-04-13
Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be...policy, and law . The research question is whether the Departments of Homeland Security (DHS) and Defense (DOD) have federal statutory authority to... law ); Department of Homeland Security; Department of Defense; establish standards; physical protection and security; national security 16. SECURITY
OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38
DOT National Transportation Integrated Search
1989-07-01
Developing and executing a well-thought-out security policy is critical to the success of CALS. Without appropriate security measures, the integration of technology, organizations, functions, and data envisioned as Phase II CALS can not occur. Theref...
76 FR 4079 - Information Technology (IT) Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-24
... Technology (IT) Security AGENCY: National Aeronautics and Space Administration. ACTION: Final rule. SUMMARY: NASA is revising the NASA FAR Supplement (NFS) to update requirements related to Information Technology... Security clause. However, due to the critical importance of protecting the Agency's Information Technology...
Thaden, Jeremy J; Nkomo, Vuyisile T; Lee, Kwang Je; Oh, Jae K
2015-07-01
Although the highest aortic valve velocity was thought to be obtained from imaging windows other than the apex in about 20% of patients with severe aortic stenosis (AS), its occurrence appears to be increasing as the age of patients has increased with the application of transcatheter aortic valve replacement. The aim of this study was to determine the frequency with which the highest peak jet velocity (Vmax) is found at each imaging window, the degree to which neglecting nonapical imaging windows underestimates AS severity, and factors influencing the location of the optimal imaging window in contemporary patients. Echocardiograms obtained in 100 consecutive patients with severe AS from January 3 to May 23, 2012, in which all imaging windows were interrogated, were retrospectively analyzed. AS severity (aortic valve area and mean gradient) was calculated on the basis of the apical imaging window alone and the imaging window with the highest peak jet velocity. The left ventricular-aortic root angle measured in the parasternal long-axis view as well as clinical variables were correlated with the location of highest peak jet velocity. Vmax was most frequently obtained in the right parasternal window (50%), followed by the apex (39%). Subjects with acute angulation more commonly had Vmax at the right parasternal window (65% vs 43%, P = .05) and less commonly had Vmax at the apical window (19% vs 48%, P = .005), but Vmax was still located outside the apical imaging window in 52% of patients with obtuse aortic root angles. If nonapical windows were neglected, 8% of patients (eight of 100) were misclassified from high-gradient severe AS to low-gradient severe AS, and another 15% (15 of 100) with severe AS (aortic valve area < 1.0 cm(2)) were misclassified as having moderate AS (aortic valve area > 1.0 cm(2)). In this contemporary cohort, Vmax was located outside the apical imaging window in 61% of patients, and neglecting the nonapical imaging windows resulted in the misclassification of AS severity in 23% of patients. Aortic root angulation as measured by two-dimensional echocardiography influences the location of Vmax modestly. Despite increasing time constraints on many echocardiography laboratories, these data confirm that routine Doppler interrogation from multiple imaging windows is critical to accurately determine the severity of AS in contemporary clinical practice. Copyright © 2015 American Society of Echocardiography. Published by Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Hanratty, Brian
2008-01-01
This article, which investigates the teaching of poetry at Key Stage Four in Northern Ireland, argues that poetry has a radical, and even subversive, role to play in an increasingly examination-driven educational culture. By focusing partly on the views of a number of poets and critics, the article evaluates the, at times, contested nature of…
NASA Technical Reports Server (NTRS)
2002-01-01
When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
NASA Astrophysics Data System (ADS)
D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj
The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.
ERIC Educational Resources Information Center
Mohammadi, Hadi
2014-01-01
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
ERIC Educational Resources Information Center
Zafar, Humayun
2010-01-01
This study investigates differences in perception between layers of management (executive, middle, and lower) and staff with regard to the influence of critical success factors (CSFs) on security risk management (SRM) effectiveness. This is an in-depth case study conducted at a Fortune 500 company. Rockart's (1979) CSF method is modified through…
Homeland security: sharing and managing critical incident information
NASA Astrophysics Data System (ADS)
Ashley, W. R., III
2003-09-01
Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.
Hatipoglu, Nuh; Bilgin, Gokhan
2017-10-01
In many computerized methods for cell detection, segmentation, and classification in digital histopathology that have recently emerged, the task of cell segmentation remains a chief problem for image processing in designing computer-aided diagnosis (CAD) systems. In research and diagnostic studies on cancer, pathologists can use CAD systems as second readers to analyze high-resolution histopathological images. Since cell detection and segmentation are critical for cancer grade assessments, cellular and extracellular structures should primarily be extracted from histopathological images. In response, we sought to identify a useful cell segmentation approach with histopathological images that uses not only prominent deep learning algorithms (i.e., convolutional neural networks, stacked autoencoders, and deep belief networks), but also spatial relationships, information of which is critical for achieving better cell segmentation results. To that end, we collected cellular and extracellular samples from histopathological images by windowing in small patches with various sizes. In experiments, the segmentation accuracies of the methods used improved as the window sizes increased due to the addition of local spatial and contextual information. Once we compared the effects of training sample size and influence of window size, results revealed that the deep learning algorithms, especially convolutional neural networks and partly stacked autoencoders, performed better than conventional methods in cell segmentation.
GOCE Re-Entry Predictions for the Italian Civil Protection Authorities
NASA Astrophysics Data System (ADS)
Pardini, Carmen; Anselmo, Luciano
2015-03-01
The uncommon nature of the GOCE reentry campaign, sharing an uncontrolled orbital decay with a finely controlled attitude along the atmospheric drag direction, made the reentry predictions for this satellite an interesting case study, especially because nobody was able to say a priori if and when the attitude control would have failed, leading to an unrestrained tumbling and a sudden variation of the orbital decay rate. As in previous cases, ISTI/CNR was in charge of reentry predictions for the Italian civil protection authorities, monitoring also the satellite decay in the frame of an international reentry campaign promoted by the Inter-Agency Space Debris Coordination Committee (IADC). Due to the peculiar nature of the GOCE reentry, the definition of reliable uncertainty windows was not easy, especially considering the critical use of this information for civil protection evaluations. However, after an initial period of test and analysis, reasonable and conservative criteria were elaborated and applied, with good and consistent results through the end of the reentry campaign. In the last three days of flight, reentries were simulated over Italy to obtain quite accurate ground tracks, debris swaths and air space crossing time windows associated with the critical passes over the national territory still included in the global uncertainty windows.
Davy, John L
2010-02-01
This paper presents a revised theory for predicting the sound insulation of double leaf cavity walls that removes an approximation, which is usually made when deriving the sound insulation of a double leaf cavity wall above the critical frequencies of the wall leaves due to the airborne transmission across the wall cavity. This revised theory is also used as a correction below the critical frequencies of the wall leaves instead of a correction due to Sewell [(1970). J. Sound Vib. 12, 21-32]. It is found necessary to include the "stud" borne transmission of the window frames when modeling wide air gap double glazed windows. A minimum value of stud transmission is introduced for use with resilient connections such as steel studs. Empirical equations are derived for predicting the effective sound absorption coefficient of wall cavities without sound absorbing material. The theory is compared with experimental results for double glazed windows and gypsum plasterboard cavity walls with and without sound absorbing material in their cavities. The overall mean, standard deviation, maximum, and minimum of the differences between experiment and theory are -0.6 dB, 3.1 dB, 10.9 dB at 1250 Hz, and -14.9 dB at 160 Hz, respectively.
Khan, Muhammad Khurram; Alghathbar, Khaled
2010-01-01
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.
NASA Astrophysics Data System (ADS)
Zhu, Keyong; Pilon, Laurent
2017-11-01
This study aims to investigate systematically light transfer through semitransparent windows with absorbing cap-shaped droplets condensed on their backside as encountered in greenhouses, solar desalination plants, photobioreactors and covered raceway ponds. The Monte Carlo ray-tracing method was used to predict the normal-hemispherical transmittance, reflectance, and normal absorptance accounting for reflection and refraction at the air/droplet, droplet/window, and window/air interfaces and absorption in both the droplets and the window. The droplets were monodisperse or polydisperse and arranged either in an ordered hexagonal pattern or randomly distributed on the backside with droplet contact angle θc ranging between 0 and 180° The normal-hemispherical transmittance was found to be independent of the spatial distribution of droplets. However, it decreased with increasing droplet diameter and polydispersity. The normal-hemispherical transmittance featured four distinct optical regimes for semitransparent window supporting nonabsorbing droplets. These optical regimes were defined based on contact angle and critical angle for internal reflection at the droplet/air interface. However, for strongly absorbing droplets, the normal-hemispherical transmittance (i) decreased monotonously with increasing contact angle for θc <90° and (ii) remained constant and independent of droplet absorption index kd, droplet mean diameter dm, and contact angle θc for θc ≥ 90° Analytical expressions for the normal-hemispherical transmittance were provided in the asymptotic cases when (1) the window was absorbing but the droplets were nonabsorbing with any contact angles θc, and (2) the droplets were strongly absorbing with contact angle θc >90° Finally, the spectral normal-hemispherical transmittance of a 3 mm-thick glass window supporting condensed water droplets for wavelength between 0.4 and 5 μm was predicted and discussed in light of the earlier parametric study and asymptotic behavior.
Zadeh, Rana Sagha; Shepley, Mardelle McCuskey; Williams, Gary; Chung, Susan Sung Eun
2014-01-01
To investigate the physiological and psychological effects of windows and daylight on registered nurses. To date, evidence has indicated that appropriate environmental lighting with characteristics similar to natural light can improve mood, alertness, and performance. The restorative effects of windows also have been documented. Hospital workspaces generally lack windows and daylight, and the impact of the lack of windows and daylight on healthcare employees' well being has not been thoroughly investigated. Data were collected using multiple methods with a quasi-experimental approach (i.e., biological measurements, behavioral mapping, and analysis of archival data) in an acute-care nursing unit with two wards that have similar environmental and organizational conditions, and similar patient populations and acuity, but different availability of windows in the nursing stations. Findings indicated that blood pressure (p < 0.0001) decreased and body temperature increased (p = 0.03). Blood oxygen saturation increased (p = 0.02), but the difference was clinically insignificant. Communication (p < 0.0001) and laughter (p = 0.03) both increased, and the subsidiary behavior indicators of sleepiness and deteriorated mood (p = 0.02) decreased. Heart rate (p = 0.07), caffeine intake (p = 0.3), self-reported sleepiness (p = 0.09), and the frequency of medication errors (p = 0.14) also decreased, but insignificantly. The findings support evidence from laboratory and field settings of the benefits of windows and daylight. A possible micro-restorative effect of windows and daylight may result in lowered blood pressure and increased oxygen saturation and a positive effect on circadian rhythms (as suggested by body temperature) and morning sleepiness. Critical care/intensive care, lighting, nursing, quality care, work environment.
77 FR 32656 - Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0008] Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Federal Officer, Critical Infrastructure Partnership Advisory Council, Sector Outreach and Programs...
77 FR 32655 - Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0009] Critical Infrastructure Partnership... the Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal... CONTACT: Larry May, Designated Federal Officer, Critical Infrastructure Partnership Advisory Council...
NASA Astrophysics Data System (ADS)
Zhu, Keyong; Huang, Yong; Pruvost, Jeremy; Legrand, Jack; Pilon, Laurent
2017-06-01
This study aims to quantify systematically the effect of non-absorbing cap-shaped droplets condensed on the backside of transparent windows on their directional-hemispherical transmittance and reflectance. Condensed water droplets have been blamed to reduce light transfer through windows in greenhouses, solar desalination plants, and photobioreactors. Here, the directional-hemispherical transmittance was predicted by Monte Carlo ray-tracing method. For the first time, both monodisperse and polydisperse droplets were considered, with contact angle between 0 and 180°, arranged either in an ordered hexagonal pattern or randomly distributed on the window backside with projected surface area coverage between 0 and 90%. The directional-hemispherical transmittance was found to be independent of the size and spatial distributions of the droplets. Instead, it depended on (i) the incident angle, (ii) the optical properties of the window and droplets, and on (iii) the droplet contact angle and (iv) projected surface area coverage. In fact, the directional-hemispherical transmittance decreased with increasing incident angle. Four optical regimes were identified in the normal-hemispherical transmittance. It was nearly constant for droplet contact angles either smaller than the critical angle θcr (predicted by Snell's law) for total internal reflection at the droplet/air interface or larger than 180°-θcr. However, between these critical contact angles, the normal-hemispherical transmittance decreased rapidly to reach a minimum at 90° and increased rapidly with increasing contact angles up to 180°-θcr. This was attributed to total internal reflection at the droplet/air interface which led to increasing reflectance. In addition, the normal-hemispherical transmittance increased slightly with increasing projected surface area coverage for contact angle was smaller than θcr. However, it decreased monotonously with increasing droplet projected surface area coverage for contact angle larger than θcr. These results can be used to select the material or surface coating with advantageous surface properties for applications when dropwise condensation may otherwise have a negative effect on light transmittance.
Controlling EPICS from a web browser.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, K., Jr.
1999-04-13
An alternative to using a large graphical display manager like MEDM [1,2] to interface to a control system, is to use individual control objects, such as text boxes, meters, etc., running in a browser. This paper presents three implementations of this concept, one using ActiveX controls, one with Java applets, and another with Microsoft Agent. The ActiveX controls have performance nearing that of MEDM, but they only work on Windows platforms. The Java applets require a server to get around Web security restrictions and are not as fast, but they have the advantage of working on most platforms and withmore » both of the leading Web browsers. The agent works on Windows platforms with and without a browser and allows voice recognition and speech synthesis, making it somewhat more innovative than MEDM.« less
Food Security Framings within the UK and the Integration of Local Food Systems
ERIC Educational Resources Information Center
Kirwan, James; Maye, Damian
2013-01-01
This paper provides a critical interpretation of food security politics in the UK. It applies the notion of food security collective action frames to assess how specific action frames are maintained and contested. The interdependency between scale and framing in food security discourse is also scrutinised. It does this through an examination of…
49 CFR 1520.5 - Sensitive security information.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...
49 CFR 1520.5 - Sensitive security information.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...
49 CFR 1520.5 - Sensitive security information.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...
49 CFR 1520.5 - Sensitive security information.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...
What are we assessing when we measure food security? A compendium and review of current metrics.
Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L
2013-09-01
The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.
What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12
Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.
2013-01-01
The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241
NASA Astrophysics Data System (ADS)
Yao, Hua-Dong; Davidson, Lars
2018-03-01
We investigate the interior noise caused by turbulent flows past a generic side-view mirror. A rectangular glass window is placed downstream of the mirror. The window vibration is excited by the surface pressure fluctuations and emits the interior noise in a cuboid cavity. The turbulent flows are simulated using a compressible large eddy simulation method. The window vibration and interior noise are predicted with a finite element method. The wavenumber-frequency spectra of the surface pressure fluctuations are analyzed. The spectra are identified with some new features that cannot be explained by the Chase model for turbulent boundary layers. The spectra contain a minor hydrodynamic domain in addition to the hydrodynamic domain caused by the main convection of the turbulent boundary layer. The minor domain results from the local convection of the recirculating flow. These domains are formed in bent elliptic shapes. The spanwise expansion of the wake is found causing the bending. Based on the wavenumber-frequency relationships in the spectra, the surface pressure fluctuations are decomposed into hydrodynamic and acoustic components. The acoustic component is more efficient in the generation of the interior noise than the hydrodynamic component. However, the hydrodynamic component is still dominant at low frequencies below approximately 250 Hz since it has low transmission losses near the hydrodynamic critical frequency of the window. The structural modes of the window determine the low-frequency interior tonal noise. The combination of the mode shapes of the window and cavity greatly affects the magnitude distribution of the interior noise.
78 FR 42101 - Boston Area Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
...: Identifying critical port infrastructure and operations; Identifying risks (threats, vulnerabilities, and... years of experience related to maritime or port security operations. AMSC Membership The Boston AMSC has... security industries. In support of the USCG policy on gender and ethnic nondiscrimination, we encourage...
77 FR 39249 - Boston Area Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
...: Identifying critical port infrastructure and operations; Identifying risks (threats, vulnerabilities, and... years of experience related to maritime or port security operations. AMSC Membership The Boston AMSC has... security industries. In support of the USCG policy on gender and ethnic diversity, we encourage qualified...
Exploring the effectiveness of transit security awareness campaigns in the San Francisco Bay Area.
DOT National Transportation Integrated Search
2010-06-01
Public involvement in alerting officials of suspicious and potentially harmful activity is critical to the overall security of a transit system. As part of an effort to get passengers and the public involved, many transit agencies have security aware...
Software security checklist for the software life cycle
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Wolfe, T. L.; Sherif, J. S.
2002-01-01
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Due to its criticality, security should be integrated as a formal approach in the software life cycle.
Evaluating and Mitigating Software Supply Chain Security Risks
2010-05-01
is returned for all employees. The risk associated with this defect is high; variants of it have been used in attacks that caused credit card data to...via Common Access Card (CAC) readers). 29 | CMU/SEI-2010-TN-016 4.2.1 Supplier Capability Because the project is already in development, the...ClearCase, Windows, Linux and Solaris, network administration, TCP/IP, X/Motif, DII COE, Simple Net- work Management Protocol (SNMP), Agent Technology
Memory Corruption Mitigations and Their Implementation Progress in Third-Party Windows Applications
2012-09-01
coverage in the news, which helped the public recognize the importance of computers in everyday life and, more importantly, the challenges in securing...Media Players Winamp, VLC Media Player, Quicktime Player, iTunes, Real Player Instant Messaging Applications mIRC, Yahoo Messenger, AIM, Nimbuzz...as cell phones and tablets, may boost this ratio in the upcoming years. In such a highly connected world, it is becoming more and more challenging
1983-11-01
Securing and fortifying (a) Doors (b) Hallways (c) Stairs (d) Windows (e) Floors (f) Ceilings 3 (g) Unoccupied rooms (h) Basements (i) Upper floors...observed, the instructors were interviewed, and training K was assessed through administration of a multiple-choice test and a Perception of Training...instructing clearing procedures. It would provide the opportunity to both critique and practice, using one structure. A Perception of Training
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jim Alves-Foss
2011-08-01
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less
Program for Critical Technologies in Breast Oncology
1999-07-01
the tissues, and in a ethical manner that respects the patients’ rights . The Program for Critical Technologies in Breast Oncology helps address all of...diagnosis, database 15. NUMBER OF PAGES 148 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS...closer to clinical utility. Page 17 References Adida C. Crotty PL. McGrath J. Berrebi D. Diebold J. Altieri DC. Developmentally regulated
2013-01-01
Service DTSA Defense Technology Security Administration MCTL Militarily Critical Technologies List This is a work of the U.S. government and is not...Respond to MCTL Weaknesses Page 8 GAO-13-157 Protecting Defense Technologies Administration ( DTSA ), military services, and DOD...implementation of technology security policies on international transfers of defense- related goods, services, and technologies; • directed DTSA to
Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, Shannon
In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less
NASA Technical Reports Server (NTRS)
Johnson, Walter W.; Kaiser, Mary K.
2003-01-01
Perspective synthetic displays that supplement, or supplant, the optical windows traditionally used for guidance and control of aircraft are accompanied by potentially significant human factors problems related to the optical geometric conformality of the display. Such geometric conformality is broken when optical features are not in the location they would be if directly viewed through a window. This often occurs when the scene is relayed or generated from a location different from the pilot s eyepoint. However, assuming no large visual/vestibular effects, a pilot cad often learn to use such a display very effectively. Important problems may arise, however, when display accuracy or consistency is compromised, and this can usually be related to geometrical discrepancies between how the synthetic visual scene behaves and how the visual scene through a window behaves. In addition to these issues, this paper examines the potentially critical problem of the disorientation that can arise when both a synthetic display and a real window are present in a flight deck, and no consistent visual interpretation is available.
Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong
Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.
Modelling the regulatory system for diabetes mellitus with a threshold window
NASA Astrophysics Data System (ADS)
Yang, Jin; Tang, Sanyi; Cheke, Robert A.
2015-05-01
Piecewise (or non-smooth) glucose-insulin models with threshold windows for type 1 and type 2 diabetes mellitus are proposed and analyzed with a view to improving understanding of the glucose-insulin regulatory system. For glucose-insulin models with a single threshold, the existence and stability of regular, virtual, pseudo-equilibria and tangent points are addressed. Then the relations between regular equilibria and a pseudo-equilibrium are studied. Furthermore, the sufficient and necessary conditions for the global stability of regular equilibria and the pseudo-equilibrium are provided by using qualitative analysis techniques of non-smooth Filippov dynamic systems. Sliding bifurcations related to boundary node bifurcations were investigated with theoretical and numerical techniques, and insulin clinical therapies are discussed. For glucose-insulin models with a threshold window, the effects of glucose thresholds or the widths of threshold windows on the durations of insulin therapy and glucose infusion were addressed. The duration of the effects of an insulin injection is sensitive to the variation of thresholds. Our results indicate that blood glucose level can be maintained within a normal range using piecewise glucose-insulin models with a single threshold or a threshold window. Moreover, our findings suggest that it is critical to individualise insulin therapy for each patient separately, based on initial blood glucose levels.
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
Under Secretary of Defense for Policy > OUSDP Offices > ASD for Homeland
Defense Global Security > Defense Critical Infrastructure Program > Roles Skip to main for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security DASD Defense -Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian Affairs Special Operations
Integrated homeland security system with passive thermal imaging and advanced video analytics
NASA Astrophysics Data System (ADS)
Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert
2007-04-01
A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.
NASA Astrophysics Data System (ADS)
Jiang, Wei; Zhou, Jianzhong; Zheng, Yang; Liu, Han
2017-11-01
Accurate degradation tendency measurement is vital for the secure operation of mechanical equipment. However, the existing techniques and methodologies for degradation measurement still face challenges, such as lack of appropriate degradation indicator, insufficient accuracy, and poor capability to track the data fluctuation. To solve these problems, a hybrid degradation tendency measurement method for mechanical equipment based on a moving window and Grey-Markov model is proposed in this paper. In the proposed method, a 1D normalized degradation index based on multi-feature fusion is designed to assess the extent of degradation. Subsequently, the moving window algorithm is integrated with the Grey-Markov model for the dynamic update of the model. Two key parameters, namely the step size and the number of states, contribute to the adaptive modeling and multi-step prediction. Finally, three types of combination prediction models are established to measure the degradation trend of equipment. The effectiveness of the proposed method is validated with a case study on the health monitoring of turbine engines. Experimental results show that the proposed method has better performance, in terms of both measuring accuracy and data fluctuation tracing, in comparison with other conventional methods.
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information...
GEODSS Present Configuration and Potential
2014-06-28
to provide critical metric tracking capacity for deep space catalog maintenance. The follow-up TOS designed as a deployable gap filler in SSN deep...CASTOR) - A RAVEN System In Canada [3]WindowPane Observatory Lanphier Shutter System 2014 Retrieved From: http://windowpaneobservatory.com/ [4]J.N
Thermal effects in Cs DPAL and alkali cell window damage
NASA Astrophysics Data System (ADS)
Zhdanov, B. V.; Rotondaro, M. D.; Shaffer, M. K.; Knize, R. J.
2016-10-01
Experiments on power scaling of Diode Pumped Alkali Lasers (DPALs) revealed some limiting parasitic effects such as alkali cell windows and gain medium contamination and damage, output power degradation in time and others causing lasing efficiency decrease or even stop lasing1 . These problems can be connected with thermal effects, ionization, chemical interactions between the gain medium components and alkali cells materials. Study of all these and, possibly, other limiting effects and ways to mitigate them is very important for high power DPAL development. In this talk we present results of our experiments on temperature measurements in the gain medium of operating Cs DPAL at different pump power levels in the range from lasing threshold to the levels causing damage of the alkali cell windows. For precise contactless in situ temperature measurements, we used an interferometric technique, developed in our lab2 . In these experiments we demonstrated that damage of the lasing alkali cell starts in the bulk with thermal breakdown of the hydrocarbon buffer gas. The degradation processes start at definite critical temperatures of the gain medium, different for each mixture of buffer gas. At this critical temperature, the hydrocarbon and the excited alkali metal begin to react producing the characteristic black soot and, possibly, some other chemical compounds, which both harm the laser performance and significantly increase the harmful heat deposition within the laser medium. This soot, being highly absorptive, is catastrophically heated to very high temperatures that visually observed as bulk burning. This process quickly spreads to the cell windows and causes their damage. As a result, the whole cell is also contaminated with products of chemical reactions.
Fabrication of Multi-point Side-Firing Optical Fiber by Laser Micro-ablation
Nguyen, Hoang; Arnob, Md Masud Parvez; Becker, Aaron T; Wolfe, John C; Hogan, Matthew K; Horner, Philip J; Shih, Wei-Chuan
2018-01-01
A multi-point, side-firing design enables an optical fiber to output light at multiple desired locations along the fiber body. This provides advantages over traditional end-to-end fibers, especially in applications requiring fiber bundles such as brain stimulation or remote sensing. This paper demonstrates that continuous wave (CW) laser micro-ablation can controllably create conical-shaped cavities, or side windows, for outputting light. The dimensions of these cavities determine the amount of firing light and their firing angle. Experimental data show that a single side window on a 730 μm fiber can deliver more than 8 % of the input light. This was increased to more than 19 % on a 65 μm fiber with side windows created using femtosecond (fs) laser ablation and chemical etching. Fine control of light distribution along an optical fiber is critical for various biomedical applications such as light activated drug-release and optogenetics studies. PMID:28454166
Fabrication of multipoint side-firing optical fiber by laser micro-ablation.
Nguyen, Hoang; Parvez Arnob, Md Masud; Becker, Aaron T; Wolfe, John C; Hogan, Matthew K; Horner, Philip J; Shih, Wei-Chuan
2017-05-01
A multipoint, side-firing design enables an optical fiber to output light at multiple desired locations along the fiber body. This provides advantages over traditional end-to-end fibers, especially in applications requiring fiber bundles such as brain stimulation or remote sensing. This Letter demonstrates that continuous wave (CW) laser micro-ablation can controllably create conical-shaped cavities, or side windows, for outputting light. The dimensions of these cavities determine the amount of firing light and their firing angle. Experimental data show that a single side window on a 730 μm fiber can deliver more than 8% of the input light. This can be increased to more than 19% on a 65 μm fiber with side windows created using femtosecond laser ablation and chemical etching. Fine control of light distribution along an optical fiber is critical for various biomedical applications such as light-activated drug-release and optogenetics studies.
Pressures in the human cochlea during bone conduction
NASA Astrophysics Data System (ADS)
Stieger, Christof; Farahmand, Rosemary B.; Page, Brent F.; Roushan, Kourosh; Merchant, Julie P.; Abur, Defne; Rosowski, John J.; Nakajima, Hideko Heidi
2015-12-01
The mechanisms of bone conduction (BC) hearing, which is important in diagnosis and treatment of hearing loss, are poorly understood, thus limiting use of BC. Recently, information gained by intracochlear pressure measurements has revealed that the mechanisms of sound transmission that drive pressure differences across the cochlear partition are different for air conduction (AC) than for round-window stimulation. Presently we are utilizing these pressure measurement techniques in fresh human cadaveric preparations to improve our understanding of sound transmission during BC. We have modified our technique of intracochlear pressure measurements for the special requirements of studying BC, as bone vibration poses challenges for making these measurements. Fiberoptic pressure sensors were inserted through cochleostomies in both scalae at the base of the cochlea. The cochleostomies were then tightly sealed with the sensors in place to prevent air and fluid leaks, and the sensors were firmly secured to ensure uniform vibrations of the sensors and surrounding bone of the cochlea. The velocity of the stapes, round window and cochlear promontory were each measured with laser Doppler vibrometry simultaneous to the intracochlear pressure measurements. To understand the contribution of middle-ear inertia, the incudo-stapedial joint was severed. Subsequently, the stapes footplate was fixed (similar to the consequence of otosclerosis) to determine the effect of removing the mobility of the oval window. BC stimulation resulted in pressure in scala vestibuli that was significantly higher than in scala tympani, such that the differential pressure across the partition - the cochlear drive input - was similar to scala vestibuli pressure (and overall, similar to the relationship found during AC but different than during round-window stimulation). After removing the inertial mass of the middle ear, with only the stapes attached to the flexible oval window, all pressures dropped similarly (10 dB). Fixing the oval window resulted in further drop of all pressures (10 dB more). These decreases in pressure occurred around 1-4 kHz, consistent with clinical observations of Carhart's notch.
The Energy and Security Nexus: A Strategic Dilemma
2012-11-01
constructive criticism where it was most needed. ix Joseph Caddell also provided crucial guidance in framing the conference proposal. Finally, my thanks...conflict. Critics of biofuels further claim that diversion of land for fuel in the United States has driven up world food prices and arguably triggered...recycle and consume all actinides may provide a solution. But they arguably carry a proliferation risk. Steps can be taken to safeguard and secure
A Tool for Rating the Resilience of Critical Infrastructures in Extreme Fires
2014-05-01
provide a tool for NRC to help the Canadian industry to develop extreme fire protection materials and technologies for critical infrastructures. Future...supported by the Canadian Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in...in oil refinery and chemical industry facilities. The only available standard in North America that addresses the transportation infrastructure is
Internet Governance and National Security
2012-01-01
the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor porate espionage.5 Malicious actors add...governance of critical Internet re sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of
Enhancing security and improving interoperability in healthcare information systems.
Gritzalis, D A
1998-01-01
Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.
Data Privacy and Security in Higher Education
ERIC Educational Resources Information Center
Williams, Tracy
2003-01-01
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
ERIC Educational Resources Information Center
Sedlack, Derek J.
2012-01-01
A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Billings, Jay J.; Bonior, Jason D.; Evans, Philip G.
Securely transferring timing information in the electrical grid is a critical component of securing the nation's infrastructure from cyber attacks. One solution to this problem is to use quantum information to securely transfer the timing information across sites. This software provides such an infrastructure using a standard Java webserver that pulls the quantum information from associated hardware.
Network Security: What Non-Technical Administrators Must Know
ERIC Educational Resources Information Center
Council, Chip
2005-01-01
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Racing to the Future: Security in the Gigabit Race?
ERIC Educational Resources Information Center
Gregory, Mark A; Cradduck, Lucy
2016-01-01
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo
2006-01-01
The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less
Is There a Critical Period for the Developmental Neurotoxicity of Low-Level Tobacco Smoke Exposure?
Slotkin, Theodore A; Stadler, Ashley; Skavicus, Samantha; Card, Jennifer; Ruff, Jonathan; Levin, Edward D; Seidler, Frederic J
2017-01-01
Secondhand tobacco smoke exposure in pregnancy increases the risk of neurodevelopmental disorders. We evaluated in rats whether there is a critical period during which tobacco smoke extract (TSE) affects the development of acetylcholine and serotonin systems, prominent targets for adverse effects of nicotine and tobacco smoke. We simulated secondhand smoke exposure by administering TSE so as to produce nicotine concentrations one-tenth those in active smoking, with 3 distinct, 10-day windows: premating, early gestation or late gestation. We conducted longitudinal evaluations in multiple brain regions, starting in early adolescence (postnatal day 30) and continued to full adulthood (day 150). TSE exposure in any of the 3 windows impaired presynaptic cholinergic activity, exacerbated by a decrement in nicotinic cholinergic receptor concentrations. Although the adverse effects were seen for all 3 treatment windows, there was a distinct progression, with lowest sensitivity for premating exposure and higher sensitivity for gestational exposures. Serotonin receptors were also reduced by TSE exposure with the same profile: little effect with premating exposure, intermediate effect with early gestational exposure and large effect with late gestational exposure. As serotonergic circuits can offset the neurobehavioral impact of cholinergic deficits, these receptor changes were maladaptive. Thus, there is no single 'critical period' for effects of low-level tobacco smoke but there is differential sensitivity dependent upon the developmental stage at the time of exposure. Our findings reinforce the need to avoid secondhand smoke exposure not only during pregnancy, but also in the period prior to conception, or generally for women of childbearing age. © The Author 2016. Published by Oxford University Press on behalf of the Society of Toxicology. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Organizational effects of the antiandrogen, Vinclozolin, on penis development in the mouse.
Amato, Ciro M; Boyd, Morgan; Yang, Joshua; McCoy, Krista A
2018-04-14
Endocrine disrupting chemicals (EDCs) are pollutants found throughout the environment that disrupt normal endocrine processes. In mice, penis development is thought to be most susceptible to EDCs during a critical developmental window occurring on embryonic days (E) 15.5-17.5. However, androgen signaling begins on E13.5 when Androgen Receptor (AR) protein is found in the genitalia and testosterone is circulating. We hypothesize that disrupting androgen signaling prior to the established critical window sensitizes the penis to future androgen disruption. To test this hypothesis, CD1 dams were exposed to Vinclozolin or a corn oil solvent control on E13.5 and E14.5 and AR levels were measured with immunohistochemistry on E14.5. Early antiandrogen exposure reduced AR within nuclei and decreased intensity of AR expression within E14.5 genitalia. To evaluate the influence of antiandrogen exposure before the known critical window of penis development, two groups of pregnant dams (n = 3) were exposed to Vinclozolin starting at either E13.5 or E14.5 and continued exposure through E16.5. Histology and M.O.U.S.E. scoring were used to quantify penis abnormalities. To account for differences in total doses mice experienced due to differences in length of dosing time, we compared animals that received the same total doses. Exposure to antiandrogens on E13.5 exacerbated malformations when exposure was continued through sexually dimorphic development. Both exposure time and Vinclozolin dose are important for severity of Vinclozolin-induced penis abnormalities in mice. This work shows, antiandrogen exposure prior to sensitive periods can exacerbate the effects of later antiandrogen exposure on reproductive development.
Ad-Hoc Networks and the Mobile Application Security System (MASS)
2006-01-01
solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems
NASA Astrophysics Data System (ADS)
Meltzer, David J.; Holliday, Vance T.; Cannon, Michael D.; Miller, D. Shane
2014-05-01
According to the Younger Dryas Impact Hypothesis (YDIH), ∼12,800 calendar years before present, North America experienced an extraterrestrial impact that triggered the Younger Dryas and devastated human populations and biotic communities on this continent and elsewhere. This supposed event is reportedly marked by multiple impact indicators, but critics have challenged this evidence, and considerable controversy now surrounds the YDIH. Proponents of the YDIH state that a key test of the hypothesis is whether those indicators are isochronous and securely dated to the Younger Dryas onset. They are not. We have examined the age basis of the supposed Younger Dryas boundary layer at the 29 sites and regions in North and South America, Europe, and the Middle East in which proponents report its occurrence. Several of the sites lack any age control, others have radiometric ages that are chronologically irrelevant, nearly a dozen have ages inferred by statistically and chronologically flawed age-depth interpolations, and in several the ages directly on the supposed impact layer are older or younger than ∼12,800 calendar years ago. Only 3 of the 29 sites fall within the temporal window of the YD onset as defined by YDIH proponents. The YDIH fails the critical chronological test of an isochronous event at the YD onset, which, coupled with the many published concerns about the extraterrestrial origin of the purported impact markers, renders the YDIH unsupported. There is no reason or compelling evidence to accept the claim that a cosmic impact occurred ∼12,800 y ago and caused the Younger Dryas.
Impacts of 1.5 versus 2.0 °C on cereal yields in the West African Sudan Savanna
NASA Astrophysics Data System (ADS)
Faye, Babacar; Webber, Heidi; Naab, Jesse B.; MacCarthy, Dilys S.; Adam, Myriam; Ewert, Frank; Lamers, John P. A.; Schleussner, Carl-Friedrich; Ruane, Alex; Gessner, Ursula; Hoogenboom, Gerrit; Boote, Ken; Shelia, Vakhtang; Saeed, Fahad; Wisser, Dominik; Hadir, Sofia; Laux, Patrick; Gaiser, Thomas
2018-03-01
To reduce the risks of climate change, governments agreed in the Paris Agreement to limit global temperature rise to less than 2.0 °C above pre-industrial levels, with the ambition to keep warming to 1.5 °C. Charting appropriate mitigation responses requires information on the costs of mitigating versus associated damages for the two levels of warming. In this assessment, a critical consideration is the impact on crop yields and yield variability in regions currently challenged by food insecurity. The current study assessed impacts of 1.5 °C versus 2.0 °C on yields of maize, pearl millet and sorghum in the West African Sudan Savanna using two crop models that were calibrated with common varieties from experiments in the region with management reflecting a range of typical sowing windows. As sustainable intensification is promoted in the region for improving food security, simulations were conducted for both current fertilizer use and for an intensification case (fertility not limiting). With current fertilizer use, results indicated 2% units higher losses for maize and sorghum with 2.0 °C compared to 1.5 °C warming, with no change in millet yields for either scenario. In the intensification case, yield losses due to climate change were larger than with current fertilizer levels. However, despite the larger losses, yields were always two to three times higher with intensification, irrespective of the warming scenario. Though yield variability increased with intensification, there was no interaction with warming scenario. Risk and market analysis are needed to extend these results to understand implications for food security.
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.
2011-11-01
The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.
The Zwicky Transient Facility Camera
NASA Astrophysics Data System (ADS)
Dekany, Richard; Smith, Roger M.; Belicki, Justin; Delacroix, Alexandre; Duggan, Gina; Feeney, Michael; Hale, David; Kaye, Stephen; Milburn, Jennifer; Murphy, Patrick; Porter, Michael; Reiley, Daniel J.; Riddle, Reed L.; Rodriguez, Hector; Bellm, Eric C.
2016-08-01
The Zwicky Transient Facility Camera (ZTFC) is a key element of the ZTF Observing System, the integrated system of optoelectromechanical instrumentation tasked to acquire the wide-field, high-cadence time-domain astronomical data at the heart of the Zwicky Transient Facility. The ZTFC consists of a compact cryostat with large vacuum window protecting a mosaic of 16 large, wafer-scale science CCDs and 4 smaller guide/focus CCDs, a sophisticated vacuum interface board which carries data as electrical signals out of the cryostat, an electromechanical window frame for securing externally inserted optical filter selections, and associated cryo-thermal/vacuum system support elements. The ZTFC provides an instantaneous 47 deg2 field of view, limited by primary mirror vignetting in its Schmidt telescope prime focus configuration. We report here on the design and performance of the ZTF CCD camera cryostat and report results from extensive Joule-Thompson cryocooler tests that may be of broad interest to the instrumentation community.
NASA Astrophysics Data System (ADS)
Mattsson, Thomas R.; Jones, Reese; Ward, Donald; Spataru, Catalin; Shulenburger, Luke; Benedict, Lorin X.
2015-06-01
Window materials are ubiquitous in shock physics and with high energy density drivers capable of reaching multi-Mbar pressures the use of LiF is increasing. Velocimetry and temperature measurements of a sample through a window are both influenced by the assumed index of refraction and thermal conductivity, respectively. We report on calculations of index of refraction using the many-body theory GW and thermal ionic conductivity using linear response theory and model potentials. The results are expected to increase the accuracy of a broad range of high-pressure shock- and ramp compression experiments. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Company, for the U.S. Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000.
CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 6
2005-06-01
Bollinger The MITRE Corporation1 Progress brings new dangers: Powerful home computers, inexpensive high-speed Internet access, telecommuting , and software...been using for years. Sure enough, GIANT was able to finish removing the hard - core spyware. At some point, my Internet security package had been... The sad truth is that if you do nothing more than attach a Windows PC to the Internet over a high- speed line, it will be subjected to the first
Spectral Graph Theory Analysis of Software-Defined Networks to Improve Performance and Security
2015-09-01
listed with its associated IP address. 3. Hardware Components The hardware in the test bed included HP switches and Raspberry Pis . Two types of...discernible difference between the two types. The hosts in the network are Raspberry Pis [58], which are small, inexpensive computers with 10/100... Pis ran one of four operating systems: Raspbian, ArchLinux, Kali, 85 and Windows 10. All of the Raspberry Pis were configured with Iperf [59
WATER PUMP HOUSE, TRA619, AND TWO WATER STORAGE RESERVOIRS. INDUSTRIAL ...
WATER PUMP HOUSE, TRA-619, AND TWO WATER STORAGE RESERVOIRS. INDUSTRIAL WINDOWS AND COPING STRIPS AT TOP OF WALLS AND ENTRY VESTIBULE. BOLLARDS PROTECT UNDERGROUND FACILITIES. SWITCHYARD AT RIGHT EDGE OF VIEW. CARD IN LOWER RIGHT WAS INSERTED BY INL PHOTOGRAPHER TO COVER AN OBSOLETE SECURITY RESTRICTION PRINTED ON ORIGINAL NEGATIVE. INL NEGATIVE NO. 3816. Unknown Photographer, 11/28/1951 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
NASA Technical Reports Server (NTRS)
Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy
2015-01-01
Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.
Lee Pow, Crystal S. D.; Tilahun, Kedamawit; Creech, Kari; Law, J. Mac; Cope, W. Gregory; Kwak, Thomas J.; Rice, James A.; Aday, D. Derek; Kullman, Seth W.
2017-01-01
Estrogens and estrogen mimics are commonly found in surface waters and are associated with deleterious effects in fish populations. Impaired fertility and fecundity in fish following chronic exposures to estrogens and estrogen mimics during critical windows in development are well documented. However, information regarding differential reproductive effects of exposure within defined developmental stages remains sparse. In this study, reproductive capacity was assessed in Japanese medaka (Oryzias latipes) after exposure to two concentrations of 17β–estradiol (E2β; 2 ng/L and 50 ng/L) during four distinct stages of development: gonad development, gonad differentiation, development of secondary sex characteristics (SSC) and gametogenesis. Exposure to E2β did not adversely impact survival, hatch success, growth, or genotypic ratios. In contrast, exposure to 50 ng/L E2β during SSC development altered phenotypic ratios and SSC. Exposure to both E2β treatments reduced reproductive capacity (fertility, fecundity) by 7.3–57.4% in adult medaka breeding pairs, with hindrance of SSC development resulting in the largest disruption in breeding capacity (51.6–57.4% decrease) in the high concentration. This study documents differential effects among four critical stages of development and provides insight into factors (window of exposure, exposure concentration and duration of exposure period) contributing to reproductive disruption in fish.
ERIC Educational Resources Information Center
Munin, Art
2007-01-01
The unfortunate reality is that racism permeates life. The time that students spend in higher education offers a window of opportunity for educators to confront students' assumptions about the world and challenge them to critically analyze their experience. After students complete their education, they carry their knowledge to offices, law firms,…
Oviparous vertebrates generally occupy important niches in aquatic as well as terrestrial systems, and reproductive and developmental effects on these species can be of relatively great ecological significance. Because these organisms have critical windows of development, they ma...
ENVIRONMENTAL FACTORS ASSOCIATED WITH MENTAL RETARDATION AND DEVELOPMENT DISABILITY
Abstract
A number of environmental agents have been shown to demonstrate neurotoxic effects either in human or laboratory animal studies. Critical windows of vulnerability to the effects of these agents occur both pre- and postnatally. The nervous system is relatively un...
NASA Astrophysics Data System (ADS)
Ito, Hiroaki; Murakami, Ryo; Sakuma, Shinya; Tsai, Chia-Hung Dylan; Gutsmann, Thomas; Brandenburg, Klaus; Pöschl, Johannes M. B.; Arai, Fumihito; Kaneko, Makoto; Tanaka, Motomu
2017-02-01
Large deformability of erythrocytes in microvasculature is a prerequisite to realize smooth circulation. We develop a novel tool for the three-step “Catch-Load-Launch” manipulation of a human erythrocyte based on an ultra-high speed position control by a microfluidic “robotic pump”. Quantification of the erythrocyte shape recovery as a function of loading time uncovered the critical time window for the transition between fast and slow recoveries. The comparison with erythrocytes under depletion of adenosine triphosphate revealed that the cytoskeletal remodeling over a whole cell occurs in 3 orders of magnitude longer timescale than the local dissociation-reassociation of a single spectrin node. Finally, we modeled septic conditions by incubating erythrocytes with endotoxin, and found that the exposure to endotoxin results in a significant delay in the characteristic transition time for cytoskeletal remodeling. The high speed manipulation of erythrocytes with a robotic pump technique allows for high throughput mechanical diagnosis of blood-related diseases.
Towards the cyber security paradigm of ehealth: Resilience and design aspects
NASA Astrophysics Data System (ADS)
Rajamäki, Jyri; Pirinen, Rauno
2017-06-01
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.
Information security : is your information safe?
DOT National Transportation Integrated Search
1999-01-01
This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...
6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and...
6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and...
6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and...
6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and...
6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and...
The Globalization of Higher Education as a Societal and Cultural Security Problem
ERIC Educational Resources Information Center
Samier, Eugenie A.
2015-01-01
In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…
The Market Value of Information System (IS) Security: An Event Study of E-Banking Service Providers
ERIC Educational Resources Information Center
Brock, Linda
2012-01-01
Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study…
ERIC Educational Resources Information Center
Kim, Philip
2010-01-01
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
A Framework for the Governance of Information Security
ERIC Educational Resources Information Center
Edwards, Charles K.
2013-01-01
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Federated Security: The Shibboleth Approach
ERIC Educational Resources Information Center
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken
2004-01-01
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Social Security Number Protection Laws: State-by-State Summary Table
ERIC Educational Resources Information Center
Data Quality Campaign, 2011
2011-01-01
As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…
Security Design Flaws That Affect Usability in Online Banking
ERIC Educational Resources Information Center
Gurlen, Stephanie
2013-01-01
As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…
75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... recommended laboratory critical infrastructure security standards in these areas; and 5. other emerging policy... legitimate activities. (c) Understanding that research and laboratory work on BSAT is essential to both... of the SAR that would establish security standards specific to Tier 1 agents and toxins. (b) The...
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
NASA Technical Reports Server (NTRS)
Powell, John D.; Gilliam, David
2004-01-01
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.
2009-02-01
management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic
Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding
2015-12-01
ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA ASSISTANCE FUNDING by Craig Mohar December 2015 Thesis Co-Advisors: Kathleen...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ASSESSING GRANT ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA...the Department of Homeland Security (DHS) is critical for building and sustaining preparedness in urban areas. According to the 9/11 Commission Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chaffin, May
May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks.Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.
Update on security plans to prevent bioterrorism attacks during agricultural bacilli programs
Robert A. Fusco
2003-01-01
In the aftermath of September 11, security in aerial application suppression programs utilizing Bacillus thuringiensis has become a critical concern for State pest control managers and aerial applicators.
Do windows or natural views affect outcomes or costs among patients in ICUs?
Kohn, Rachel; Harhay, Michael O; Cooney, Elizabeth; Small, Dylan S; Halpern, Scott D
2013-07-01
To determine whether potential exposure to natural light via windows or to more pleasing views through windows affects outcomes or costs among critically ill patients. Retrospective cohort study. An academic hospital in Philadelphia, PA. Six thousand one hundred thirty-eight patients admitted to a 24-bed medical ICU and 6,631 patients admitted to a 24-bed surgical ICU from July 1, 2006, to June 30, 2010. Assignment to medical ICU rooms with vs. without windows and to surgical ICU rooms with natural vs. industrial views based on bed availability. In primary analyses adjusting for patient characteristics, medical ICU patients admitted to rooms with (n = 4,093) versus without (n = 2,243) windows did not differ in rates of ICU (p = 0.25) or in-hospital (p = 0.94) mortality, ICU readmissions (p = 0.37), or delirium (p = 0.56). Surgical ICU patients admitted to rooms with natural (n = 3,072) versus industrial (n = 3,588) views experienced slightly shorter ICU lengths of stay and slightly lower variable costs. Instrumental variable analyses based on initial bed assignment and exposure time did not show any differences in any outcomes in either the medical ICU or surgical ICU cohorts, and none of the differences noted in primary analyses remained statistically significant when adjusting for multiple comparisons. In a prespecified subgroup analysis among patients with ICU length of stay greater than 72 hours, MICU windows were associated with reduced ICU (p = 0.02) and hospital mortality (p = 0.04); these results did not meet criteria for significance after adjustment for multiple comparisons. ICU rooms with windows or natural views do not improve outcomes or reduce costs of in-hospital care for general populations of medical and surgical ICU patients. Future work is needed to determine whether targeting light from windows directly toward patients influences outcomes and to explore these effects in patients at high risk for adverse outcomes.
Managing Complex IT Security Processes with Value Based Measures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali
2009-01-01
Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides amore » comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.« less
USDA-ARS?s Scientific Manuscript database
Metamorphosis is an important developmental stage for holometabolous insects, during which adult morphology and physiology are established. Proper development relies on optimal body temperatures, and natural ambient temperature (Ta) fluctuations, especially in spring or in northern latitudes, could ...
Optimization of ramp area aircraft push back time windows in the presence of uncertainty
NASA Astrophysics Data System (ADS)
Coupe, William Jeremy
It is well known that airport surface traffic congestion at major airports is responsible for increased taxi-out times, fuel burn and excess emissions and there is potential to mitigate these negative consequences through optimizing airport surface traffic operations. Due to a highly congested voice communication channel between pilots and air traffic controllers and a data communication channel that is used only for limited functions, one of the most viable near-term strategies for improvement of the surface traffic is issuing a push back advisory to each departing aircraft. This dissertation focuses on the optimization of a push back time window for each departing aircraft. The optimization takes into account both spatial and temporal uncertainties of ramp area aircraft trajectories. The uncertainties are described by a stochastic kinematic model of aircraft trajectories, which is used to infer distributions of combinations of push back times that lead to conflict among trajectories from different gates. The model is validated and the distributions are included in the push back time window optimization. Under the assumption of a fixed taxiway spot schedule, the computed push back time windows can be integrated with a higher level taxiway scheduler to optimize the flow of traffic from the gate to the departure runway queue. To enable real-time decision making the computational time of the push back time window optimization is critical and is analyzed throughout.
Neural Correlates of Multisensory Perceptual Learning
Powers, Albert R.; Hevey, Matthew A.; Wallace, Mark T.
2012-01-01
The brain’s ability to bind incoming auditory and visual stimuli depends critically on the temporal structure of this information. Specifically, there exists a temporal window of audiovisual integration within which stimuli are highly likely to be perceived as part of the same environmental event. Several studies have described the temporal bounds of this window, but few have investigated its malleability. Recently, our laboratory has demonstrated that a perceptual training paradigm is capable of eliciting a 40% narrowing in the width of this window that is stable for at least one week after cessation of training. In the current study we sought to reveal the neural substrates of these changes. Eleven human subjects completed an audiovisual simultaneity judgment training paradigm, immediately before and after which they performed the same task during an event-related 3T fMRI session. The posterior superior temporal sulcus (pSTS) and areas of auditory and visual cortex exhibited robust BOLD decreases following training, and resting state and effective connectivity analyses revealed significant increases in coupling among these cortices after training. These results provide the first evidence of the neural correlates underlying changes in multisensory temporal binding and that likely represent the substrate for a multisensory temporal binding window. PMID:22553032
A Virtual Study of Grid Resolution on Experiments of a Highly-Resolved Turbulent Plume
NASA Astrophysics Data System (ADS)
Maisto, Pietro M. F.; Marshall, Andre W.; Gollner, Michael J.; Fire Protection Engineering Department Collaboration
2017-11-01
An accurate representation of sub-grid scale turbulent mixing is critical for modeling fire plumes and smoke transport. In this study, PLIF and PIV diagnostics are used with the saltwater modeling technique to provide highly-resolved instantaneous field measurements in unconfined turbulent plumes useful for statistical analysis, physical insight, and model validation. The effect of resolution was investigated employing a virtual interrogation window (of varying size) applied to the high-resolution field measurements. Motivated by LES low-pass filtering concepts, the high-resolution experimental data in this study can be analyzed within the interrogation windows (i.e. statistics at the sub-grid scale) and on interrogation windows (i.e. statistics at the resolved scale). A dimensionless resolution threshold (L/D*) criterion was determined to achieve converged statistics on the filtered measurements. Such a criterion was then used to establish the relative importance between large and small-scale turbulence phenomena while investigating specific scales for the turbulent flow. First order data sets start to collapse at a resolution of 0.3D*, while for second and higher order statistical moments the interrogation window size drops down to 0.2D*.
2016-01-01
accomplish a patch- management mission while securing a critical path. As a first proof of concept a simulation with a network of 10 nodes and 4...software-agility walk of the “PERFORMANCE Each Threat Managed ” tree is slightly more complex than the network -agility walk. The original design of the...CyFiA was tested to accomplish a patch- management mission while securing a critical path. As a first proof of concept a simulation with a network of 10
Near real-time vaccine safety surveillance with partially accrued data.
Greene, Sharon K; Kulldorff, Martin; Yin, Ruihua; Yih, W Katherine; Lieu, Tracy A; Weintraub, Eric S; Lee, Grace M
2011-06-01
The Vaccine Safety Datalink (VSD) Project conducts near real-time vaccine safety surveillance using sequential analytic methods. Timely surveillance is critical in identifying potential safety problems and preventing additional exposure before most vaccines are administered. For vaccines that are administered during a short period, such as influenza vaccines, timeliness can be improved by undertaking analyses while risk windows following vaccination are ongoing and by accommodating predictable and unpredictable data accrual delays. We describe practical solutions to these challenges, which were adopted by the VSD Project during pandemic and seasonal influenza vaccine safety surveillance in 2009/2010. Adjustments were made to two sequential analytic approaches. The Poisson-based approach compared the number of pre-defined adverse events observed following vaccination with the number expected using historical data. The expected number was adjusted for the proportion of the risk window elapsed and the proportion of inpatient data estimated to have accrued. The binomial-based approach used a self-controlled design, comparing the observed numbers of events in risk versus comparison windows. Events were included in analysis only if they occurred during a week that had already passed for both windows. Analyzing data before risk windows fully elapsed improved the timeliness of safety surveillance. Adjustments for data accrual lags were tailored to each data source and avoided biasing analyses away from detecting a potential safety problem, particularly early during surveillance. The timeliness of vaccine and drug safety surveillance can be improved by properly accounting for partially elapsed windows and data accrual delays. Copyright © 2011 John Wiley & Sons, Ltd.
Kusche, Kristopher P
2004-01-01
No longer just an information technology issue, network security requires a multifaceted, multidisciplinary approach to ensuring critical equipment functionality, data security, and patient safety. This article provides insight into the threat of malware and ways to deal with it.
GEP 6.5LT Engine Cetane Window Evaluation for ATJ/JP-8 Fuel Blends
2015-09-01
matching pre- calibrated amplifier • BEI Shaft Encoder (0.2 CAD) • Wolff Instrumented Injector for needle lift The high speed data was recorded and post...14. ABSTRACT The European Stationary Cycle 13 Mode test and a power curve was performed on a 6.5L turbocharged V-8 diesel engine for three ATJ...15. SUBJECT TERMS ATJ, Alcohol to Jet, Cetane Number, Synthetic Fuel, JP-8, diesel engine, combustion 16. SECURITY CLASSIFICATION OF: 17
Naval Postgraduate School Research. Volume 10, Number 1, February 2000
2000-02-01
morale waned along with public perceptions of the military; reports of disciplinary problems, drug use, and substandard performance circulated widely...1.78 m long, 0.86 m wide, and 0.61 m deep. Inserted at the center of both sides of the tank, are 37x27x0.6 cm viewing glass windows (Figure 2...potential research directions in multimedia and network- ing. NATIONAL SECURITY AFFAIRS L.J. Roberts, The Lebanese in Ecuador: A History of Emerging
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
Karschner, Erin L; Swortwood, Madeleine J; Hirvonen, Jussi; Goodwin, Robert S; Bosker, Wendy M; Ramaekers, Johannes G; Huestis, Marilyn A
2016-07-01
Cannabis smoking increases motor vehicle accident risk. Empirically defined cannabinoid detection windows are important to drugged driving legislation. Our aims were to establish plasma cannabinoid detection windows in frequent cannabis smokers and to determine if residual cannabinoid concentrations were correlated with psychomotor performance. Twenty-eight male chronic frequent cannabis smokers resided on a secure research unit for up to 33 days with daily blood collection. Plasma specimens were analyzed for Δ(9) -tetrahydrocannabinol (THC), 11-hydroxy-THC (11-OH-THC), and 11-nor-9-carboxy-THC (THCCOOH) by gas chromatography-mass spectrometry. Critical tracking and divided attention tasks were administered at baseline (after overnight stay to ensure lack of acute intoxication) and after 1, 2, and 3 weeks of cannabis abstinence. Twenty-seven of the twenty-eight participants were THC-positive at admission (median 4.2 µg/L). THC concentrations significantly decreased 24 h after admission, but were still ≥2 µg/L in 16 of the 28 participants 48 h after admission. THC was detected in 3 of 5 specimens on day 30. The last positive 11-OH-THC specimen was 15 days after admission. THCCOOH was measureable in 4 of 5 participants after 30 days of abstinence. Years of prior cannabis use significantly correlated with THC concentrations on admission, and days 7 and 14. Tracking error, evaluated by the Divided Attention Task, was the only evaluated psychomotor assessment significantly correlated with cannabinoid concentrations at baseline and day 8 (11-OH-THC only). Median THC was 0.3 µg/L in 5 chronic frequent cannabis smokers' plasma samples after 30 days of sustained abstinence. Published 2015. This article is a U.S. Government work and is in the public domain in the USA. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
Critical infrastructure protection.
Deitz, Kim M
2012-01-01
Current government policies for protecting the nation's critical infrastructure are described in this article which focuses on hospital disaster planning and incident management and the significant role of Security in infrastructure protection
Critical Evaluations and Instructional Potential of Authoring and Titled Program Software.
ERIC Educational Resources Information Center
Reppert, James E.
This paper describes and evaluates the instructional uses of the Claris Works and Ultimedia Tools Series authoring programs and the following titled software programs: CNN Time Capsule: 100 Defining Moments of 1993; Windows Magazine: 1994; Ultimate Digital Studio; Data Trek Manager Series; and Cinemania '95. (AEF)
14 CFR 23.775 - Windshields and windows.
Code of Federal Regulations, 2011 CFR
2011-01-01
... loadings and flight loads, or compliance with the fail-safe requirements of paragraph (d) of this section... loads combined with critical aerodynamic pressure and temperature effects, after failure of any load... in front of the pilots must be arranged so that, assuming the loss of vision through any one panel...
14 CFR 23.775 - Windshields and windows.
Code of Federal Regulations, 2010 CFR
2010-01-01
... loadings and flight loads, or compliance with the fail-safe requirements of paragraph (d) of this section... loads combined with critical aerodynamic pressure and temperature effects, after failure of any load... in front of the pilots must be arranged so that, assuming the loss of vision through any one panel...
14 CFR 23.775 - Windshields and windows.
Code of Federal Regulations, 2014 CFR
2014-01-01
... loadings and flight loads, or compliance with the fail-safe requirements of paragraph (d) of this section... loads combined with critical aerodynamic pressure and temperature effects, after failure of any load... in front of the pilots must be arranged so that, assuming the loss of vision through any one panel...
14 CFR 23.775 - Windshields and windows.
Code of Federal Regulations, 2013 CFR
2013-01-01
... loadings and flight loads, or compliance with the fail-safe requirements of paragraph (d) of this section... loads combined with critical aerodynamic pressure and temperature effects, after failure of any load... in front of the pilots must be arranged so that, assuming the loss of vision through any one panel...
14 CFR 23.775 - Windshields and windows.
Code of Federal Regulations, 2012 CFR
2012-01-01
... loadings and flight loads, or compliance with the fail-safe requirements of paragraph (d) of this section... loads combined with critical aerodynamic pressure and temperature effects, after failure of any load... in front of the pilots must be arranged so that, assuming the loss of vision through any one panel...
Administrator Preparation: Looking Backwards and Forwards
ERIC Educational Resources Information Center
Bridges, Edwin
2012-01-01
Purpose: The purpose of this paper was to conduct a critical analysis of the origins and implementation of problem-based learning in educational administration as a window into the limitations of this approach and more generally administrator preparation. Design/methodology/approach: The author reviewed the published work of the originator from…
Emerging evidence suggests environmental chemical exposures during critical windows of development may contribute to the escalating prevalence of obesity. We tested the hypothesis that prenatal air pollution exposure would predispose the offspring to weight gain in adulthood. Pre...
False Recognition in DRM Lists with Low Association: A Normative Study
ERIC Educational Resources Information Center
Cadavid, Sara; Beato, María Soledad
2017-01-01
A wide array of studies have explored memory distortions with the Deese/Roediger-McDermott (DRM) paradigm, where participants study lists of words (e.g., "door," "glass," "pane," "shade," "ledge," etc.) that are associated to another nonpresented critical word (e.g., WINDOW). On a subsequent memory…
Past epidemiologic studies suggest maternal ambient air pollution exposure during critical periods of the pregnancy is associated with fetal development. We introduce a multinomial probit model that allows for the joint identification of susceptible daily periods during the pregn...
ERIC Educational Resources Information Center
Murphy, Beth; Hedwall, Melissa; Dirks, Andrew; Stretch, Elizabeth
2017-01-01
Reading provides a unique window into the history and nature of science and the norms of scientific communication and supports students in developing critical-reading skills in engaging ways. Effective use of reading promotes a spirit of inquiry and an understanding of science concepts while also addressing expectations of the Common Core State…
Climate optimized planting windows for cotton in the lower Mississippi Delta region
USDA-ARS?s Scientific Manuscript database
Unique, variable summer climate of the lower Mississippi Delta region poses a critical challenge to cotton producers in deciding when to plant for optimized production. Traditional 2- to 4-year agronomic field trials conducted in this area fail to capture the effects of long-term climate variabiliti...
NASA Astrophysics Data System (ADS)
Freissinet, C.; Glavin, D. P.; Mahaffy, P. R.; Szopa, C.; Buch, A.; Goesmann, F.; Goetz, W.; Raulin, F.; SAM Science Team; MOMA Science Team
2018-04-01
SAM (Curiosity) and MOMA (ExoMars) Mars instruments, seeking for organics and biosignatures, are essential to establish taphonomic windows of preservation of molecules, in order to target the most interesting samples to return from Mars.
The public transportation system security and emergency preparedness planning guide
DOT National Transportation Integrated Search
2003-01-01
Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...
Humans Are Still the Critical Factor in Aviation Security.
Krüger, Jenny Kathinka; Suchan, Boris
2015-10-01
In Germany, the German Federal Police assess the performance of aviation security screeners on a regular basis. These so-called "reality tests" are unannounced examinations which aim to investigate whether airport screeners can detect forbidden items in hand luggage or attached to the body. Recent alarming results of such inspections showed clearly that the overall detection rate is in need of improvement. To achieve this, it is important to identify specific factors that influence general screening performance. This especially includes basic cognitive functions like visual screening, alertness, and divided attention, which have come more and more into focus in current fundamental research projects. This brief commentary points out critical factors, contributes background conditions in aviation security screening, and shows possible approaches for enhancement and optimization. Finally, the human aspect is discussed as not only being the weakest factor in security screening, but also one of major importance.
Automatic Learning of Fine Operating Rules for Online Power System Security Control.
Sun, Hongbin; Zhao, Feng; Wang, Hao; Wang, Kang; Jiang, Weiyong; Guo, Qinglai; Zhang, Boming; Wehenkel, Louis
2016-08-01
Fine operating rules for security control and an automatic system for their online discovery were developed to adapt to the development of smart grids. The automatic system uses the real-time system state to determine critical flowgates, and then a continuation power flow-based security analysis is used to compute the initial transfer capability of critical flowgates. Next, the system applies the Monte Carlo simulations to expected short-term operating condition changes, feature selection, and a linear least squares fitting of the fine operating rules. The proposed system was validated both on an academic test system and on a provincial power system in China. The results indicated that the derived rules provide accuracy and good interpretability and are suitable for real-time power system security control. The use of high-performance computing systems enables these fine operating rules to be refreshed online every 15 min.
Critical Infrastructure Interdependencies Assessment
Petit, Frederic; Verner, Duane
2016-11-01
Throughout the world there is strong recognition that critical infrastructure security and resilience needs to be improved. In the United States, the National Infrastructure Protection Plan (NIPP) provides the strategic vision to guide the national effort to manage risk to the Nation’s critical infrastructure.”1 The achievement of this vision is challenged by the complexity of critical infrastructure systems and their inherent interdependencies. The update to the NIPP presents an opportunity to advance the nation’s efforts to further understand and analyze interdependencies. Such an important undertaking requires the involvement of public and private sector stakeholders and the reinforcement of existing partnershipsmore » and collaborations within the U.S. Department of Homeland Security (DHS) and other Federal agencies, including national laboratories; State, local, tribal, and territorial governments; and nongovernmental organizations.« less
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Feather, Martin S.
2004-01-01
Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.
2010-09-01
of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological
Managing information technology security risk
NASA Technical Reports Server (NTRS)
Gilliam, David
2003-01-01
Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.
48 CFR 3002.101 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information: (1) Protected Critical Infrastructure Information (PCII) as set out in the Critical Infrastructure Information Act of 2002 (Title II, Subtitle B, of the Homeland Security Act, Pub. L. 107-296, 196...
HVI Ballistic Limit Characterization of Fused Silica Thermal Panes
NASA Technical Reports Server (NTRS)
Miller, J. E.; Bohl, W. D.; Christiansen, E. L.; Davis, B. A.; Deighton, K. D.
2015-01-01
Fused silica window systems are used heavily on crewed reentry vehicles, and they are currently being used on the next generation of US crewed spacecraft, Orion. These systems improve crew situational awareness and comfort, as well as, insulating the reentry critical components of a spacecraft against the intense thermal environments of atmospheric reentry. Additionally, these materials are highly exposed to space environment hazards like solid particle impacts. This paper discusses impact studies up to 10 km/s on a fused silica window system proposed for the Orion spacecraft. A ballistic limit equation that describes the threshold of perforation of a fuse silica pane over a broad range of impact velocities, obliquities and projectile materials is discussed here.
Security Requirements Management in Software Product Line Engineering
NASA Astrophysics Data System (ADS)
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
Micromirror-based manipulation of synchrotron x-ray beams
NASA Astrophysics Data System (ADS)
Walko, D. A.; Chen, Pice; Jung, I. W.; Lopez, D.; Schwartz, C. P.; Shenoy, G. K.; Wang, Jin
2017-08-01
Synchrotron beamlines typically use macroscopic, quasi-static optics to manipulate x-ray beams. We present the use of dynamic microelectromechanical systems-based optics (MEMS) to temporally modulate synchrotron x-ray beams. We demonstrate this concept using single-crystal torsional MEMS micromirrors oscillating at frequencies of 75 kHz. Such a MEMS micromirror, with lateral dimensions of a few hundred micrometers, can interact with x rays by operating in grazing-incidence reflection geometry; x rays are deflected only when an x-ray pulse is incident on the rotating micromirror under appropriate conditions, i.e., at an angle less than the critical angle for reflectivity. The time window for such deflections depends on the frequency and amplitude of the MEMS rotation. We demonstrate that reflection geometry can produce a time window of a few microseconds. We further demonstrate that MEMS optics can isolate x rays from a selected synchrotron bunch or group of bunches. With ray-trace simulations we explain the currently achievable time windows and suggest a path toward improvements.
Koštiaková, Vladimíra; Moleti, Arturo; Wimmerová, Soňa; Jusko, Todd A; Palkovičová Murínová, Ľubica; Sisto, Renata; Richterová, Denisa; Kováč, Ján; Čonka, Kamil; Patayová, Henrieta; Tihányi, Juraj; Trnovec, Tomáš
2016-10-01
The study aim was to identify the timing of sensitive windows for ototoxicity related to perinatal exposure to PCBs. A total of 351 and 214 children from a birth cohort in eastern Slovakia underwent otoacoustic testing at 45 and 72 months, respectively, and distortion product otoacoustic emissions (DPOAEs) at 11 frequencies were recorded. Cord and child 6-, 16-, 45-, and 72- month blood samples were analyzed for PCB 153 concentration. The PCB 153 concentration-time profiles were approximated with a system model to calculate area under the PCB*time curves (AUCs) for specific time intervals (3 and 6 months for 45 and 72 months data, respectively). DPOAE amplitudes were correlated (Spearman) with cord serum PCB and AUCs, markers of prenatal and postnatal exposure, respectively. Two exposure critical windows were identified in infants, the first related to prenatal and early postnatal and the second to postnatal exposure to PCBs. Our data have shown tonotopicity, sexual dimorphism, and asymmetry in ototoxicity of PCBs. Copyright © 2016. Published by Elsevier Ltd.
Accessing thermoplastic processing windows in metallic glasses using rapid capacitive discharge
Kaltenboeck, Georg; Harris, Thomas; Sun, Kerry; Tran, Thomas; Chang, Gregory; Schramm, Joseph P.; Demetriou, Marios D.; Johnson, William L.
2014-01-01
The ability of the rapid-capacitive discharge approach to access optimal viscosity ranges in metallic glasses for thermoplastic processing is explored. Using high-speed thermal imaging, the heating uniformity and stability against crystallization of Zr35Ti30Cu7.5Be27.5 metallic glass heated deeply into the supercooled region is investigated. The method enables homogeneous volumetric heating of bulk samples throughout the entire supercooled liquid region at high rates (~105 K/s) sufficient to bypass crystallization throughout. The crystallization onsets at temperatures in the vicinity of the “crystallization nose” were identified and a Time-Temperature-Transformation diagram is constructed, revealing a “critical heating rate” for the metallic glass of ~1000 K/s. Thermoplastic process windows in the optimal viscosity range of 100–104 Pa·s are identified, being confined between the glass relaxation and the eutectic crystallization transition. Within this process window, near-net forging of a fine precision metallic glass part is demonstrated. PMID:25269892
Flexible thermochromic window based on hybridized VO2/graphene.
Kim, Hyeongkeun; Kim, Yena; Kim, Keun Soo; Jeong, Hu Young; Jang, A-Rang; Han, Seung Ho; Yoon, Dae Ho; Suh, Kwang S; Shin, Hyeon Suk; Kim, TaeYoung; Yang, Woo Seok
2013-07-23
Large-scale integration of vanadium dioxide (VO2) on mechanically flexible substrates is critical to the realization of flexible smart window films that can respond to environmental temperatures to modulate light transmittance. Until now, the formation of highly crystalline and stoichiometric VO2 on flexible substrate has not been demonstrated due to the high-temperature condition for VO2 growth. Here, we demonstrate a VO2-based thermochromic film with unprecedented mechanical flexibility by employing graphene as a versatile platform for VO2. The graphene effectively functions as an atomically thin, flexible, yet robust support which enables the formation of stoichiometric VO2 crystals with temperature-driven phase transition characteristics. The graphene-supported VO2 was capable of being transferred to a plastic substrate, forming a new type of flexible thermochromic film. The flexible VO2 films were then integrated into the mock-up house, exhibiting its efficient operation to reduce the in-house temperature under infrared irradiation. These results provide important progress for the fabrication of flexible thermochromic films for energy-saving windows.
ERIC Educational Resources Information Center
Hayajneh, Thaier Saleh
2009-01-01
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…
A study on an information security system of a regional collaborative medical platform.
Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong
2010-01-01
The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.
ERIC Educational Resources Information Center
Means, Alexander J.
2014-01-01
This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
Report: EPA Needs to Strengthen Financial Database Security Oversight and Monitor Compliance
Report #2007-P-00017, March 29, 2007. Weaknesses in how EPA offices monitor databases for known security vulnerabilities, communicate the status of critical system patches, and monitor the access to database administrator accounts and privileges.
Processing multilevel secure test and evaluation information
NASA Astrophysics Data System (ADS)
Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa
1994-07-01
The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.
Sun-Burned: Space Weather's Impact on United States National Security
NASA Astrophysics Data System (ADS)
Stebbins, B.
2014-12-01
The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.
Introduction to FPGA Devices and The Challenges for Critical Application - A User's Perspective
NASA Technical Reports Server (NTRS)
Berg, Melanie; LaBel, Kenneth
2015-01-01
This presentation is an introduction to Field Programmable Gate Array (FPGA) devices and the challenges of critical application including: safety, reliability, availability, recoverability, and security.
Trust and Reputation Management for Critical Infrastructure Protection
NASA Astrophysics Data System (ADS)
Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo
Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security
NASA Astrophysics Data System (ADS)
Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver
This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.
Security Risks: Management and Mitigation in the Software Life Cycle
NASA Technical Reports Server (NTRS)
Gilliam, David P.
2004-01-01
A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.
A cooperative model for IS security risk management in distributed environment.
Feng, Nan; Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
77 FR 59203 - Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-26
... Infrastructure Partnership Advisory Council. [FR Doc. 2012-23666 Filed 9-25-12; 8:45 am] BILLING CODE 9910-9P-P ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0051] Critical Infrastructure Partnership... meeting. SUMMARY: The Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting will be...
NASA Astrophysics Data System (ADS)
Ganter, John H.; Reeves, Paul C.
2017-05-01
Processing remote sensing data is the epitome of computation, yet real-time collection systems remain human-labor intensive. Operator labor is consumed by both overhead tasks (cost) and value-added production (benefit). In effect, labor is taxed and then lost. When an operator comes on-shift, they typically duplicate setup work that their teammates have already performed many times. "Pass down" of state information can be difficult if security restrictions require total logouts and blank screens - hours or even days of valuable history and context are lost. As work proceeds, duplicative effort is common because it is typically easier for operators to "do it over" rather than share what others have already done. As we begin a major new system version, we are refactoring the user interface to reduce time and motion losses. Working with users, we are developing "click budgets" to streamline interface use. One basic function is shared clipboards to reduce the use of sticky notes and verbal communication of data strings. We illustrate two additional designs to share work: window copying and window sharing. Copying (technically, shallow or deep object cloning) allows any system user to duplicate a window and configuration for themselves or another to use. Sharing allows a window to have multiple users: shareholders with read-write functionality and viewers with read-only. These solutions would allow windows to persist across multiple shifts, with a rotating cast of shareholders and viewers. Windows thus become durable objects of shared effort and persistent state. While these are low-tech functions, the cumulative labor savings in a 24X7 crew position (525,000 minutes/year spread over multiple individuals) would be significant. New design and implementation is never free and these investments typically do not appeal to government acquisition officers with short-term acquisition-cost concerns rather than a long-term O and M (operations and maintenance) perspective. We share some successes in educating some officers, in collaboration with system users, about the human capital involved in operating the systems they are acquiring.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Danneels, Jeffrey John
2005-03-01
Concerns about acts of terrorism against critical infrastructures have been on the rise for several years. Critical infrastructures are those physical structures and information systems (including cyber) essential to the minimum operations of the economy and government. The President's Commission on Critical Infrastructure Protection (PCCIP) probed the security of the nation's critical infrastructures. The PCCIP determined the water infrastructure is highly vulnerable to a range of potential attacks. In October 1997, the PCCIP proposed a public/private partnership between the federal government and private industry to improve the protection of the nation's critical infrastructures. In early 2000, the EPA partnered withmore » the Awwa Research Foundation (AwwaRF) and Sandia National Laboratories to create the Risk Assessment Methodology for Water Utilities (RAM-W{trademark}). Soon thereafter, they initiated an effort to create a template and minimum requirements for water utility Emergency Response Plans (ERP). All public water utilities in the US serving populations greater than 3,300 are required to undertaken both a vulnerability assessment and the development of an emergency response plan. This paper explains the initial steps of RAM-W{trademark} and then demonstrates how the security risk assessment is fundamental to the ERP. During the development of RAM-W{trademark}, Sandia performed several security risk assessments at large metropolitan water utilities. As part of the scope of that effort, ERPs at each utility were reviewed to determine how well they addressed significant vulnerabilities uncovered during the risk assessment. The ERP will contain responses to other events as well (e.g. natural disasters) but should address all major findings in the security risk assessment.« less
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...
Off-Line Quality Control In Integrated Circuit Fabrication Using Experimental Design
NASA Astrophysics Data System (ADS)
Phadke, M. S.; Kackar, R. N.; Speeney, D. V.; Grieco, M. J.
1987-04-01
Off-line quality control is a systematic method of optimizing production processes and product designs. It is widely used in Japan to produce high quality products at low cost. The method was introduced to us by Professor Genichi Taguchi who is a Deming-award winner and a former Director of the Japanese Academy of Quality. In this paper we will i) describe the off-line quality control method, and ii) document our efforts to optimize the process for forming contact windows in 3.5 Aim CMOS circuits fabricated in the Murray Hill Integrated Circuit Design Capability Laboratory. In the fabrication of integrated circuits it is critically important to produce contact windows of size very near the target dimension. Windows which are too small or too large lead to loss of yield. The off-line quality control method has improved both the process quality and productivity. The variance of the window size has been reduced by a factor of four. Also, processing time for window photolithography has been substantially reduced. The key steps of off-line quality control are: i) Identify important manipulatable process factors and their potential working levels. ii) Perform fractional factorial experiments on the process using orthogonal array designs. iii) Analyze the resulting data to determine the optimum operating levels of the factors. Both the process mean and the process variance are considered in this analysis. iv) Conduct an additional experiment to verify that the new factor levels indeed give an improvement.
Photothermal Therapy Generates a Thermal Window of Immunogenic Cell Death in Neuroblastoma.
Sweeney, Elizabeth E; Cano-Mejia, Juliana; Fernandes, Rohan
2018-04-17
A thermal "window" of immunogenic cell death (ICD) elicited by nanoparticle-based photothermal therapy (PTT) in an animal model of neuroblastoma is described. In studies using Prussian blue nanoparticles to administer photothermal therapy (PBNP-PTT) to established localized tumors in the neuroblastoma model, it is observed that PBNP-PTT conforms to the "more is better" paradigm, wherein higher doses of PBNP-PTT generates higher cell/local heating and thereby more cell death, and consequently improved animal survival. However, in vitro analysis of the biochemical correlates of ICD (ATP, high-motility group box 1, and calreticulin) elicited by PBNP-PTT demonstrates that PBNP-PTT triggers a thermal window of ICD. ICD markers are highly expressed within an optimal temperature (thermal dose) window of PBNP-PTT (63.3-66.4 °C) as compared with higher (83.0-83.5 °C) and lower PBNP-PTT (50.7-52.7 °C) temperatures, which both yield lower expression. Subsequent vaccination studies in the neuroblastoma model confirm the in vitro findings, wherein PBNP-PTT administered within the optimal temperature window results in long-term survival (33.3% at 100 d) compared with PBNP-PTT administered within the higher (0%) and lower (20%) temperature ranges, and controls (0%). The findings demonstrate a tunable immune response to heat generated by PBNP-PTT, which should be critically engaged in the administration of PTT for maximizing its therapeutic benefits. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erickson, Michael Charles
Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
European health telematics networks for positron emission tomography
NASA Astrophysics Data System (ADS)
Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios
2006-12-01
A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.
1999-01-01
This article reports on the PEDA (population changes, environment, socioeconomic development and agriculture) model and its implication for policy-making in Africa. PEDA is an interactive computer simulation model (developed for a Windows environment) demonstrating the long-term impacts of alternative national policies on food security status of the population. The model is based on multistate demographic techniques, projecting at the same time 8 different subgroups (by age and sex) in the population, and based on 3 dichotomous individual characteristics: urban/rural place of residence; literacy status; and food security status. Through the manipulation of scenario variables, the model enables the user to project the proportion of the population that will be food secure and food insecure for a chosen point in time. This model developed by Dr. W. Lutz, Director of the International Institute for Applied Systems Analysis, will serve as an advocacy tool to help convince policy-makers and country experts in Africa of the negative synergy arising from the interconnections of population growth, environmental deterioration, and declining agricultural production.
Environmental Education Activity Guide: Pre K-8.
ERIC Educational Resources Information Center
Iozzi, Lou; Halsey, Brent, Jr.
Project Learning Tree uses the forest as a window on the world to increase students' understanding of the complex environment in the United States; to stimulate critical and creative thinking; to develop the ability to make informed decisions on environmental issues; and to instill the confidence and commitment to take responsible action on behalf…
ERIC Educational Resources Information Center
Schaffhauser, Dian
2011-01-01
Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…
Phthalate esters are high-production volume chemicals used in the manufacture of numerous plastics and consumer products, which generates major concern for potential human exposure and environmental contamination. Several studies have demonstrated adverse effects associated with ...
14 CFR 25.775 - Windshields and windows.
Code of Federal Regulations, 2010 CFR
2010-01-01
... differential loads combined with critical aerodynamic pressure and temperature effects after any single failure... front of the pilots must be arranged so that, assuming the loss of vision through any one panel, one or... flight and landing. [Doc. No. 5066, 29 FR 18291, Dec. 24, 1964, as amended by Amdt. 25-23, 35 FR 5676...
14 CFR 25.775 - Windshields and windows.
Code of Federal Regulations, 2013 CFR
2013-01-01
... differential loads combined with critical aerodynamic pressure and temperature effects after any single failure... front of the pilots must be arranged so that, assuming the loss of vision through any one panel, one or... flight and landing. [Doc. No. 5066, 29 FR 18291, Dec. 24, 1964, as amended by Amdt. 25-23, 35 FR 5676...
14 CFR 25.775 - Windshields and windows.
Code of Federal Regulations, 2012 CFR
2012-01-01
... differential loads combined with critical aerodynamic pressure and temperature effects after any single failure... front of the pilots must be arranged so that, assuming the loss of vision through any one panel, one or... flight and landing. [Doc. No. 5066, 29 FR 18291, Dec. 24, 1964, as amended by Amdt. 25-23, 35 FR 5676...
14 CFR 25.775 - Windshields and windows.
Code of Federal Regulations, 2014 CFR
2014-01-01
... differential loads combined with critical aerodynamic pressure and temperature effects after any single failure... front of the pilots must be arranged so that, assuming the loss of vision through any one panel, one or... flight and landing. [Doc. No. 5066, 29 FR 18291, Dec. 24, 1964, as amended by Amdt. 25-23, 35 FR 5676...
14 CFR 25.775 - Windshields and windows.
Code of Federal Regulations, 2011 CFR
2011-01-01
... differential loads combined with critical aerodynamic pressure and temperature effects after any single failure... front of the pilots must be arranged so that, assuming the loss of vision through any one panel, one or... flight and landing. [Doc. No. 5066, 29 FR 18291, Dec. 24, 1964, as amended by Amdt. 25-23, 35 FR 5676...
Seizing Teachable Moments to Develop Integrative Middle Level Curriculum
ERIC Educational Resources Information Center
Virtue, David C.
2007-01-01
September 11, 2001, was a critical teachable moment that provided the author of this article and his team with an avenue to middle level curriculum that was relevant, challenging, integrative, and exploratory. Hurricane Katrina opened a similar window of opportunity for middle level educators to focus the minds of young adolescents on important…
Classroom Dynamic Assessment: A Critical Examination of Constructs and Practices
ERIC Educational Resources Information Center
Davin, Kristin J.
2016-01-01
This article explores the implementation of dynamic assessment (DA) in an elementary school foreign language classroom by considering its theoretical basis and its applicability to second language (L2) teaching, learning, and development. In existing applications of L2 classroom DA, errors serve as a window into learners' instructional needs and…
Holography and the conformal window in the Veneziano limit
NASA Astrophysics Data System (ADS)
Järvinen, M.
2017-12-01
We discuss holographic QCD in the Veneziano limit (the V-QCD models), concentrating on phenomena near the “conformal” phase transition taking place at a critical value of the ratio x ≡ Nf/Nc. In particular, we review the results for the S-parameter, the technidilaton, and the masses of the mesons.
ERIC Educational Resources Information Center
Zhang, Yili; Smolen, Paul; Baxter, Douglas A.; Byrne, John H.
2010-01-01
Memory consolidation and reconsolidation require kinase activation and protein synthesis. Blocking either process during or shortly after training or recall disrupts memory stabilization, which suggests the existence of a critical time window during which these processes are necessary. Using a computational model of kinase synthesis and…
Shrinking windows of opportunity for oak seedling establishment in southern California mountains
Davis, Frank W.; Sweet, Lynn C.; Serra-Diaz, Josep M.; Franklin, Janet; McCullough, Ian M.; Flint, Alan L.; Flint, Lorraine E.; Dingman, John; Regan, Helen M.; Syphard, Alexandra D.; Hannah, Lee; Redmond, Kelly; Moritz, Max A.
2016-01-01
Seedling establishment is a critical step that may ultimately govern tree species’ distribution shifts under environmental change. Annual variation in the location of seed rain and microclimates results in transient “windows of opportunity” for tree seedling establishment across the landscape. These establishment windows vary at fine spatiotemporal scales that are not considered in most assessments of climate change impacts on tree species range dynamics and habitat displacement. We integrate field seedling establishment trials conducted in the southern Sierra Nevada and western Tehachapi Mountains of southern California with spatially downscaled grids of modeled water-year climatic water deficit (CWDwy) and mean August maximum daily temperature (Tmax) to map historical and projected future microclimates suitable for establishment windows of opportunity for Quercus douglasii, a dominant tree species of warm, dry foothill woodlands, and Q. kelloggii, a dominant of cooler, more mesic montane woodlands and forests. Based on quasi-binomial regression models, Q. douglasii seedling establishment is significantly associated with modeled CWDwy and to a lesser degree with modeled Tmax. Q. kelloggii seedling establishment is most strongly associated with Tmax and best predicted by a two-factor model including CWDwy and Tmax. Establishment niche models are applied to explore recruitment window dynamics in the western Tehachapi Mountains, where these species are currently widespread canopy dominants. Establishment windows are projected to decrease by 50–95%, shrinking locally to higher elevations and north-facing slopes by the end of this century depending on the species and climate scenario. These decreases in establishment windows suggest the potential for longer-term regional population declines of the species. While many additional processes regulate seedling establishment and growth, this study highlights the need to account for topoclimatic controls and interannual climatic variation when assessing how seedling establishment and colonization processes could be affected by climate change.
Evolution of oxygenated cadmium sulfide (CdS:O) during high-temperature CdTe solar cell fabrication
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meysing, Daniel M.; Reese, Matthew O.; Warren, Charles W.
Oxygenated cadmium sulfide (CdS:O) produced by reactive sputtering has emerged as a promising alternative to conventional CdS for use as the n-type window layer in CdTe solar cells. Here, complementary techniques are used to expose the window layer (CdS or CdS:O) in completed superstrate devices and combined with a suite of materials characterization to elucidate its evolution during high temperature device processing. During device fabrication amorphous CdS:O undergoes significant interdiffusion with CdTe and recrystallization, forming CdS1-yTey nanocrystals whose Te fraction approaches solubility limits. Significant oxygen remains after processing, concentrated in sulfate clusters dispersed among the CdS1-yTey alloy phase, accounting formore » ~30% of the post-processed window layer based on cross-sectional microscopy. Interdiffusion and recrystallization are observed in devices with un-oxygenated CdS, but to a much lesser extent. Etching experiments suggest that the CdS thickness is minimally changed during processing, but the CdS:O window layer is reduced from 100 nm to 60-80 nm, which is confirmed by microscopy. Alloying reduces the band gap of the CdS:O window layer to 2.15 eV, but reductions in thickness and areal density improve its transmission spectrum, which is well matched to device quantum efficiency. The changes to the window layer in the reactive environments of device fabrication are profoundly different than what occurs by thermal annealing in an inert environment, which produced films with a band gap of 2.4 eV for both CdS and CdS:O. These results illustrate for the first time the significant changes that occur to the window layer during processing that are critical to the performance of CdTe solar cells.« less
Securing, Stabilizing, and Rebuilding Iraq: Key Issues for Congressional Oversight
2007-01-01
Been Constrained by Security, Management , and Funding Challenges 72 U.S. Military Readiness 79 Enclosure XII: Extended Operations Have Had...Forces Have Resulted in Shortages of Critical Items 92 Improving Acquisition Outcomes 97 Enclosure XV: DOD Needs to Improve Its Capacity to Manage ...International Monetary Fund IRMO Iraq Reconstruction Management Office IRRF Iraqi Relief and Reconstruction Fund ISF Iraqi security forces ISFF
Secure Computer System: Unified Exposition and Multics Interpretation
1976-03-01
prearranged code to semaphore critical information to an undercleared subject/process. Neither of these topics is directly addressed by the mathematical...FURTHER CONSIDERATIONS. RULES OF OPERATION FOR A SECURE MULTICS Kernel primitives for a secure Multics will be derived from a higher level user...the Multics architecture as little as possible; this will account to a large extent for radical differences in form between actual kernel primitives
Russian Military Politics and Russia’s 2010 Defense Doctrine
2011-03-01
Institute (SSI) publica- tions enjoy full academic freedom, provided they do not disclose classified information, jeopardize operations security , or... attack as well, under certain, not specified, critical circum- stances for national security . This attitude was not un- expected, since the on-going... attacks in the United States—needed revision because of the deterioration of the international security situa- tion since then. Subsequently, in March
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roger Lew; Ronald L. Boring; Thomas A. Ulrich
Operators of critical processes, such as nuclear power production, must contend with highly complex systems, procedures, and regulations. Developing human-machine interfaces (HMIs) that better support operators is a high priority for ensuring the safe and reliable operation of critical processes. Human factors engineering (HFE) provides a rich and mature set of tools for evaluating the performance of HMIs, but the set of tools for developing and designing HMIs is still in its infancy. Here we propose that Microsoft Windows Presentation Foundation (WPF) is well suited for many roles in the research and development of HMIs for process control.
Foundational Security Principles for Medical Application Platforms* (Extended Abstract)
Vasserman, Eugene Y.; Hatcliff, John
2014-01-01
We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096
The governance dimensions of water security: a review.
Bakker, Karen; Morinville, Cynthia
2013-11-13
Water governance is critical to water security, and to the long-term sustainability of the Earth's freshwater systems. This review examines recent debates regarding the governance dimensions of water security, including adaptive governance, polycentric governance, social learning and multi-level governance. The analysis emphasizes the political and institutional dimensions of water governance, and explores the relevance of social power-an overlooked yet important aspect of the water security debate. In addition, the review explores the intersection and potential synergies between water governance perspectives and risk-based approaches to water security, and offers critiques and suggestions for further research questions and agendas.
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
A quantum light-emitting diode for the standard telecom window around 1,550 nm.
Müller, T; Skiba-Szymanska, J; Krysa, A B; Huwer, J; Felle, M; Anderson, M; Stevenson, R M; Heffernan, J; Ritchie, D A; Shields, A J
2018-02-28
Single photons and entangled photon pairs are a key resource of many quantum secure communication and quantum computation protocols, and non-Poissonian sources emitting in the low-loss wavelength region around 1,550 nm are essential for the development of fibre-based quantum network infrastructure. However, reaching this wavelength window has been challenging for semiconductor-based quantum light sources. Here we show that quantum dot devices based on indium phosphide are capable of electrically injected single photon emission in this wavelength region. Using the biexciton cascade mechanism, they also produce entangled photons with a fidelity of 87 ± 4%, sufficient for the application of one-way error correction protocols. The material system further allows for entangled photon generation up to an operating temperature of 93 K. Our quantum photon source can be directly integrated with existing long distance quantum communication and cryptography systems, and provides a promising material platform for developing future quantum network hardware.
Security Assessment Of A Turbo-Gas Power Plant
NASA Astrophysics Data System (ADS)
Masera, Marcelo; Fovino, Igor Nai; Leszczyna, Rafal
Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
75 FR 35508 - Draft Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...
ERIC Educational Resources Information Center
Flanigan, Robin L.
2000-01-01
Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)
Eckstrum, Kirsten S; Edwards, Whitney; Banerjee, Annesha; Wang, Wei; Flaws, Jodi A; Katzenellenbogen, John A; Kim, Sung Hoon; Raetzman, Lori T
2018-01-01
Critical windows of development are often more sensitive to endocrine disruption. The murine pituitary gland has two critical windows of development: embryonic gland establishment and neonatal hormone cell expansion. During embryonic development, one environmentally ubiquitous endocrine-disrupting chemical, bisphenol A (BPA), has been shown to alter pituitary development by increasing proliferation and gonadotrope number in females but not males. However, the effects of exposure during the neonatal period have not been examined. Therefore, we dosed pups from postnatal day (PND)0 to PND7 with 0.05, 0.5, and 50 μg/kg/d BPA, environmentally relevant doses, or 50 μg/kg/d estradiol (E2). Mice were collected after dosing at PND7 and at 5 weeks. Dosing mice neonatally with BPA caused sex-specific gene expression changes distinct from those observed with embryonic exposure. At PND7, pituitary Pit1 messenger RNA (mRNA) expression was decreased with BPA 0.05 and 0.5 μg/kg/d in males only. Expression of Pomc mRNA was decreased at 0.5 μg/kg/d BPA in males and at 0.5 and 50 μg/kg/d BPA in females. Similarly, E2 decreased Pomc mRNA in both males and females. However, no noticeable corresponding changes were found in protein expression. Both E2 and BPA suppressed Pomc mRNA in pituitary organ cultures; this repression appeared to be mediated by estrogen receptor-α and estrogen receptor-β in females and G protein-coupled estrogen receptor in males, as determined by estrogen receptor subtype-selective agonists. These data demonstrated that BPA exposure during neonatal pituitary development has unique sex-specific effects on gene expression and that Pomc repression in males and females can occur through different mechanisms. Copyright © 2018 Endocrine Society.
Generalization of the photo process window and its application to OPC test pattern design
NASA Astrophysics Data System (ADS)
Eisenmann, Hans; Peter, Kai; Strojwas, Andrzej J.
2003-07-01
From the early development phase up to the production phase, test pattern play a key role for microlithography. The requirement for test pattern is to represent the design well and to cover the space of all process conditions, e.g. to investigate the full process window and all other process parameters. This paper shows that the current state-of-the-art test pattern do not address these requirements sufficiently and makes suggestions for a better selection of test pattern. We present a new methodology to analyze an existing layout (e.g. logic library, test pattern or full chip) for critical layout situations which does not need precise process data. We call this method "process space decomposition", because it is aimed at decomposing the process impact to a layout feature into a sum of single independent contributions, the dimensions of the process space. This is a generalization of the classical process window, which examines defocus and exposure dependency of given test pattern, e.g. CD value of dense and isolated lines. In our process space we additionally define the dimensions resist effects, etch effects, mask error and misalignment, which describe the deviation of the printed silicon pattern from its target. We further extend it by the pattern space using a product based layout (library, full chip or synthetic test pattern). The criticality of pattern is defined by their deviation due to aerial image, their sensitivity to the respective dimension or several combinations of these. By exploring the process space for a given design, the method allows to find the most critical patterns independent of specific process parameters. The paper provides examples for different applications of the method: (1) selection of design oriented test pattern for lithography development (2) test pattern reduction in process characterization (3) verification/optimization of printability and performance of post processing procedures (like OPC) (4) creation of a sensitive process monitor.
Critical Skill Job – Cyber Security Analyst
DOE Office of Scientific and Technical Information (OSTI.GOV)
Washington, Tara
This video series provides a first-hand look at critical skills positions at the Savannah River Site and required qualifications. Meet the people behind the jobs and learn what they do to support important SRS missions.
A Cooperative Model for IS Security Risk Management in Distributed Environment
Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626
NASA Technical Reports Server (NTRS)
2001-01-01
The Critical Viscosity of Xenon Experiment (CVX-2) on the STS-107 Research 1 mission in 2002 will measure the viscous behavior of liquid xenon, a heavy inert gas used in flash lamps and ion rocket engines, at its critical point. Resembling a tiny bit of window screen, the oscillator at the heart of CVX-2 will vibrate between two pairs of paddle-like electrodes. The slight bend in the shape of the mesh has no effect on the data. What counts are the mesh's displacement in the xenon fluid and the rate at which the displacement dampens. The unit shown here is encased in a small test cell and capped with a sapphire windown to contain the xenon at high pressure.
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Software For Monitoring A Computer Network
NASA Technical Reports Server (NTRS)
Lee, Young H.
1992-01-01
SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.
Conflict in Context: Understanding Local to Global Security.
ERIC Educational Resources Information Center
Mertz, Gayle; Lieber, Carol Miller
This multidisciplinary guide provides middle and high school teachers and students with inquiry-based tools to support their exploration of emerging local, national, international, and transboundary security issues. Students are introduced to critical thinking, problem solving, and peacemaking strategies that will help them better understand…
Personal Epistemologies and Older Workers
ERIC Educational Resources Information Center
Billett, Stephen; van Woerkom, Marianne
2008-01-01
This paper evaluates the need and prospects for older workers to develop and deploy effective and critical personal epistemologies in order to maintain workplace competence, successfully negotiate work transitions and secure ontological security in their working life. Furthermore, it addresses different ways of reflecting by workers, which types…
Transmission Line Security Monitor
None
2017-12-09
The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.
NASA Astrophysics Data System (ADS)
Jin, Tao; Chen, Yiyang; Flesch, Rodolfo C. C.
2017-11-01
Harmonics pose a great threat to safe and economical operation of power grids. Therefore, it is critical to detect harmonic parameters accurately to design harmonic compensation equipment. The fast Fourier transform (FFT) is widely used for electrical popular power harmonics analysis. However, the barrier effect produced by the algorithm itself and spectrum leakage caused by asynchronous sampling often affects the harmonic analysis accuracy. This paper examines a new approach for harmonic analysis based on deducing the modifier formulas of frequency, phase angle, and amplitude, utilizing the Nuttall-Kaiser window double spectrum line interpolation method, which overcomes the shortcomings in traditional FFT harmonic calculations. The proposed approach is verified numerically and experimentally to be accurate and reliable.
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
Intelligent cloud computing security using genetic algorithm as a computational tools
NASA Astrophysics Data System (ADS)
Razuky AL-Shaikhly, Mazin H.
2018-05-01
An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.
Conflict Containment in the Balkans: Testing Extended Deterrence.
1995-03-01
STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited. 13. ABSTRACT This thesis critically analyzes a prominent theoretical...Containment 15. NUMBER OF in the Balkans; Deterrence; Coercive Diplomacy; Balance of Forces. PAGES: 161 16. PRICE CODE 17. SECURITY CLASSIFI- 18. SECURITY...Department of National Security Affai sAccesion For NTIS CRA&I DTtC TAB Unannounced Justifca ........... By- Distribution Availability Codes Avail and/or Dist
Hiding Critical Targets in Smart Grid Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bao, Wei; Li, Qinghua
With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromisedmore » nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.« less
Process or product: awareness vs. aesthetics.
Naitove, C E
1978-01-01
A historic perspective on the roles of the patient and psychotherapist relative to creative expression clearly demonstrates an emphasis on content, on the projective interpretation of the product. The author challenges the emphasis on product rather than process, the educational 'shop-window' approach to achievers and the talented, as well as the negative effects of 'labeling', and the validity of some forms of projective psychological testing. Discussed is the influence exerted by the psychotherapist through Rogerian 'leakage'. In addition, techniques are suggested for expanding sensory awareness and synthesizing communication skills as a means of enhancing self-image and creative potential. The contention is that the more ways that a skill is synthesized, the more complete is the learning. The more complete the learning, the greater the sense of security. The more secure the individual, the more willing (s)he is to venture into other areas where risk of failure has been a deterrent.
Design optimization of highly asymmetrical layouts by 2D contour metrology
NASA Astrophysics Data System (ADS)
Hu, C. M.; Lo, Fred; Yang, Elvis; Yang, T. H.; Chen, K. C.
2018-03-01
As design pitch shrinks to the resolution limit of up-to-date optical lithography technology, the Critical Dimension (CD) variation tolerance has been dramatically decreased for ensuring the functionality of device. One of critical challenges associates with the narrower CD tolerance for whole chip area is the proximity effect control on asymmetrical layout environments. To fulfill the tight CD control of complex features, the Critical Dimension Scanning Electron Microscope (CD-SEM) based measurement results for qualifying process window and establishing the Optical Proximity Correction (OPC) model become insufficient, thus 2D contour extraction technique [1-5] has been an increasingly important approach for complementing the insufficiencies of traditional CD measurement algorithm. To alleviate the long cycle time and high cost penalties for product verification, manufacturing requirements are better to be well handled at design stage to improve the quality and yield of ICs. In this work, in-house 2D contour extraction platform was established for layout design optimization of 39nm half-pitch Self-Aligned Double Patterning (SADP) process layer. Combining with the adoption of Process Variation Band Index (PVBI), the contour extraction platform enables layout optimization speedup as comparing to traditional methods. The capabilities of identifying and handling lithography hotspots in complex layout environments of 2D contour extraction platform allow process window aware layout optimization to meet the manufacturing requirements.
High fat programming of beta cell compensation, exhaustion, death and dysfunction.
Cerf, Marlon E
2015-03-01
Programming refers to events during critical developmental windows that shape progeny health outcomes. Fetal programming refers to the effects of intrauterine (in utero) events. Lactational programming refers to the effects of events during suckling (weaning). Developmental programming refers to the effects of events during both fetal and lactational life. Postnatal programming refers to the effects of events either from birth (lactational life) to adolescence or from weaning (end of lactation) to adolescence. Islets are most plastic during the early life course; hence programming during fetal and lactational life is most potent. High fat (HF) programming is the maintenance on a HF diet (HFD) during critical developmental life stages that alters progeny metabolism and physiology. HF programming induces variable diabetogenic phenotypes dependent on the timing and duration of the dietary insult. Maternal obesity reinforces HF programming effects in progeny. HF programming, through acute hyperglycemia, initiates beta cell compensation. However, HF programming eventually leads to chronic hyperglycemia that triggers beta cell exhaustion, death and dysfunction. In HF programming, beta cell dysfunction often co-presents with insulin resistance. Balanced, healthy nutrition during developmental windows is critical for preserving beta cell structure and function. Thus early positive nutritional interventions that coincide with the development of beta cells may reduce the overwhelming burden of diabetes and metabolic disease. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-01
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0080] Critical Infrastructure Partnership..., Section Chief Partnership Programs, Partnership and Outreach Division, Office of Infrastructure Protection... Outreach Division, Office of Infrastructure Protection, National Protection and Programs Directorate...
Comparative Education on the Map of Teacher Preparation Programme in Kuwait
ERIC Educational Resources Information Center
Hamad, Al Rashid
2013-01-01
Comparative education represents one of the main topics included in teacher preparation programmes in most countries. This subject is critical for future teachers because it represents a window through which learners can look at other educational systems and see how they are managed and what sort of policies and educational philosophies are used.…
ERIC Educational Resources Information Center
Park, Moonyoung
2018-01-01
Aviation English proficiency is a core competency in the global air traffic controller profession. There is, however, growing concern about the current ineffective paper-based assessment methods and the severe lack of interactive online testing for such a critical profession, one that should be ideally assessed in an authentic task and situation…
Phthalate esters are high-production volume chemicals used in the manufacture of numerci plastics and consumer products, which generates major concern for potential human exposure and environmental contamination. Several studies have demonstrated adverse effects associated with p...
In utero exposure to certain phthalate esters (PE) during the critical window of male sex differentiation reduces both fetal testis testosterone (T) production and expression of steroid transport and synthesis genes, resulting in reproductive tract malformations in adult male rod...
Windows into the forest: extending long-term small-watershed research
Sally Duncan
2004-01-01
Interactions among forests, forestry, and water remain a critical aspect of Forest Service land stewardship. Small, experimental watershed studies managed by Forest Service Research and Development have a long history of advancing science and management and have resulted in a rich collection of long-term data. Early work addressed effects of forestry practices in...