Sample records for cross-site scripting attacks

  1. Ultrabroadband photonic internet: safety aspects

    NASA Astrophysics Data System (ADS)

    Kalicki, Arkadiusz; Romaniuk, Ryszard

    2008-11-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.

  2. Operational Exercise Integration Recommendations for DoD Cyber Ranges

    DTIC Science & Technology

    2015-08-05

    be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own

  3. Genesis: A Framework for Achieving Software Component Diversity

    DTIC Science & Technology

    2007-01-01

    correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by

  4. Securing your Site in Development and Beyond

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Akopov, Mikhail S.

    Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less

  5. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  6. Lupus: When the Body Attacks Itself | NIH MedlinePlus the Magazine

    MedlinePlus

    ... of this page please turn JavaScript on. Feature: Lupus Lupus: When the Body Attacks Itself Past Issues / Spring 2014 Table of Contents fast facts 1 Lupus occurs when the body's immune system attacks the ...

  7. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    active scripting, file downloads, installation of desktop items, signed and unsigned ActiveX controls, Java permissions, launching applications and...files in an IFRAME, running ActiveX controls and plug-ins, and scripting of Java applets [49]. This security measure is very effective against DNS

  8. Violent Attacks and Damaged Victims: An Exploration of the Rape Scripts of European American and African American U.S. College Women.

    PubMed

    Littleton, Heather L; Dodd, Julia C

    2016-02-25

    Scripts are influential in shaping sexual behaviors. Prior studies have examined the influence of individuals' rape scripts. However, these scripts have not been evaluated among diverse groups. The current study examined the rape scripts of African American (n = 72) and European American (n = 99) college women. Results supported three rape scripts: the "real rape," the "party rape," and the mismatched intentions rape, that were equally common. However, there were some differences, with African Americans' narratives more often including active victim resistance and less often containing victim vulnerability themes. Societal and cultural influences on rape scripts are discussed. © The Author(s) 2016.

  9. Women's Heart Disease: Heart Attack Symptoms

    MedlinePlus

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  10. Vulnerability Assessment of Open Source Wireshark and Chrome Browser

    DTIC Science & Technology

    2013-08-01

    UNLIMITED 5 We spent much of the initial time learning about the logical model that modern HTML5 web browsers support, including how users interact with...are supposed to protect users of that site against cross-site scripting) and the new powerful an all-encompassing HTML5 standard. This vulnerability

  11. Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems

    NASA Astrophysics Data System (ADS)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.

  12. Rapid modulation of spoken word recognition by visual primes.

    PubMed

    Okano, Kana; Grainger, Jonathan; Holcomb, Phillip J

    2016-02-01

    In a masked cross-modal priming experiment with ERP recordings, spoken Japanese words were primed with words written in one of the two syllabary scripts of Japanese. An early priming effect, peaking at around 200ms after onset of the spoken word target, was seen in left lateral electrode sites for Katakana primes, and later effects were seen for both Hiragana and Katakana primes on the N400 ERP component. The early effect is thought to reflect the efficiency with which words in Katakana script make contact with sublexical phonological representations involved in spoken language comprehension, due to the particular way this script is used by Japanese readers. This demonstrates fast-acting influences of visual primes on the processing of auditory target words, and suggests that briefly presented visual primes can influence sublexical processing of auditory target words. The later N400 priming effects, on the other hand, most likely reflect cross-modal influences on activity at the level of whole-word phonology and semantics.

  13. Rapid modulation of spoken word recognition by visual primes

    PubMed Central

    Okano, Kana; Grainger, Jonathan; Holcomb, Phillip J.

    2015-01-01

    In a masked cross-modal priming experiment with ERP recordings, spoken Japanese words were primed with words written in one of the two syllabary scripts of Japanese. An early priming effect, peaking at around 200ms after onset of the spoken word target, was seen in left lateral electrode sites for Katakana primes, and later effects were seen for both Hiragana and Katakana primes on the N400 ERP component. The early effect is thought to reflect the efficiency with which words in Katakana script make contact with sublexical phonological representations involved in spoken language comprehension, due to the particular way this script is used by Japanese readers. This demonstrates fast-acting influences of visual primes on the processing of auditory target words, and suggests that briefly presented visual primes can influence sublexical processing of auditory target words. The later N400 priming effects, on the other hand, most likely reflect cross-modal influences on activity at the level of whole-word phonology and semantics. PMID:26516296

  14. The Influence of Cross-Language Similarity on within- and between-Language Stroop Effects in Trilinguals

    PubMed Central

    van Heuven, Walter J. B.; Conklin, Kathy; Coderre, Emily L.; Guo, Taomei; Dijkstra, Ton

    2011-01-01

    This study investigated effects of cross-language similarity on within- and between-language Stroop interference and facilitation in three groups of trilinguals. Trilinguals were either proficient in three languages that use the same-script (alphabetic in German–English–Dutch trilinguals), two similar scripts and one different script (Chinese and alphabetic scripts in Chinese–English–Malay trilinguals), or three completely different scripts (Arabic, Chinese, and alphabetic in Uyghur–Chinese–English trilinguals). The results revealed a similar magnitude of within-language Stroop interference for the three groups, whereas between-language interference was modulated by cross-language similarity. For the same-script trilinguals, the within- and between-language interference was similar, whereas the between-language Stroop interference was reduced for trilinguals with languages written in different scripts. The magnitude of within-language Stroop facilitation was similar across the three groups of trilinguals, but smaller than within-language Stroop interference. Between-language Stroop facilitation was also modulated by cross-language similarity such that these effects became negative for trilinguals with languages written in different scripts. The overall pattern of Stroop interference and facilitation effects can be explained in terms of diverging and converging color and word information across languages. PMID:22180749

  15. The transmission and stability of cultural life scripts: a cross-cultural study.

    PubMed

    Janssen, Steve M J; Haque, Shamsul

    2018-01-01

    Cultural life scripts are shared knowledge about the timing of important life events. In the present study, we examined whether cultural life scripts are transmitted through traditions and whether there are additional ways through which they can be attained by asking Australian and Malaysian participants which information sources they had used to generate the life script of their culture. Participants hardly reported that they had used cultural and religious traditions. They more often reported that they had used their own experiences and experiences of relatives and friends. They also reported the use of comments of relatives and friends and the use of newspapers, books, movies and television programmes. Furthermore, we examined the stability of life scripts and similarities and differences across cultures. We found that life scripts are stable cognitive structures and that there are, besides cross-cultural differences in the content, small cross-cultural differences in the valence and distribution of life script events, with the Australian life script containing more positive events and more events expected to occur before the age of 16.

  16. TmiRUSite and TmiROSite scripts: searching for mRNA fragments with miRNA binding sites with encoded amino acid residues.

    PubMed

    Berillo, Olga; Régnier, Mireille; Ivashchenko, Anatoly

    2014-01-01

    microRNAs are small RNA molecules that inhibit the translation of target genes. microRNA binding sites are located in the untranslated regions as well as in the coding domains. We describe TmiRUSite and TmiROSite scripts developed using python as tools for the extraction of nucleotide sequences for miRNA binding sites with their encoded amino acid residue sequences. The scripts allow for retrieving a set of additional sequences at left and at right from the binding site. The scripts presents all received data in table formats that are easy to analyse further. The predicted data finds utility in molecular and evolutionary biology studies. They find use in studying miRNA binding sites in animals and plants. TmiRUSite and TmiROSite scripts are available for free from authors upon request and at https: //sites.google.com/site/malaheenee/downloads for download.

  17. Integrated cluster management at Manchester

    NASA Astrophysics Data System (ADS)

    McNab, Andrew; Forti, Alessandra

    2012-12-01

    We describe an integrated management system using third-party, open source components used in operating a large Tier-2 site for particle physics. This system tracks individual assets and records their attributes such as MAC and IP addresses; derives DNS and DHCP configurations from this database; creates each host's installation and re-configuration scripts; monitors the services on each host according to the records of what should be running; and cross references tickets with asset records and per-asset monitoring pages. In addition, scripts which detect problems and automatically remove hosts record these new states in the database which are available to operators immediately through the same interface as tickets and monitoring.

  18. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    NASA Astrophysics Data System (ADS)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  19. TV Crime Reporter Missed Clues | NIH MedlinePlus the Magazine

    MedlinePlus

    ... JavaScript on. Feature: Women and Heart Disease TV Crime Reporter Missed Clues Past Issues / Spring 2016 Table ... heart attack at the age of 36. A crime reporter for WJLA-TV in Washington, D.C., ...

  20. Early Market Site Identification Data

    DOE Data Explorer

    Levi Kilcher

    2016-04-01

    This data was compiled for the 'Early Market Opportunity Hot Spot Identification' project. The data and scripts included were used in the 'MHK Energy Site Identification and Ranking Methodology' Reports (Part I: Wave, NREL Report #66038; Part II: Tidal, NREL Report #66079). The Python scripts will generate a set of results--based on the Excel data files--some of which were described in the reports. The scripts depend on the 'score_site' package, and the score site package depends on a number of standard Python libraries (see the score_site install instructions).

  1. [Script crossing in scanning electron microscopy].

    PubMed

    Oehmichen, M; von Kortzfleisch, D; Hegner, B

    1989-01-01

    A case of mixed script in which ball point-pen ink was contaminated with typewriting prompted a survey of the literature and a systematic SEM study of mixed script with various writing instruments or inks. Mixed scripts produced with the following instruments or inks were investigated: pencil, ink/India ink, ball-pint pen, felt-tip pen, copied script and typewriter. This investigation showed SEM to be the method of choice for visualizing overlying scripts produced by different writing instruments or inks.

  2. Generic Language Facilitates Children's Cross-Classification

    ERIC Educational Resources Information Center

    Nguyen, Simone P.; Gelman, A.

    2012-01-01

    Four studies examined the role of generic language in facilitating 4- and 5-year-old children's ability to cross-classify. Participants were asked to classify an item into a familiar (taxonomic or script) category, then cross-classify it into a novel (script or taxonomic) category with the help of a clue expressed in either generic or specific…

  3. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  4. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.

  5. Subliminal convergence of Kanji and Kana words: further evidence for functional parcellation of the posterior temporal cortex in visual word perception.

    PubMed

    Nakamura, Kimihiro; Dehaene, Stanislas; Jobert, Antoinette; Le Bihan, Denis; Kouider, Sid

    2005-06-01

    Recent evidence has suggested that the human occipitotemporal region comprises several subregions, each sensitive to a distinct processing level of visual words. To further explore the functional architecture of visual word recognition, we employed a subliminal priming method with functional magnetic resonance imaging (fMRI) during semantic judgments of words presented in two different Japanese scripts, Kanji and Kana. Each target word was preceded by a subliminal presentation of either the same or a different word, and in the same or a different script. Behaviorally, word repetition produced significant priming regardless of whether the words were presented in the same or different script. At the neural level, this cross-script priming was associated with repetition suppression in the left inferior temporal cortex anterior and dorsal to the visual word form area hypothesized for alphabetical writing systems, suggesting that cross-script convergence occurred at a semantic level. fMRI also evidenced a shared visual occipito-temporal activation for words in the two scripts, with slightly more mesial and right-predominant activation for Kanji and with greater occipital activation for Kana. These results thus allow us to separate script-specific and script-independent regions in the posterior temporal lobe, while demonstrating that both can be activated subliminally.

  6. Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery

    NASA Astrophysics Data System (ADS)

    Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.

    2018-04-01

    Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.

  7. Evidence for cross-script abstract identities in learners of Japanese kana.

    PubMed

    Schubert, Teresa; Gawthrop, Roderick; Kinoshita, Sachiko

    2018-05-07

    The presence of abstract letter identity representations in the Roman alphabet has been well documented. These representations are invariant to letter case (upper vs. lower) and visual appearance. For example, "a" and "A" are represented by the same abstract identity. Recent research has begun to consider whether the processing of non-Roman orthographies also involves abstract orthographic representations. In the present study, we sought evidence for abstract identities in Japanese kana, which consist of two scripts, hiragana and katakana. Abstract identities would be invariant to the script used as well as to the degree of visual similarity. We adapted the cross-case masked-priming letter match task used in previous research on Roman letters, by presenting cross-script kana pairs and testing adult beginning -to- intermediate Japanese second-language (L2) learners (first-language English readers). We found robust cross-script priming effects, which were equal in magnitude for visually similar (e.g., り/リ) and dissimilar (e.g., あ/ア) kana pairs. This pattern was found despite participants' imperfect explicit knowledge of the kana names, particularly for katakana. We also replicated prior findings from Roman abstract letter identities in the same participants. Ours is the first study reporting abstract kana identity priming (in adult L2 learners). Furthermore, these representations were acquired relatively early in our adult L2 learners.

  8. A Dramatic Challenge to Operational Theory: The Sinai Campaign, October 1973.

    DTIC Science & Technology

    1987-05-01

    Colonel Tuvia Raviv , attacked the southern flank of the Egyptian 2nd Army, Reshef would turn south in a flanking movement toward the crossing site...brigade, under Colonel Erez, would bring up the bridge. Raviv had to make a convincing attack north toward the Tasa-Ismalia road, to focus the...arrival of Adan’s division at the Chinese Farm and the perserverance demonstrated by Raviv in 26 4 m - . , ’ i , , - . ,r

  9. Collaboration Expertise in Medicine - No Evidence for Cross-Domain Application from a Memory Retrieval Study.

    PubMed

    Kiesewetter, Jan; Fischer, Frank; Fischer, Martin R

    2016-01-01

    Is there evidence for expertise on collaboration and, if so, is there evidence for cross-domain application? Recall of stimuli was used to measure so-called internal collaboration scripts of novices and experts in two studies. Internal collaboration scripts refer to an individual's knowledge about how to interact with others in a social situation. METHOD— Ten collaboration experts and ten novices of the content domain social science were presented with four pictures of people involved in collaborative activities. The recall texts were coded, distinguishing between superficial and collaboration script information. RESULTS— Experts recalled significantly more collaboration script information (M = 25.20; SD = 5.88) than did novices (M = 13.80; SD = 4.47). Differences in superficial information were not found. Study 2 tested whether the differences found in Study 1 could be replicated. Furthermore, the cross-domain application of internal collaboration scripts was explored. METHOD— Twenty collaboration experts and 20 novices of the content domain medicine were presented with four pictures and four videos of their content domain and a video and picture of another content domain. All stimuli showed collaborative activities typical for the respective content domains. RESULTS— As in Study 1, experts recalled significantly more collaboration script information of their content domain (M = 71.65; SD = 33.23) than did novices (M = 54.25; SD = 15.01). For the novices, no differences were found for the superficial information nor for the retrieval of collaboration script information recalled after the other content domain stimuli. There is evidence for expertise on collaboration in memory tasks. The results show that experts hold substantially more collaboration script information than did novices. Furthermore, the differences between collaboration novices and collaboration experts occurred only in their own content domain, indicating that internal collaboration scripts are not easily stored and retrieved in memory tasks other than in the own content domain.

  10. Collaboration Expertise in Medicine - No Evidence for Cross-Domain Application from a Memory Retrieval Study

    PubMed Central

    Kiesewetter, Jan; Fischer, Frank; Fischer, Martin R.

    2016-01-01

    Background Is there evidence for expertise on collaboration and, if so, is there evidence for cross-domain application? Recall of stimuli was used to measure so-called internal collaboration scripts of novices and experts in two studies. Internal collaboration scripts refer to an individual’s knowledge about how to interact with others in a social situation. Method—Study 1 Ten collaboration experts and ten novices of the content domain social science were presented with four pictures of people involved in collaborative activities. The recall texts were coded, distinguishing between superficial and collaboration script information. Results—Study 1 Experts recalled significantly more collaboration script information (M = 25.20; SD = 5.88) than did novices (M = 13.80; SD = 4.47). Differences in superficial information were not found. Study 2 Study 2 tested whether the differences found in Study 1 could be replicated. Furthermore, the cross-domain application of internal collaboration scripts was explored. Method—Study 2 Twenty collaboration experts and 20 novices of the content domain medicine were presented with four pictures and four videos of their content domain and a video and picture of another content domain. All stimuli showed collaborative activities typical for the respective content domains. Results—Study 2 As in Study 1, experts recalled significantly more collaboration script information of their content domain (M = 71.65; SD = 33.23) than did novices (M = 54.25; SD = 15.01). For the novices, no differences were found for the superficial information nor for the retrieval of collaboration script information recalled after the other content domain stimuli. Discussion There is evidence for expertise on collaboration in memory tasks. The results show that experts hold substantially more collaboration script information than did novices. Furthermore, the differences between collaboration novices and collaboration experts occurred only in their own content domain, indicating that internal collaboration scripts are not easily stored and retrieved in memory tasks other than in the own content domain. PMID:26866801

  11. Unrecognized Cultural Conventions for Assessing Word Reading That Affect Research and Practice

    ERIC Educational Resources Information Center

    Fletcher-Flinn, Claire M.; Thompson, G. Brian; Yamada, Megumi; Naka, Makiko

    2014-01-01

    In research on the acquisition of reading, there have been cross-orthographic comparisons made between some alphabetic scripts and a few syllabic scripts. In the present study of Japanese Grade 1 children learning to read hiragana, a syllabic script, there was a comparison of assessments of oral word reading accuracy levels recorded by scorers…

  12. Attacking Apartheid Education: An interview with Jonathan Kozol

    ERIC Educational Resources Information Center

    Curriculum Review, 2005

    2005-01-01

    This article presents an interview with Jonathan Kozol. Topics discussed include: (1) On the root causes of school resegregation; (2) On strategies for solving the problem; (3) On guaranteeing education for all; (4) On forcing opponents of integration into the open; (5) On mechanisms for promoting integration; (6) On scripted curricula in…

  13. Covalent trapping of human DNA polymerase beta by the oxidative DNA lesion 2-deoxyribonolactone.

    PubMed

    DeMott, Michael S; Beyret, Ergin; Wong, Donny; Bales, Brian C; Hwang, Jae-Taeg; Greenberg, Marc M; Demple, Bruce

    2002-03-08

    Oxidized abasic residues in DNA constitute a major class of radiation and oxidative damage. Free radical attack on the nucleotidyl C-1' carbon yields 2-deoxyribonolactone (dL) as a significant lesion. Although dL residues are efficiently incised by the main human abasic endonuclease enzyme Ape1, we show here that subsequent excision by human DNA polymerase beta is impaired at dL compared with unmodified abasic sites. This inhibition is accompanied by accumulation of a protein-DNA cross-link not observed in reactions of polymerase beta with unmodified abasic sites, although a similar form can be trapped by reduction with sodium borohydride. The formation of the stably cross-linked species with dL depends on the polymerase lysine 72 residue, which forms a Schiff base with the C-1 aldehyde during excision of an unmodified abasic site. In the case of a dL residue, attack on the lactone C-1 by lysine 72 proceeds more slowly and evidently produces an amide linkage, which resists further processing. Consequently dL residues may not be readily repaired by "short-patch" base excision repair but instead function as suicide substrates in the formation of protein-DNA cross-links that may require alternative modes of repair.

  14. Repetition priming with Japanese Kana scripts in word-fragment completion.

    PubMed

    Komatsu, S; Naito, M

    1992-03-01

    Manipulating two types of Japanese Kana script, Katakana and Hiragana, we examined the effects of a script change between study and test on later word-fragment completion. Throughout three experiments, materials were composed of foreign loan nouns normally written in Katakana, but not in Hiragana, according to approved usage in Japanese. Experiment 1 demonstrated the reliable size of cross-script priming between Katakana and Hiragana. In Experiment 2, cross-modal priming was substantial when modality of presentation was changed from auditory to visual. In Experiment 3, generating a target word from its definition induced priming comparable in size to that in the prior reading condition. These results have been confirmed in the Hiragana test, as well as in the Katakana test, thereby suggesting that some conceptual and modality-independent processes may also mediate repetition priming.

  15. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  16. Cross-Language Transfer of Word Reading Accuracy and Word Reading Fluency in Spanish-English and Chinese-English Bilinguals: Script-Universal and Script-Specific Processes

    ERIC Educational Resources Information Center

    Pasquarella, Adrian; Chen, Xi; Gottardo, Alexandra; Geva, Esther

    2015-01-01

    This study examined cross-language transfer of word reading accuracy and word reading fluency in Spanish-English and Chinese-English bilinguals. Participants included 51 Spanish-English and 64 Chinese-English bilinguals. Both groups of children completed parallel measures of phonological awareness, rapid automatized naming, word reading accuracy,…

  17. Rich in vitamin C or just a convenient snack? Multiple-category reasoning with cross-classified foods.

    PubMed

    Hayes, Brett K; Kurniawan, Hendy; Newell, Ben R

    2011-01-01

    Two studies examined multiple category reasoning in property induction with cross-classified foods. Pilot tests identified foods that were more typical of a taxonomic category (e.g., "fruit"; termed 'taxonomic primary') or a script based category (e.g., "snack foods"; termed 'script primary'). They also confirmed that taxonomic categories were perceived as more coherent than script categories. In Experiment 1 participants completed an induction task in which information from multiple categories could be searched and combined to generate a property prediction about a target food. Multiple categories were more often consulted and used in prediction for script primary than for taxonomic primary foods. Experiment 2 replicated this finding across a range of property types but found that multiple category reasoning was reduced in the presence of a concurrent cognitive load. Property type affected which categories were consulted first and how information from multiple categories was weighted. The results show that multiple categories are more likely to be used for property predictions about cross-classified objects when an object is primarily associated with a category that has low coherence.

  18. Cross-script and within-script priming in alcoholic Korsakoff patients.

    PubMed

    Komatsu, Shin-Ichi; Mimura, Masaru; Kato, Motoichiro; Kashima, Haruo

    2003-04-01

    In two experiments, alcoholic Korsakoff patients and control subjects studied a list of Japanese nouns written in either Hiragana or Kanji script. Word-fragment completion and recognition tests were then administered in Hiragana. When the writing script was changed between study and test phases, repetition priming in word-fragment completion was significantly attenuated but was still reliable against baseline performance. This was confirmed for both Korsakoff patients and control subjects. In contrast, the script change had little effect on recognition memory, which was severely impaired in Korsakoff patients. The results suggest that repetition priming is mediated by two different implicit processes, one that is script-specific and the other that is assumed to operate at a more abstract level.

  19. Crossing boundaries in interprofessional education: A call for instructional integration of two script concepts.

    PubMed

    Kiesewetter, Jan; Kollar, Ingo; Fernandez, Nicolas; Lubarsky, Stuart; Kiessling, Claudia; Fischer, Martin R; Charlin, Bernard

    2016-09-01

    Clinical work occurs in a context which is heavily influenced by social interactions. The absence of theoretical frameworks underpinning the design of collaborative learning has become a roadblock for interprofessional education (IPE). This article proposes a script-based framework for the design of IPE. This framework provides suggestions for designing learning environments intended to foster competences we feel are fundamental to successful interprofessional care. The current literature describes two script concepts: "illness scripts" and "internal/external collaboration scripts". Illness scripts are specific knowledge structures that link general disease categories and specific examples of diseases. "Internal collaboration scripts" refer to an individual's knowledge about how to interact with others in a social situation. "External collaboration scripts" are instructional scaffolds designed to help groups collaborate. Instructional research relating to illness scripts and internal collaboration scripts supports (a) putting learners in authentic situations in which they need to engage in clinical reasoning, and (b) scaffolding their interaction with others with "external collaboration scripts". Thus, well-established experiential instructional approaches should be combined with more fine-grained script-based scaffolding approaches. The resulting script-based framework offers instructional designers insights into how students can be supported to develop the necessary skills to master complex interprofessional clinical situations.

  20. Types and Characteristics of Fish and Seafood Provisioning Scripts Used by Rural Midlife Adults.

    PubMed

    Bostic, Stephanie M; Sobal, Jeffery; Bisogni, Carole A; Monclova, Juliet M

    To examine rural New York State consumers' cognitive scripts for fish and seafood provisioning. A cross-sectional design with in-depth, semistructured interviews. Three rural New York State counties. Adults (n = 31) with diverse fish-related experiences were purposefully recruited. Scripts describing fish and seafood acquisition, preparation, and eating out. Interview transcripts were coded for emergent themes using Atlas.ti. Diagrams of scripts for each participant were constructed. Five types of acquisition scripts included quality-oriented, price-oriented, routine, special occasion, and fresh catch. Frequently used preparation scripts included everyday cooking, fast meal, entertaining, and grilling. Scripts for eating out included fish as first choice, Friday outing, convenient meals, special event, and travel meals. Personal values and resources influenced script development. Individuals drew on a repertoire of scripts based on their goals and resources at that time and in that place. Script characteristics of scope, flexibility, and complexity varied widely. Scripts incorporated goals, values, and resources into routine food behaviors. Understanding the characteristics of scripts provided insights about fish provisioning and opportunities to reduce the gap between current intake and dietary guidelines in this rural setting. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Python script for querying a list of web sites and their details from Splunk and dynamically creating tests for monitoring uptime. The data generated from this script is then sent back to Splunk for creating reports and alerts.

  2. A Study of Malware Propagation via Online Social Networking

    NASA Astrophysics Data System (ADS)

    Faghani, Mohammad Reza; Nguyen, Uyen Trang

    The popularity of online social networks (OSNs) have attracted malware creators who would use OSNs as a platform to propagate automated worms from one user's computer to another's. On the other hand, the topic of malware propagation in OSNs has only been investigated recently. In this chapter, we discuss recent advances on the topic of malware propagation by way of online social networking. In particular, we present three malware propagation techniques in OSNs, namely cross site scripting (XSS), Trojan and clickjacking types, and their characteristics via analytical models and simulations.

  3. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications

    DTIC Science & Technology

    2015-10-16

    his finger. Figure 6: Memorygrams for three popular websites (Facebook, Google, Yahoo ). In each experiment, we opened the private-mode brows- ing...Twitter (5) - - - - 1 - - - Wikipedia (6) - - .2 - - .8 - - Yahoo (7) - - - - - - 1 - Youtube (8) - - - - .4 - - .6 Table 2: Confusion matrix...17 .83 - - - Wikipedia (6) - - .33 - .17 .5 - - Yahoo (7) - - - - - - 1 - Youtube (8) - - - - .4 - - 1 Table 3: Confusion matrix for FFT

  4. Image

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marsh, Amber; Harsch, Tim; Pitt, Julie

    2007-08-31

    The computer side of the IMAGE project consists of a collection of Perl scripts that perform a variety of tasks; scripts are available to insert, update and delete data from the underlying Oracle database, download data from NCBI's Genbank and other sources, and generate data files for download by interested parties. Web scripts make up the tracking interface, and various tools available on the project web-site (image.llnl.gov) that provide a search interface to the database.

  5. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Youssef, Tarek; El Hariri, Mohammad; Habib, Hani

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware tomore » trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.« less

  6. Peopling the Picketwire: A History of the Pinon Canyon Maneuver Site

    DTIC Science & Technology

    2007-07-01

    that his 1492 ocean crossing had failed to find the rumored western passage to the spice routes. As far as he was concerned, he had made landfall...Coronado first crossed the state’s southeastern tip during his 1540-1542 expedition while searching for “Quivira,” the city of gold rumored to lie across...after hearing rumors that the French and their indigenous allies planned to use southern Colorado and Kansas as a staging area for attacks on New

  7. The Acquisition of Phoneme Awareness in Children Learning the Hiragana Syllabary

    ERIC Educational Resources Information Center

    Fletcher-Flinn, Claire M.; Thompson, G. Brian; Yamada, Megumi; Naka, Makiko

    2011-01-01

    In research on the acquisition of reading, there have been some cross-orthographic comparisons between alphabetic scripts and the hiragana syllabic script. One of the theoretical motives for these comparisons is the hypothesis that phonological awareness is related to the size of the phonological unit mapped by the orthography, with phoneme…

  8. An ERP investigation of visual word recognition in syllabary scripts.

    PubMed

    Okano, Kana; Grainger, Jonathan; Holcomb, Phillip J

    2013-06-01

    The bimodal interactive-activation model has been successfully applied to understanding the neurocognitive processes involved in reading words in alphabetic scripts, as reflected in the modulation of ERP components in masked repetition priming. In order to test the generalizability of this approach, in the present study we examined word recognition in a different writing system, the Japanese syllabary scripts hiragana and katakana. Native Japanese participants were presented with repeated or unrelated pairs of Japanese words in which the prime and target words were both in the same script (within-script priming, Exp. 1) or were in the opposite script (cross-script priming, Exp. 2). As in previous studies with alphabetic scripts, in both experiments the N250 (sublexical processing) and N400 (lexical-semantic processing) components were modulated by priming, although the time course was somewhat delayed. The earlier N/P150 effect (visual feature processing) was present only in "Experiment 1: Within-script priming", in which the prime and target words shared visual features. Overall, the results provide support for the hypothesis that visual word recognition involves a generalizable set of neurocognitive processes that operate in similar manners across different writing systems and languages, as well as pointing to the viability of the bimodal interactive-activation framework for modeling such processes.

  9. Viewing multiple sequence alignments with the JavaScript Sequence Alignment Viewer (JSAV)

    PubMed Central

    Martin, Andrew C. R.

    2014-01-01

    The JavaScript Sequence Alignment Viewer (JSAV) is designed as a simple-to-use JavaScript component for displaying sequence alignments on web pages. The display of sequences is highly configurable with options to allow alternative coloring schemes, sorting of sequences and ’dotifying’ repeated amino acids. An option is also available to submit selected sequences to another web site, or to other JavaScript code. JSAV is implemented purely in JavaScript making use of the JQuery and JQuery-UI libraries. It does not use any HTML5-specific options to help with browser compatibility. The code is documented using JSDOC and is available from http://www.bioinf.org.uk/software/jsav/. PMID:25653836

  10. Viewing multiple sequence alignments with the JavaScript Sequence Alignment Viewer (JSAV).

    PubMed

    Martin, Andrew C R

    2014-01-01

    The JavaScript Sequence Alignment Viewer (JSAV) is designed as a simple-to-use JavaScript component for displaying sequence alignments on web pages. The display of sequences is highly configurable with options to allow alternative coloring schemes, sorting of sequences and 'dotifying' repeated amino acids. An option is also available to submit selected sequences to another web site, or to other JavaScript code. JSAV is implemented purely in JavaScript making use of the JQuery and JQuery-UI libraries. It does not use any HTML5-specific options to help with browser compatibility. The code is documented using JSDOC and is available from http://www.bioinf.org.uk/software/jsav/.

  11. Computers in Small Libraries: Learning Server-Side Scripting

    ERIC Educational Resources Information Center

    Roberts, Gary

    2005-01-01

    In this column, the author compares and contrasts the most popular scripting languages that are used to create truly dynamic service-oriented Web sites, building a conceptual framework that be can used as a starting point for specific server-side library projects.

  12. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  13. Effects of script types of Japanese loan words on priming performance.

    PubMed

    Hayashi, Chiyoko

    2005-04-01

    23 female undergraduate students (M=20 yr., 10 mo., SD=15 mo.) were given a word-fragment completion task, containing a study and nonstudy list. In the present study, the effect of orthographic familiarity (e.g., script type) of a test item on a word-fragment completion task was examined. The script types of word stimuli (Katakana and Hiragana) were manipulated between a study and test phase. Priming effect was greater when the script type was the same between a study and test phase than in the cross-script condition. Further, even if the script type of word stimulus was different between study and test phases, a significant priming effect was obtained when the test fragment was orthographically familiar. These results suggested that not only the consistency of the perceptual feature of the stimulus word between study and test phases, but also orthographic familiarity of the stimulus word in the test phase facilitated priming effect in a word-fragment completion test.

  14. Can virtual reality be used to conduct mass prophylaxis clinic training? A pilot program.

    PubMed

    Yellowlees, Peter; Cook, James N; Marks, Shayna L; Wolfe, Daniel; Mangin, Elanor

    2008-03-01

    To create and evaluate a pilot bioterrorism defense training environment using virtual reality technology. The present pilot project used Second Life, an internet-based virtual world system, to construct a virtual reality environment to mimic an actual setting that might be used as a Strategic National Stockpile (SNS) distribution site for northern California in the event of a bioterrorist attack. Scripted characters were integrated into the system as mock patients to analyze various clinic workflow scenarios. Users tested the virtual environment over two sessions. Thirteen users who toured the environment were asked to complete an evaluation survey. Respondents reported that the virtual reality system was relevant to their practice and had potential as a method of bioterrorism defense training. Computer simulations of bioterrorism defense training scenarios are feasible with existing personal computer technology. The use of internet-connected virtual environments holds promise for bioterrorism defense training. Recommendations are made for public health agencies regarding the implementation and benefits of using virtual reality for mass prophylaxis clinic training.

  15. A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis

    DTIC Science & Technology

    2014-04-01

    objective? • What vulnerabilities exist in the target system? • What damage or other consequences are likely? • What exploit scripts or other attack...languages C, R, and Python; no response capabilities. JUNG https://blogs.reucon.com/asterisk- java /tag/visualization/ Create custom layouts and can...annotate graphs, links, nodes with any Java data type. Must be familiar with coding in Java to call the routines; no monitoring or response

  16. The role of semantic processing in reading Japanese orthographies: an investigation using a script-switch paradigm.

    PubMed

    Dylman, Alexandra S; Kikutani, Mariko

    2018-01-01

    Research on Japanese reading has generally indicated that processing of the logographic script Kanji primarily involves whole-word lexical processing and follows a semantics-to-phonology route, while the two phonological scripts Hiragana and Katakana (collectively called Kana) are processed via a sub-lexical route, and more in a phonology-to-semantics manner. Therefore, switching between the two scripts often involves switching between two reading processes, which results in a delayed response for the second script (a script switch cost). In the present study, participants responded to pairs of words that were written either in the same orthography (within-script), or in two different Japanese orthographies (cross-script), switching either between Kanji and Hiragana, or between Katakana and Hiragana. They were asked to read the words aloud (Experiments 1 and 3) and to make a semantic decision about them (Experiments 2 and 4). In contrast to initial predictions, a clear switch cost was observed when participants switched between the two Kana scripts, while script switch costs were less consistent when participants switched between Kanji and Hiragana. This indicates that there are distinct processes involved in reading of the two types of Kana, where Hiragana reading appears to bear some similarities to Kanji processing. This suggests that the role of semantic processing in Hiragana (but not Katakana) reading is more prominent than previously thought and thus, Hiragana is not likely to be processed strictly phonologically.

  17. An ERP Investigation of Visual Word Recognition in Syllabary Scripts

    PubMed Central

    Okano, Kana; Grainger, Jonathan; Holcomb, Phillip J.

    2013-01-01

    The bi-modal interactive-activation model has been successfully applied to understanding the neuro-cognitive processes involved in reading words in alphabetic scripts, as reflected in the modulation of ERP components in masked repetition priming. In order to test the generalizability of this approach, the current study examined word recognition in a different writing system, the Japanese syllabary scripts Hiragana and Katakana. Native Japanese participants were presented with repeated or unrelated pairs of Japanese words where the prime and target words were both in the same script (within-script priming, Experiment 1) or were in the opposite script (cross-script priming, Experiment 2). As in previous studies with alphabetic scripts, in both experiments the N250 (sub-lexical processing) and N400 (lexical-semantic processing) components were modulated by priming, although the time-course was somewhat delayed. The earlier N/P150 effect (visual feature processing) was present only in Experiment 1 where prime and target words shared visual features. Overall, the results provide support for the hypothesis that visual word recognition involves a generalizable set of neuro-cognitive processes that operate in a similar manner across different writing systems and languages, as well as pointing to the viability of the bi-modal interactive activation framework for modeling such processes. PMID:23378278

  18. Inductive Selectivity in Children’s Cross-classified Concepts

    PubMed Central

    Nguyen, Simone P.

    2012-01-01

    Cross-classified items pose an interesting challenge to children’s induction since these items belong to many different categories, each of which may serve as a basis for a different type of inference. Inductive selectivity is the ability to appropriately make different types of inferences about a single cross-classifiable item based on its different category memberships. This research includes five experiments that examine the development of inductive selectivity in 3-, 4-, and 5-year-olds (N = 272). Overall, the results show that by age 4 years, children have inductive selectivity with taxonomic and script categories. That is, children use taxonomic categories to make biochemical inferences about an item whereas children use script categories to make situational inferences about an item. PMID:22803510

  19. Cognate Effects in Picture Naming: Does Cross-Language Activation Survive a Change of Script?

    ERIC Educational Resources Information Center

    Hoshino, Noriko; Kroll, Judith F.

    2008-01-01

    Bilinguals are faster to name a picture in one language when the picture's name is a cognate in the other language. We asked whether cognate facilitation in picture naming would be obtained for bilinguals whose two languages differ in script. Spanish-English and Japanese-English bilinguals named cognate and noncognate pictures in English, their…

  20. Web vulnerability study of online pharmacy sites.

    PubMed

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  1. SoS Notebook: An Interactive Multi-Language Data Analysis Environment.

    PubMed

    Peng, Bo; Wang, Gao; Ma, Jun; Leong, Man Chong; Wakefield, Chris; Melott, James; Chiu, Yulun; Du, Di; Weinstein, John N

    2018-05-22

    Complex bioinformatic data analysis workflows involving multiple scripts in different languages can be difficult to consolidate, share, and reproduce. An environment that streamlines the entire processes of data collection, analysis, visualization and reporting of such multi-language analyses is currently lacking. We developed Script of Scripts (SoS) Notebook, a web-based notebook environment that allows the use of multiple scripting language in a single notebook, with data flowing freely within and across languages. SoS Notebook enables researchers to perform sophisticated bioinformatic analysis using the most suitable tools for different parts of the workflow, without the limitations of a particular language or complications of cross-language communications. SoS Notebook is hosted at http://vatlab.github.io/SoS/ and is distributed under a BSD license. bpeng@mdanderson.org.

  2. Mental health service use among American Red Cross disaster workers responding to the September 11, 2001 U.S. terrorist attacks.

    PubMed

    Elhai, Jon D; Jacobs, Gerard A; Kashdan, Todd B; DeJong, Gary L; Meyer, David L; Frueh, B Christopher

    2006-06-30

    In this article, we explored 1) the extent of mental health (MH) service use by American Red Cross disaster relief workers, both before (lifetime) and 1 year after the September 11, 2001 terrorist attacks, and 2) demographic, disaster and MH variables predicting (1-year) post-September 11 MH service use in this population. A sample of 3015 Red Cross disaster workers was surveyed 1 year after the attacks, regarding demographic characteristics, MH service use before and since the attacks, and posttraumatic stress disorder (PTSD) symptoms. Findings revealed that while 13.5% used MH services before the attacks, 10.7% used services after. Variables increasing the likelihood of MH service use after the attacks included the following: no previous MH treatment, younger age, being divorced/widowed, and higher PTSD intrusion or hyperarousal symptoms. Findings support other recent research on MH service use after the September 11 attacks.

  3. Eye movement control in reading unspaced text: the case of the Japanese script.

    PubMed

    Kajii, N; Nazir, T A; Osaka, N

    2001-09-01

    The present study examines the landing-site distributions of the eyes during natural reading of Japanese script: a script that mixes three different writing systems (Kanji, Hiragana, and Katakana) and that misses regular spacing between words. The results show a clear preference of the eyes to land at the beginning rather than the center of the word. In addition, it was found that the eyes land on Kanji characters more frequently than on Hiragana or Katakana characters. Further analysis for two- and three-character words indicated that the eye's landing-site distribution differs depending on type of the characters in the word: the eyes prefer to land at the word beginning only when the initial character of the word is a Kanji character. For pure Hiragana words, the proportion of initial fixations did not differ between character positions. Thus, as already indicated by Kambe (National Institute of Japanese Language Report 85 (1986) 29), the visual distinctiveness of the three Japanese scripts plays a role in guiding eye movements in reading Japanese.

  4. Transformation of topic-specific professional knowledge into personal pedagogical content knowledge through lesson planning

    NASA Astrophysics Data System (ADS)

    Stender, Anita; Brückmann, Maja; Neumann, Knut

    2017-08-01

    This study investigates the relationship between two different types of pedagogical content knowledge (PCK): the topic-specific professional knowledge (TSPK) and practical routines, so-called teaching scripts. Based on the Transformation Model of Lesson Planning, we assume that teaching scripts originate from a transformation of TSPK during lesson planning: When planning lessons, teachers use their TSPK to create lesson plans. The implementation of these lesson plans and teachers' reflection upon them lead to their improvement. Gradually, successful lesson plans are mentally stored as teaching scripts and can easily be retrieved during instruction. This process is affected by teacher's beliefs, motivation and self-regulation. In order to examine the influence of TSPK on teaching scripts as well as the moderating effects of beliefs, motivation and self-regulation, we conducted a cross-sectional study with n = 49 in-service teachers in physics. The TSPK, beliefs, motivation, self-regulation and the quality of teaching scripts of in-service teachers were assessed by using an online questionnaire adapted to teaching the force concept and Newton's law for 9th grade instruction. Based on the measurement of the quality of teaching scripts, the results provide evidence that TSPK influences the quality of teaching scripts. Motivation and self-regulation moderate this influence.

  5. Acquisition and Maintenance of Scripts in Aphasia: A Comparison of Two Cuing Conditions

    PubMed Central

    Cherney, Leora R.; Kaye, Rosalind C.; van Vuuren, Sarel

    2014-01-01

    Purpose This study was designed to compare acquisition and maintenance of scripts under two conditions: High Cue which provided numerous multimodality cues designed to minimize errors, and Low Cue which provided minimal cues. Methods In a randomized controlled cross-over study, eight individuals with chronic aphasia received intensive computer-based script training under two cuing conditions. Each condition lasted three weeks, with a three-week washout period. Trained and untrained scripts were probed for accuracy and rate at baseline, during treatment, immediately post-treatment, and at three and six weeks post-treatment. Significance testing was conducted on gain scores and effect sizes were calculated. Results Training resulted in significant gains in script acquisition with maintenance of skills at three and six weeks post-treatment. Differences between cuing conditions were not significant. When severity of aphasia was considered, there also were no significant differences between conditions, although magnitude of change was greater in the High Cue condition versus the Low Cue condition for those with more severe aphasia. Conclusions Both cuing conditions were effective in acquisition and maintenance of scripts. The High Cue condition may be advantageous for those with more severe aphasia. Findings support the clinical use of script training and importance of considering aphasia severity. PMID:24686911

  6. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  7. Cross-Classification and Category Representation in Children's Concepts

    ERIC Educational Resources Information Center

    Nguyen, Simone P.

    2007-01-01

    Items commonly belong to many categories. Cross-classification is the classification of a single item into more than one category. This research explored 2- to 6-year-old children's use of 2 different category systems for cross-classification: script (e.g., school-time items, birthday party items) and taxonomic (e.g., animals, clothes). The…

  8. Prediction of Business Jet Airloads Using The Overflow Navier-Stokes Code

    NASA Technical Reports Server (NTRS)

    Bounajem, Elias; Buning, Pieter G.

    2001-01-01

    The objective of this work is to evaluate the application of Navier-Stokes computational fluid dynamics technology, for the purpose of predicting off-design condition airloads on a business jet configuration in the transonic regime. The NASA Navier-Stokes flow solver OVERFLOW with Chimera overset grid capability, availability of several numerical schemes and convergence acceleration techniques was selected for this work. A set of scripts which have been compiled to reduce the time required for the grid generation process are described. Several turbulence models are evaluated in the presence of separated flow regions on the wing. Computed results are compared to available wind tunnel data for two Mach numbers and a range of angles-of-attack. Comparisons of wing surface pressure from numerical simulation and wind tunnel measurements show good agreement up to fairly high angles-of-attack.

  9. jsNMR: an embedded platform-independent NMR spectrum viewer.

    PubMed

    Vosegaard, Thomas

    2015-04-01

    jsNMR is a lightweight NMR spectrum viewer written in JavaScript/HyperText Markup Language (HTML), which provides a cross-platform spectrum visualizer that runs on all computer architectures including mobile devices. Experimental (and simulated) datasets are easily opened in jsNMR by (i) drag and drop on a jsNMR browser window, (ii) by preparing a jsNMR file from the jsNMR web site, or (iii) by mailing the raw data to the jsNMR web portal. jsNMR embeds the original data in the HTML file, so a jsNMR file is a self-transforming dataset that may be exported to various formats, e.g. comma-separated values. The main applications of jsNMR are to provide easy access to NMR data without the need for dedicated software installed and to provide the possibility to visualize NMR spectra on web sites. Copyright © 2015 John Wiley & Sons, Ltd.

  10. Emergency preparedness among people living near US army chemical weapons sites after September 11, 2001.

    PubMed

    Williams, Bryan L; Magsumbol, Melina S

    2007-09-01

    We examined trust in the army and perceptions of emergency preparedness among residents living near the Anniston, Ala, and Richmond, Ky, US Army chemical weapons stockpile sites shortly after September 11, 2001. Residents (n = 655) living near the 2 sites who participated in a cross-sectional population were relatively unprepared in the event of a chemical emergency. The events of September 11 gave rise to concerns regarding the security of stored chemical weapons and the sites' vulnerability to terrorist attacks. Although residents expressed trust in the army to manage chemical weapons safely, only a few expressed a desire to actively participate in site decisions. Compliance with procedures during emergencies could be seriously limited, putting residents in these sites at higher levels of risk of exposure to chemical hazards than nonresidents.

  11. Factors influencing care seeking for a self-defined worst panic attack.

    PubMed

    Katerndahl, David A

    2002-04-01

    Only 60 percent of persons who experience panic attacks seek treatment for them, many at the emergency department. The author documented care-seeking behaviors among persons living in the community who had experienced panic attacks and studied determinants of care seeking. In-depth structured interviews were conducted with 97 randomly selected community-dwelling adults who met DSM-III-R criteria for panic attacks. Participants were asked whether they had contemplated using or had actually used medical, alternative, and family sources of care when they had experienced their worst attack. Seventy-seven participants (79 percent) had considered using a general medical or mental health site when they experienced their worst attack. Of these, 50 (52 percent) had actually used such a site. General medical sites were contemplated more often (72 percent of participants) than mental health sites (27 percent), particularly emergency departments (43 percent) and family physicians' offices (34 percent). Other sources, such as friends or family members, alternative sites, and self-treatment, were contemplated less often. Once contemplated, certain sources were readily used, such as ambulances, family members, and self-treatment. Several factors were significantly associated with whether a person contemplated seeking care: access or barriers to treatment, perception of symptoms and of the reasons for the panic attack, and family-related variables. Contemplation and use of a mental health site after a panic attack was rare among the participants in this study. Further study of determinants of care seeking may help explain why persons who experience panic attacks fail to seek treatment or seek treatment from non-mental health sources.

  12. Effect of 11 September 2001 terrorist attacks in the USA on suicide in areas surrounding the crash sites.

    PubMed

    Claassen, Cynthia A; Carmody, Thomas; Stewart, Sunita M; Bossarte, Robert M; Larkin, Gregory L; Woodward, Wayne A; Trivedi, Madhukar H

    2010-05-01

    The terrorist attacks in the USA on 11 September 2001 affected suicide rates in two European countries, whereas overall US rates remained stable. The effect on attack site rates, however, has not been studied. To examine post-attack suicide rates in areas surrounding the three airline crash sites. Daily mortality rates were modelled using time series techniques. Where rate change was significant, both duration and geographic scope were analysed. Around the World Trade Center, post-attack 180-day rates dropped significantly (t = 2.4, P = 0.0046), whereas comparison condition rates remained stable. No change was observed for Pentagon or Flight 93 crash sites. The differential effect by site suggests that proximity may be less important that other event characteristics. Both temporal and geographic aspects of rate fluctuation after sentinel events appear measurable and further analyses may contribute valuable knowledge about how sociological forces affect these rates.

  13. Multiple grid arrangement improves ligand docking with unknown binding sites: Application to the inverse docking problem.

    PubMed

    Ban, Tomohiro; Ohue, Masahito; Akiyama, Yutaka

    2018-04-01

    The identification of comprehensive drug-target interactions is important in drug discovery. Although numerous computational methods have been developed over the years, a gold standard technique has not been established. Computational ligand docking and structure-based drug design allow researchers to predict the binding affinity between a compound and a target protein, and thus, they are often used to virtually screen compound libraries. In addition, docking techniques have also been applied to the virtual screening of target proteins (inverse docking) to predict target proteins of a drug candidate. Nevertheless, a more accurate docking method is currently required. In this study, we proposed a method in which a predicted ligand-binding site is covered by multiple grids, termed multiple grid arrangement. Notably, multiple grid arrangement facilitates the conformational search for a grid-based ligand docking software and can be applied to the state-of-the-art commercial docking software Glide (Schrödinger, LLC). We validated the proposed method by re-docking with the Astex diverse benchmark dataset and blind binding site situations, which improved the correct prediction rate of the top scoring docking pose from 27.1% to 34.1%; however, only a slight improvement in target prediction accuracy was observed with inverse docking scenarios. These findings highlight the limitations and challenges of current scoring functions and the need for more accurate docking methods. The proposed multiple grid arrangement method was implemented in Glide by modifying a cross-docking script for Glide, xglide.py. The script of our method is freely available online at http://www.bi.cs.titech.ac.jp/mga_glide/. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alfonso Valdes

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together withmore » third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.« less

  15. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  16. Emergency Preparedness Among People Living Near US Army Chemical Weapons Sites After September 11, 2001

    PubMed Central

    Williams, Bryan L.; Magsumbol, Melina S.

    2007-01-01

    We examined trust in the army and perceptions of emergency preparedness among residents living near the Anniston, Ala, and Richmond, Ky, US Army chemical weapons stockpile sites shortly after September 11, 2001. Residents (n = 655) living near the 2 sites who participated in a cross-sectional population were relatively unprepared in the event of a chemical emergency. The events of September 11 gave rise to concerns regarding the security of stored chemical weapons and the sites’ vulnerability to terrorist attacks. Although residents expressed trust in the army to manage chemical weapons safely, only a few expressed a desire to actively participate in site decisions. Compliance with procedures during emergencies could be seriously limited, putting residents in these sites at higher levels of risk of exposure to chemical hazards than nonresidents. PMID:17666684

  17. Artificial Intelligence: Expert Systems for Corps Tactical Planning and Other Applications.

    DTIC Science & Technology

    1987-03-23

    territory; and prepares to continue the attack into East Germany to secure Magdeburg and crossing sites on the Elbe River.. 3. EXECUTION. a. Concept of...14th Armored Cavalry Regiment, and the 22d Aviation Brigade to West Germany . The theater commander assigned the 1 Ith Corps and attached units to the...newly formed Middle Army Group (MIDAG), which had been given responsibility for a sector in the vicinity of Hannover, West Germany . Prior to issuing

  18. Border Crossing in the Classroom through Performed Ethnography

    ERIC Educational Resources Information Center

    Goldstein, Tara

    2016-01-01

    In this essay I share the ways I have used performed ethnography to explore the notion of border crossing in an undergraduate course called "Equity and Activism in Education." Performed ethnography involves turning the findings of ethnographic research into a play script. My students read two performed ethnographies, "Harriet's…

  19. Statistical Analysis of the Indus Script Using n-Grams

    PubMed Central

    Yadav, Nisha; Joglekar, Hrishikesh; Rao, Rajesh P. N.; Vahia, Mayank N.; Adhikari, Ronojoy; Mahadevan, Iravatham

    2010-01-01

    The Indus script is one of the major undeciphered scripts of the ancient world. The small size of the corpus, the absence of bilingual texts, and the lack of definite knowledge of the underlying language has frustrated efforts at decipherment since the discovery of the remains of the Indus civilization. Building on previous statistical approaches, we apply the tools of statistical language processing, specifically n-gram Markov chains, to analyze the syntax of the Indus script. We find that unigrams follow a Zipf-Mandelbrot distribution. Text beginner and ender distributions are unequal, providing internal evidence for syntax. We see clear evidence of strong bigram correlations and extract significant pairs and triplets using a log-likelihood measure of association. Highly frequent pairs and triplets are not always highly significant. The model performance is evaluated using information-theoretic measures and cross-validation. The model can restore doubtfully read texts with an accuracy of about 75%. We find that a quadrigram Markov chain saturates information theoretic measures against a held-out corpus. Our work forms the basis for the development of a stochastic grammar which may be used to explore the syntax of the Indus script in greater detail. PMID:20333254

  20. Does the reading of different orthographies produce distinct brain activity patterns? An ERP study.

    PubMed

    Bar-Kochva, Irit; Breznitz, Zvia

    2012-01-01

    Orthographies vary in the degree of transparency of spelling-sound correspondence. These range from shallow orthographies with transparent grapheme-phoneme relations, to deep orthographies, in which these relations are opaque. Only a few studies have examined whether orthographic depth is reflected in brain activity. In these studies a between-language design was applied, making it difficult to isolate the aspect of orthographic depth. In the present work this question was examined using a within-subject-and-language investigation. The participants were speakers of Hebrew, as they are skilled in reading two forms of script transcribing the same oral language. One form is the shallow pointed script (with diacritics), and the other is the deep unpointed script (without diacritics). Event-related potentials (ERPs) were recorded while skilled readers carried out a lexical decision task in the two forms of script. A visual non-orthographic task controlled for the visual difference between the scripts (resulting from the addition of diacritics to the pointed script only). At an early visual-perceptual stage of processing (~165 ms after target onset), the pointed script evoked larger amplitudes with longer latencies than the unpointed script at occipital-temporal sites. However, these effects were not restricted to orthographic processing, and may therefore have reflected, at least in part, the visual load imposed by the diacritics. Nevertheless, the results implied that distinct orthographic processing may have also contributed to these effects. At later stages (~340 ms after target onset) the unpointed script elicited larger amplitudes than the pointed one with earlier latencies. As this latency has been linked to orthographic-linguistic processing and to the classification of stimuli, it is suggested that these differences are associated with distinct lexical processing of a shallow and a deep orthography.

  1. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  2. PyRosetta: a script-based interface for implementing molecular modeling algorithms using Rosetta.

    PubMed

    Chaudhury, Sidhartha; Lyskov, Sergey; Gray, Jeffrey J

    2010-03-01

    PyRosetta is a stand-alone Python-based implementation of the Rosetta molecular modeling package that allows users to write custom structure prediction and design algorithms using the major Rosetta sampling and scoring functions. PyRosetta contains Python bindings to libraries that define Rosetta functions including those for accessing and manipulating protein structure, calculating energies and running Monte Carlo-based simulations. PyRosetta can be used in two ways: (i) interactively, using iPython and (ii) script-based, using Python scripting. Interactive mode contains a number of help features and is ideal for beginners while script-mode is best suited for algorithm development. PyRosetta has similar computational performance to Rosetta, can be easily scaled up for cluster applications and has been implemented for algorithms demonstrating protein docking, protein folding, loop modeling and design. PyRosetta is a stand-alone package available at http://www.pyrosetta.org under the Rosetta license which is free for academic and non-profit users. A tutorial, user's manual and sample scripts demonstrating usage are also available on the web site.

  3. PyRosetta: a script-based interface for implementing molecular modeling algorithms using Rosetta

    PubMed Central

    Chaudhury, Sidhartha; Lyskov, Sergey; Gray, Jeffrey J.

    2010-01-01

    Summary: PyRosetta is a stand-alone Python-based implementation of the Rosetta molecular modeling package that allows users to write custom structure prediction and design algorithms using the major Rosetta sampling and scoring functions. PyRosetta contains Python bindings to libraries that define Rosetta functions including those for accessing and manipulating protein structure, calculating energies and running Monte Carlo-based simulations. PyRosetta can be used in two ways: (i) interactively, using iPython and (ii) script-based, using Python scripting. Interactive mode contains a number of help features and is ideal for beginners while script-mode is best suited for algorithm development. PyRosetta has similar computational performance to Rosetta, can be easily scaled up for cluster applications and has been implemented for algorithms demonstrating protein docking, protein folding, loop modeling and design. Availability: PyRosetta is a stand-alone package available at http://www.pyrosetta.org under the Rosetta license which is free for academic and non-profit users. A tutorial, user's manual and sample scripts demonstrating usage are also available on the web site. Contact: pyrosetta@graylab.jhu.edu PMID:20061306

  4. Designing and developing portable large-scale JavaScript web applications within the Experiment Dashboard framework

    NASA Astrophysics Data System (ADS)

    Andreeva, J.; Dzhunov, I.; Karavakis, E.; Kokoszkiewicz, L.; Nowotka, M.; Saiz, P.; Tuckett, D.

    2012-12-01

    Improvements in web browser performance and web standards compliance, as well as the availability of comprehensive JavaScript libraries, provides an opportunity to develop functionally rich yet intuitive web applications that allow users to access, render and analyse data in novel ways. However, the development of such large-scale JavaScript web applications presents new challenges, in particular with regard to code sustainability and team-based work. We present an approach that meets the challenges of large-scale JavaScript web application design and development, including client-side model-view-controller architecture, design patterns, and JavaScript libraries. Furthermore, we show how the approach leads naturally to the encapsulation of the data source as a web API, allowing applications to be easily ported to new data sources. The Experiment Dashboard framework is used for the development of applications for monitoring the distributed computing activities of virtual organisations on the Worldwide LHC Computing Grid. We demonstrate the benefits of the approach for large-scale JavaScript web applications in this context by examining the design of several Experiment Dashboard applications for data processing, data transfer and site status monitoring, and by showing how they have been ported for different virtual organisations and technologies.

  5. Py4CAtS - Python tools for line-by-line modelling of infrared atmospheric radiative transfer

    NASA Astrophysics Data System (ADS)

    Schreier, Franz; García, Sebastián Gimeno

    2013-05-01

    Py4CAtS — Python scripts for Computational ATmospheric Spectroscopy is a Python re-implementation of the Fortran infrared radiative transfer code GARLIC, where compute-intensive code sections utilize the Numeric/Scientific Python modules for highly optimized array-processing. The individual steps of an infrared or microwave radiative transfer computation are implemented in separate scripts to extract lines of relevant molecules in the spectral range of interest, to compute line-by-line cross sections for given pressure(s) and temperature(s), to combine cross sections to absorption coefficients and optical depths, and to integrate along the line-of-sight to transmission and radiance/intensity. The basic design of the package, numerical and computational aspects relevant for optimization, and a sketch of the typical workflow are presented.

  6. Social Networking—Another Breach In The Wall

    NASA Astrophysics Data System (ADS)

    Bamnote, Gajendra; Patil, Gajendra; Shejole, Amol

    2010-11-01

    With the increasing popularity of social networks like Facebook and MySpace, such sites have lately become the favourite destinations for spammers and attackers. Social networks have experienced complex social engineering attacks, massive spam and aggressive malware distribution in the recent past. This paper presents a practical case study of social engineering, malware distribution and phishing attacks against social networking sites that are identified over last few months. It is explained how private data of the users are exposed to attackers and how easily their privacy is compromised as a result of these attacks and their own careless behaviour.

  7. A Markov model of the Indus script

    PubMed Central

    Rao, Rajesh P. N.; Yadav, Nisha; Vahia, Mayank N.; Joglekar, Hrishikesh; Adhikari, R.; Mahadevan, Iravatham

    2009-01-01

    Although no historical information exists about the Indus civilization (flourished ca. 2600–1900 B.C.), archaeologists have uncovered about 3,800 short samples of a script that was used throughout the civilization. The script remains undeciphered, despite a large number of attempts and claimed decipherments over the past 80 years. Here, we propose the use of probabilistic models to analyze the structure of the Indus script. The goal is to reveal, through probabilistic analysis, syntactic patterns that could point the way to eventual decipherment. We illustrate the approach using a simple Markov chain model to capture sequential dependencies between signs in the Indus script. The trained model allows new sample texts to be generated, revealing recurring patterns of signs that could potentially form functional subunits of a possible underlying language. The model also provides a quantitative way of testing whether a particular string belongs to the putative language as captured by the Markov model. Application of this test to Indus seals found in Mesopotamia and other sites in West Asia reveals that the script may have been used to express different content in these regions. Finally, we show how missing, ambiguous, or unreadable signs on damaged objects can be filled in with most likely predictions from the model. Taken together, our results indicate that the Indus script exhibits rich synactic structure and the ability to represent diverse content. both of which are suggestive of a linguistic writing system rather than a nonlinguistic symbol system. PMID:19666571

  8. Land Application of Wastes: An Educational Program. Drainage for Land Application Sites - Module 21, Objectives, and Script.

    ERIC Educational Resources Information Center

    Clarkson, W. W.; And Others

    Drainage for land treatment sites must be evaluated with respect to the purpose the system is meant to achieve. Off-site drainage controls the flow of storm runoff onto the site or groundwater incursion into the soil within the site. On-site drainage is employed for a variety of reasons. These two areas of drainage control must be designed as a…

  9. High cancer-specific expression of mesothelin (MSLN) is attributable to an upstream enhancer containing a transcription enhancer factor dependent MCAT motif.

    PubMed

    Hucl, Tomas; Brody, Jonathan R; Gallmeier, Eike; Iacobuzio-Donahue, Christine A; Farrance, Iain K; Kern, Scott E

    2007-10-01

    Identification of genes with cancer-specific overexpression offers the potential to efficiently discover cancer-specific activities in an unbiased manner. We apply this paradigm to study mesothelin (MSLN) overexpression, a nearly ubiquitous, diagnostically and therapeutically useful characteristic of pancreatic cancer. We identified an 18-bp upstream enhancer, termed CanScript, strongly activating transcription from an otherwise weak tissue-nonspecific promoter and operating selectively in cells having aberrantly elevated cancer-specific MSLN transcription. Introducing mutations into CanScript showed two functionally distinct sites: an Sp1-like site and an MCAT element. Gel retardation and chromatin immunoprecipitation assays showed the MCAT element to be bound by transcription enhancer factor (TEF)-1 (TEAD1) in vitro and in vivo. The presence of TEF-1 was required for MSLN protein overexpression as determined by TEF-1 knockdown experiments. The cancer specificity seemed to be provided by a putative limiting cofactor of TEF-1 that could be outcompeted by exogenous TEF-1 only in a MSLN-overexpressing cell line. A CanScript concatemer offered enhanced activity. These results identify a TEF family member as a major regulator of MSLN overexpression, a fundamental characteristic of pancreatic and other cancers, perhaps due to an upstream and highly frequent aberrant cellular activity. The CanScript sequence represents a modular element for cancer-specific targeting, potentially suitable for nearly a third of human malignancies.

  10. Aerobraking Maneuver (ABM) Report Generator

    NASA Technical Reports Server (NTRS)

    Fisher, Forrest; Gladden, Roy; Khanampornpan, Teerapat

    2008-01-01

    abmREPORT Version 3.1 is a Perl script that extracts vital summarization information from the Mars Reconnaissance Orbiter (MRO) aerobraking ABM build process. This information facilitates sequence reviews, and provides a high-level summarization of the sequence for mission management. The script extracts information from the ENV, SSF, FRF, SCMFmax, and OPTG files and burn magnitude configuration files and presents them in a single, easy-to-check report that provides the majority of the parameters necessary for cross check and verification during the sequence review process. This means that needed information, formerly spread across a number of different files and each in a different format, is all available in this one application. This program is built on the capabilities developed in dragReport and then the scripts evolved as the two tools continued to be developed in parallel.

  11. Subsonic roll oscillation experiments on the Standard Dynamics Model

    NASA Technical Reports Server (NTRS)

    Beyers, M. E.

    1983-01-01

    The experimental determination of the subsonic roll derivatives of the Standard Dynamics Model, which is representative of a current fighter aircraft configuration, is described. The direct, cross and cross-coupling derivatives are presented for angles of attack up to 41 deg and sideslip angles in the range from -5 deg to 5 deg, as functions of oscillation frequency. The derivatives exhibited significant nonlinear trends at high incidences and were found to be extremely sensitive to sideslip angle at angles of attack near 36 deg. The roll damping and dynamic cross derivatives were highly frequency dependent at angles of attack above 30 deg. The highest values measured for the dynamic cross and cross-coupling derivatives were comparable in magnitude with the maximum roll damping. The effects of oscillation amplitude and Mach number were also investigated, and the direct derivatives were correlated with data from another facility.

  12. The 2-d CCD Data Reduction Cookbook

    NASA Astrophysics Data System (ADS)

    Davenhall, A. C.; Privett, G. J.; Taylor, M. B.

    This cookbook presents simple recipes and scripts for reducing direct images acquired with optical CCD detectors. Using these recipes and scripts you can correct un-processed images obtained from CCDs for various instrumental effects to retrieve an accurate picture of the field of sky observed. The recipes and scripts use standard software available at all Starlink sites. The topics covered include: creating and applying bias and flat-field corrections, registering frames and creating a stack or mosaic of registered frames. Related auxiliary tasks, such as converting between different data formats, displaying images and calculating image statistics are also presented. In addition to the recipes and scripts, sufficient background material is presented to explain the procedures and techniques used. The treatment is deliberately practical rather than theoretical, in keeping with the aim of providing advice on the actual reduction of observations. Additional material outlines some of the differences between using conventional optical CCDs and the similar arrays used to observe at infrared wavelengths.

  13. Land Application of Wastes: An Educational Program. Site Evaluation - Module 2, Objectives, Script, and Sources of Information.

    ERIC Educational Resources Information Center

    Clarkson, W. W.; And Others

    This module describes important criteria to use in evaluating land for waste treatment sites and tells where the necessary information for such evaluation can be obtained. Among the important criteria for evaluation are climate, land use of potential site and surrounding areas, topography, drainage characteristics, soil properties, and geology.…

  14. Method for detecting core malware sites related to biomedical information systems.

    PubMed

    Kim, Dohoon; Choi, Donghee; Jin, Jonghyun

    2015-01-01

    Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%.

  15. Method for Detecting Core Malware Sites Related to Biomedical Information Systems

    PubMed Central

    Kim, Dohoon; Choi, Donghee; Jin, Jonghyun

    2015-01-01

    Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%. PMID:25821511

  16. Summary and Comparison of Multiphase Streambed Scour Analysis at Selected Bridge Sites in Alaska

    USGS Publications Warehouse

    Conaway, Jeffrey S.

    2004-01-01

    The U.S. Geological Survey and the Alaska Department of Transportation and Public Facilities undertook a cooperative multiphase study of streambed scour at selected bridges in Alaska beginning in 1994. Of the 325 bridges analyzed for susceptibility to scour in the preliminary phase, 54 bridges were selected for a more intensive analysis that included site investigations. Cross-section geometry and hydraulic properties for each site in this study were determined from field surveys and bridge plans. Water-surface profiles were calculated for the 100- and 500-year floods using the Hydrologic Engineering Center?s River Analysis System and scour depths were calculated using methods recommended by the Federal Highway Administration. Computed contraction-scour depths for the 100- and 500-year recurrence-interval discharges exceeded 5 feet at six bridges, and pier-scour depths exceeded 10 feet at 24 bridges. Complex pier-scour computations were made at 10 locations where the computed contraction-scour depths would expose pier footings. Pressure scour was evaluated at three bridges where the modeled flood water-surface elevations intersected the bridge structure. Site investigation at the 54 scour-critical bridges was used to evaluate the effectiveness of the preliminary scour analysis. Values for channel-flow angle of attack and approach-channel width were estimated from bridge survey plans for the preliminary study and were measured during a site investigation for this study. These two variables account for changes in scour depths between the preliminary analysis and subsequent reanalysis for most sites. Site investigation is needed for best estimates of scour at bridges with survey plans that indicate a channel-flow angle of attack and for locations where survey plans did not include sufficient channel geometry upstream of the bridge.

  17. Brisement

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  18. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  19. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  20. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  1. Subtalar Arthroscopy

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  2. Peroneal Tendinosis

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  3. Ankle Cheilectomy

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  4. Disobedient Child

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... some disobedient children, you may need to obtain professional mental health treatment. Here are some situations where ...

  5. Distraction Arthroplasty

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  6. Pediatric Specialists

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... for Referral to Pediatric Surgical Specialists Sports Medicine Professionals What is a Child Abuse Pediatrician? What is ...

  7. DOT Online Database

    Science.gov Websites

    site requires that JavaScript is enabled in order to function properly. Online Digital Special Collections Welcome to Online Digital Special Collections of interest to Department of Transportation (DOT

  8. Soil CO2 flux from three ecosystems in tropical peatland of Sarawak, Malaysia

    NASA Astrophysics Data System (ADS)

    Melling, Lulie; Hatano, Ryusuke; Goh, Kah Joo

    2005-02-01

    Soil CO2 flux was measured monthly over a year from tropical peatland of Sarawak, Malaysia using a closed-chamber technique. The soil CO2 flux ranged from 100 to 533 mg C m-2 h-1 for the forest ecosystem, 63 to 245 mg C m-2 h-1 for the sago and 46 to 335 mg C m-2 h-1 for the oil palm. Based on principal component analysis (PCA), the environmental variables over all sites could be classified into three components, namely, climate, soil moisture and soil bulk density, which accounted for 86% of the seasonal variability. A regression tree approach showed that CO2 flux in each ecosystem was related to different underlying environmental factors. They were relative humidity for forest, soil temperature at 5 cm for sago and water-filled pore space for oil palm. On an annual basis, the soil CO2 flux was highest in the forest ecosystem with an estimated production of 2.1 kg C m-2 yr-1 followed by oil palm at 1.5 kg C m-2 yr-1 and sago at 1.1 kg C m-2 yr-1. The different dominant controlling factors in CO2 flux among the studied ecosystems suggested that land use affected the exchange of CO2 between tropical peatland and the atmosphere.

  9. Cavus Foot Surgery

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  10. Bunionette Deformity Correction

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  11. Shyness in Children

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... then an evaluation by a child mental-health professional would be helpful. Time to adjust Most shy ...

  12. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    DTIC Science & Technology

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  13. Pleasing the Masses: Messages for Daily Life Management in African American Women's Popular Media Sources

    PubMed Central

    Peacock, Nadine

    2011-01-01

    Objectives. Using African American women's insights on their own health experiences, we explored how their daily life management was linked to the “strong Black woman” (SBW) script, and the health implications of that script. Methods. Using the search term “strong Black woman,” we identified 20 articles from African American women's magazines and 10 blog sites linked to the SBW script and analyzed their content. We created thematic categories (role management, coping, and self-care) and extracted issues relevant to African American women's health. Results. Adherence to the SBW script was linked to women's daily life management and health experiences. Themes such as self-sacrificial role management (“please the masses”), emotional suppression (“game face”), and postponement of self-care (“last on the list”) incited internal distress and evinced negative health consequences. Conclusions. Scientists, activists, and health care professionals would be aided in forming initiatives aimed at reducing health disparities among African American women by heeding the insights on their health experiences that they express in popular media sources. PMID:21088274

  14. Percutaneous Achilles Tendon Lengthening

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  15. Where to Donate Blood

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Find ... Correspondence Regulatory and Public Meetings Stop the Bleed Professional Development Education Annual Meeting International Cord Blood Symposium ...

  16. Social.Water--Open Source Citizen Science Software for CrowdHydrology

    NASA Astrophysics Data System (ADS)

    Fienen, M. N.; Lowry, C.

    2013-12-01

    CrowdHydrology is a crowd-sourced citizen science project in which passersby near streams are encouraged to read a gage and send an SMS (text) message with the water level to a number indicated on a sign. The project was initially started using free services such as Google Voice, Gmail, and Google Maps to acquire and present the data on the internet. Social.Water is open-source software, using Python and JavaScript, that automates the acquisition, categorization, and presentation of the data. Open-source objectives pervade both the project and the software as the code is hosted at Github, only free scripting codes are used, and any person or organization can install a gage and join the CrowdHydrology network. In the first year, 10 sites were deployed in upstate New York, USA. In the second year, expansion to 44 sites throughout the upper Midwest USA was achieved. Comparison with official USGS and academic measurements have shown low error rates. Citizen participation varies greatly from site to site, so surveys or other social information is sought for insight into why some sites experience higher rates of participation than others.

  17. Shoes and Orthotics for Diabetics

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... By working with a physician and a footwear professional, such as a certified pedorthist, many patients can ...

  18. How to Tape an Ankle

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  19. Emotional Development: 2 Year Olds

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... probably refer your child to a mental health professional for a consultation. Last Updated 8/1/2009 ...

  20. How to "Read" Your Footprint

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  1. Plantar Fibroma and Plantar Fibromatosis

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  2. Muscle Cramp - A Common Pain

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...

  3. Effects of electrical stimulation of the lateral aspect of the prefrontal cortex upon attack behavior in cats.

    PubMed

    Siegel, A; Edinger, H; Dotto, M

    1975-08-15

    An experiment was performed to determine the role of the lateral aspect of the prefrontal cortex upon quiet biting attack behavior elicited from the hypothalamus in the cat. The results of this experiment indicate that stimulation of 19 of 28 electrode sites sampled in the lateral prefrontal cortex produced a statistically significant inhibition of attack behavior elicited from the hypothalamus of the ipsilateral side. Stimulation of sites in the prefrontal cortex on the side contralateral to the hypothalamus from which attack was elicited had no effect upon this response. No systematic effect of prefrontal stimulation upon flight behavior was observed. Anatomical studies suggest that the lateral prefrontal cortex may inhibit attack behavior by modulating neurons in either the mediodorsal thalamic nucleus or ventral tegmental area.

  4. LK Scripting Language

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The LK scripting language is a simple and fast computer programming language designed for easy integration with existing software to enable automation of tasks. The LK language is used by NREL’s System Advisor Model (SAM), the SAM Software Development Kit (SDK), and SolTrace products. LK is easy extensible and adaptable to new software due to its small footprint and is designed to be statically linked into other software. It is written in standard C++, is cross-platform (Windows, Linux, and OSX), and includes optional portions that enable direct integration with graphical user interfaces written in the open source C++ wxWidgets Versionmore » 3.0+ toolkit.« less

  5. Left-lateralized N170 Effects of Visual Expertise in Reading: Evidence from Japanese Syllabic and Logographic Scripts

    PubMed Central

    Maurer, Urs; Zevin, Jason D.; McCandliss, Bruce D.

    2015-01-01

    The N170 component of the event-related potential (ERP) reflects experience-dependent neural changes in several forms of visual expertise, including expertise for visual words. Readers skilled in writing systems that link characters to phonemes (i.e., alphabetic writing) typically produce a left-lateralized N170 to visual word forms. This study examined the N170 in three Japanese scripts that link characters to larger phonological units. Participants were monolingual English speakers (EL1) and native Japanese speakers (JL1) who were also proficient in English. ERPs were collected using a 129-channel array, as participants performed a series of experiments viewing words or novel control stimuli in a repetition detection task. The N170 was strongly left-lateralized for all three Japanese scripts (including logographic Kanji characters) in JL1 participants, but bilateral in EL1 participants viewing these same stimuli. This demonstrates that left-lateralization of the N170 is dependent on specific reading expertise and is not limited to alphabetic scripts. Additional contrasts within the moraic Katakana script revealed equivalent N170 responses in JL1 speakers for familiar Katakana words and for Kanji words transcribed into novel Katakana words, suggesting that the N170 expertise effect is driven by script familiarity rather than familiarity with particular visual word forms. Finally, for English words and novel symbol string stimuli, both EL1 and JL1 subjects produced equivalent responses for the novel symbols, and more left-lateralized N170 responses for the English words, indicating that such effects are not limited to the first language. Taken together, these cross-linguistic results suggest that similar neural processes underlie visual expertise for print in very different writing systems. PMID:18370600

  6. How to Keep Your Feet Flexible

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  7. How to Assess Your Shoe IQ

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  8. Osteopathic Medicine: What is a DO?

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...

  9. Summer Safety Tips - Staying Safe Outdoors

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... Families should attend community fireworks displays run by professionals rather than using fireworks at home. The AAP ...

  10. Web Helpdesk - PHE

    Science.gov Websites

    You may be trying to access this site from a secured browser on the server. Please enable scripts supports this element, such as Internet Explorer 7.0 or later. Home | Contact Us | Accessibility | Privacy

  11. Integrating Radar Image Data with Google Maps

    NASA Technical Reports Server (NTRS)

    Chapman, Bruce D.; Gibas, Sarah

    2010-01-01

    A public Web site has been developed as a method for displaying the multitude of radar imagery collected by NASA s Airborne Synthetic Aperture Radar (AIRSAR) instrument during its 16-year mission. Utilizing NASA s internal AIRSAR site, the new Web site features more sophisticated visualization tools that enable the general public to have access to these images. The site was originally maintained at NASA on six computers: one that held the Oracle database, two that took care of the software for the interactive map, and three that were for the Web site itself. Several tasks were involved in moving this complicated setup to just one computer. First, the AIRSAR database was migrated from Oracle to MySQL. Then the back-end of the AIRSAR Web site was updated in order to access the MySQL database. To do this, a few of the scripts needed to be modified; specifically three Perl scripts that query that database. The database connections were then updated from Oracle to MySQL, numerous syntax errors were corrected, and a query was implemented that replaced one of the stored Oracle procedures. Lastly, the interactive map was designed, implemented, and tested so that users could easily browse and access the radar imagery through the Google Maps interface.

  12. Terrorism: Online Resources for Helping Students Understand and Cope.

    ERIC Educational Resources Information Center

    Green, Tim; Ramirez, Fred

    2002-01-01

    Presents an annotated bibliography of Web sites that focus on the issue of terrorism. Aims to assist teachers in educating their students and helping them cope with terrorism since the September 11, 2001 attack on the United States. Offers sites on other terrorist attacks on the U.S. (CMK)

  13. Land Application of Wastes: An Educational Program. Monitoring at Land Application Sites - Module 18, Objectives, Script, and Booklet.

    ERIC Educational Resources Information Center

    Clarkson, W. W.; And Others

    This module summarizes four major reasons for employing monitoring during design and operation of a land application site: documentation of existing water quality and system performance, confirmation of design parameters, provision of data for future designs and for management decisions. Monitoring requirements are examined for different land…

  14. Flexible Blades for Wind Turbines

    NASA Astrophysics Data System (ADS)

    Collins, Madeline Carlisle; Macphee, David; Harris, Caleb

    2016-11-01

    Previous research has shown that windmills with flexible blades are more efficient than those with rigid blades. Flexibility offers passive pitch control, preferable to active pitch control which is costly and requires maintenance. Flexible blades morph such that the blade more closely resembles its design point at part load and over load. The lift-to-drag ratios on individual blades was investigated. A mold was designed and machined from an acrylic slab for the casting of blades with a NACA 0012 cross section. A flexible blade was cast from silicone and a rigid blade was cast from polyurethane. Each of these blades was tested in a wind tunnel, cantilever mounted, spanning the whole test section. The angle of attack was varied by rotating the mount. All tests were performed at the same wind speed. A load cell within the mount measured forces on the blade, from which the lift and drag forces were calculated. The stall point for the flexible blade occurred later than for the rigid blade, which agrees with previous research. Lift-to-drag ratios were larger for the flexible blade at all angles of attack tested. Flexible blades seem to be a viable option for passive pitch control. Future research will include different airfoil cross sections, wind speeds, and blade materials. Funding from NSF REU site Grant EEC 1358991 is greatly appreciated.

  15. How to Strengthen Your Ankle After a Sprain

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  16. Sore Throat? Know When To Call the Doctor

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...

  17. How to Stretch Your Ankle After a Sprain

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  18. Understanding Motherhood and Mood - Baby Blues and Beyond

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... requires immediate help. Talk to a Health Care Professional Screening for depression during and after pregnancy should ...

  19. How to Assess Changes in Feet: Normal or Abnormal

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  20. Astronomical databases of Nikolaev Observatory

    NASA Astrophysics Data System (ADS)

    Protsyuk, Y.; Mazhaev, A.

    2008-07-01

    Several astronomical databases were created at Nikolaev Observatory during the last years. The databases are built by using MySQL search engine and PHP scripts. They are available on NAO web-site http://www.mao.nikolaev.ua.

  1. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  2. Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility

    Treesearch

    David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan

    2000-01-01

    Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...

  3. Initial Evaluation: What Kind of Shape Are Your Feet In?

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  4. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  5. Ictal lack of binding to brain parenchyma suggests integrity of the blood-brain barrier for 11C-dihydroergotamine during glyceryl trinitrate-induced migraine.

    PubMed

    Schankin, Christoph J; Maniyar, Farooq H; Seo, Youngho; Kori, Shashidar; Eller, Michael; Chou, Denise E; Blecha, Joseph; Murphy, Stephanie T; Hawkins, Randall A; Sprenger, Till; VanBrocklin, Henry F; Goadsby, Peter J

    2016-07-01

    SEE DREIER DOI 101093/AWW112 FOR A SCIENTIFIC COMMENTARY ON THIS ARTICLE: For many decades a breakdown of the blood-brain barrier has been postulated to occur in migraine. Hypothetically this would facilitate access of medications, such as dihydroergotamine or triptans, to the brain despite physical properties otherwise restricting their entry. We studied the permeability of the blood-brain barrier in six migraineurs and six control subjects at rest and during acute glyceryl trinitrate-induced migraine attacks using positron emission tomography with the novel radioligand (11)C-dihydroergotamine, which is chemically identical to pharmacologically active dihydroergotamine. The influx rate constant Ki, average dynamic image and time activity curve were assessed using arterial blood sampling and served as measures for receptor binding and thus blood-brain barrier penetration. At rest, there was binding of (11)C-dihydroergotamine in the choroid plexus, pituitary gland, and venous sinuses as expected from the pharmacology of dihydroergotamine. However, there was no binding to the brain parenchyma, including the hippocampus, the area with the highest density of the highest-affinity dihydroergotamine receptors, and the raphe nuclei, a postulated brainstem site of action during migraine, suggesting that dihydroergotamine is not able to cross the blood-brain barrier. This binding pattern was identical in migraineurs during glyceryl trinitrate-induced migraine attacks as well as in matched control subjects. We conclude that (11)C-dihydroergotamine is unable to cross the blood-brain barrier interictally or ictally demonstrating that the blood-brain barrier remains tight for dihydroergotamine during acute glyceryl trinitrate-induced migraine attacks. © The Author (2016). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved.

  6. Signal signature and transcriptome changes of Arabidopsis during pathogen and insect attack.

    PubMed

    De Vos, Martin; Van Oosten, Vivian R; Van Poecke, Remco M P; Van Pelt, Johan A; Pozo, Maria J; Mueller, Martin J; Buchala, Antony J; Métraux, Jean-Pierre; Van Loon, L C; Dicke, Marcel; Pieterse, Corné M J

    2005-09-01

    Plant defenses against pathogens and insects are regulated differentially by cross-communicating signaling pathways in which salicylic acid (SA), jasmonic acid (JA), and ethylene (ET) play key roles. To understand how plants integrate pathogen- and insect-induced signals into specific defense responses, we monitored the dynamics of SA, JA, and ET signaling in Arabidopsis after attack by a set of microbial pathogens and herbivorous insects with different modes of attack. Arabidopsis plants were exposed to a pathogenic leaf bacterium (Pseudomonas syringae pv. tomato), a pathogenic leaf fungus (Alternaria brassicicola), tissue-chewing caterpillars (Pieris rapae), cell-content-feeding thrips (Frankliniella occidentalis), or phloem-feeding aphids (Myzus persicae). Monitoring the signal signature in each plant-attacker combination showed that the kinetics of SA, JA, and ET production varies greatly in both quantity and timing. Analysis of global gene expression profiles demonstrated that the signal signature characteristic of each Arabidopsis-attacker combination is orchestrated into a surprisingly complex set of transcriptional alterations in which, in all cases, stress-related genes are overrepresented. Comparison of the transcript profiles revealed that consistent changes induced by pathogens and insects with very different modes of attack can show considerable overlap. Of all consistent changes induced by A. brassicicola, Pieris rapae, and E occidentalis, more than 50% also were induced consistently by P. syringae. Notably, although these four attackers all stimulated JA biosynthesis, the majority of the changes in JA-responsive gene expression were attacker specific. All together, our study shows that SA, JA, and ET play a primary role in the orchestration of the plant's defense response, but other regulatory mechanisms, such as pathway cross-talk or additional attacker-induced signals, eventually shape the highly complex attacker-specific defense response.

  7. Supersonic flow around circular cones at angles of attack

    NASA Technical Reports Server (NTRS)

    Ferri, Antonio

    1951-01-01

    The properties of conical flow without axial symmetry are analyzed. The flow around cones of circular cross section at small angles of attack is determined by correctly considering the effect of the entropy gradients in the flow.

  8. Coupled Ocean/Atmosphere Mesoscale Prediction System (COAMPS), Version 5.0, Revision 2.0 (User’s Guide)

    DTIC Science & Technology

    2012-05-03

    output (I/O) system. The framework provides tools for common modeling functions, as well as regridding, data decomposition, and communication on...Within this script, the user must specify both the site (DSRC or local) and the platform ( DAVINCI , EINSTEIN, or local machine) on which COAMPS is...being run. For example: site=navy_dsrc (for DSRC usage) site=nrlssc (for local NRL-SSC usage) platform= davinci or einstein (for DSRC usage

  9. Coupled Ocean/Atmosphere Mesoscale Prediction System (COAMPS) Version 5.0, Rev. 2.0 (User’s Guide)

    DTIC Science & Technology

    2012-05-03

    output (I/O) system. The framework provides tools for common modeling functions, as well as regridding, data decomposition, and communication on...Within this script, the user must specify both the site (DSRC or local) and the platform ( DAVINCI , EINSTEIN, or local machine) on which COAMPS is...being run. For example: site=navy_dsrc (for DSRC usage) site=nrlssc (for local NRL-SSC usage) platform= davinci or einstein (for DSRC usage

  10. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  11. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 2

    DTIC Science & Technology

    2012-04-01

    attacks is expanding to engulf the compact world of smartphones . by Aditya K. Sood and Richard J. Enbody A Practical Approach to Securing and Managing...provide a vulnerable entry point to our mobile device informa- tion systems. As a result, hackers are able to quickly exploit software on smartphones ...MOBILE WORLD 4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones . This paper

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusionmore » detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device's physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We have included the Python scripts used to perform that monitoring.« less

  13. Confronting the bomber: coping at the site of previous terror attacks.

    PubMed

    Strous, Rael D; Mishaeli, Nurit; Ranen, Yaniv; Benatov, Joy; Green, Dovid; Zivotofsky, Ari Z

    2007-03-01

    Terror exposure has become commonplace in Israel, with civilians needing to develop appropriate coping mechanisms. This study investigated coping mechanisms of those who are able to return to leisure activity at sites of previous terror attacks. A specially designed questionnaire, exploring knowledge of the terror event, previous terror exposure, coping mechanisms, state of anxiety, and mood, was administered to 93 restaurant attendees at sites of well-known recent terror attacks (2001-2005). Most respondents were aware of the previous terror attack (92.3%) and most reported no fear at revisiting (70.3%), with 20.9% reporting some anxiety and 5.5% reporting moderate or severe anxiety. Sixty percent reported that they have no fear that a terror attack will reoccur at the same place. Some (27.7%) reported change in practices or decrease in one or more activity, especially use of public transport (18%). The most helpful reported resource for facilitating stress coping following a suicide bombing was to "call or be in touch with friends or relatives," and least helpful was "medicines." Over half of respondents (53%) reported that the current security climate affected their mood. Older individuals and females were more affected by terror events. Study observations confirm that resilience develops in the general population in response to ongoing terror attacks. Response to terror is heterogeneous with a range of coping mechanisms expressed.

  14. JSXGraph--Dynamic Mathematics with JavaScript

    ERIC Educational Resources Information Center

    Gerhauser, Michael; Valentin, Bianca; Wassermann, Alfred

    2010-01-01

    Since Java applets seem to be on the retreat in web application, other approaches for displaying interactive mathematics in the web browser are needed. One such alternative could be our open-source project JSXGraph. It is a cross-browser library for displaying interactive geometry, function plotting, graphs, and data visualization in a web…

  15. Assessment Relationships in Higher Education: The Tension of Process and Practice

    ERIC Educational Resources Information Center

    Crook, Charles; Gross, Harriet; Dymott, Roy

    2006-01-01

    It is argued that the auditing demands of quality assurance have encouraged a greater proceduralisation of university coursework assessment. Interviews with academics from a cross-section of Psychology departments illustrated how assessment had acquired the tightly scripted character of an organisational process. Yet undergraduate focus group…

  16. Writing System Variation and Its Consequences for Reading and Dyslexia

    ERIC Educational Resources Information Center

    Daniels, Peter T.; Share, David L.

    2018-01-01

    Most current theories of reading and dyslexia derive from a relatively narrow empirical base: research on English and a handful of other European alphabets. Furthermore, the two dominant theoretical frameworks for describing cross-script diversity--orthographic depth and psycholinguistic grain size theory--are also deeply entrenched in Anglophone…

  17. Les Chansons de la Francophonie Web Site and Its Two Web-Usage-Tracking Systems in an Advanced Listening Comprehension Course

    ERIC Educational Resources Information Center

    Weinberg, Alysse

    2005-01-01

    The "Les Chansons de la francophonie" web site is based on French songs and was developed using HTML and JavaScript for the advanced French Comprehension Course at the Second Language Institute of the University of Ottawa. These interactive listening activities include true-false and multiple-choice questions, fill in the blanks,…

  18. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node and trust neighborhood, collecting parametric information and executing assigned decision tasks. The communications overhead due to security mechanisms and the latency in network response are thus minimized by reducing the need to move large amounts of audit data through resource-limited nodes and by locating detection/identification programs closer to audit data. If network partitioning occurs due to uncoordinated node exhaustion, data compromise or other effects of the attacks, the mobile agents can continue to operate, thereby increasing fault tolerance in the network response to intrusions. Since the mobile agents behave like an ant colony in securing the WSN, published ant colony optimization (ACO) routines and other evolutionary algorithms are adapted to protect network security, using data at and through nodes to create audit records to detect and respond to denial-of-service attacks. Performance evaluations of algorithms are performed by simulation of a few intrusion attacks, such as black hole, flooding, Sybil and others, to validate the ability of the cross-layer algorithms to enable WSNs to survive the attacks. Results are compared for the different algorithms.

  19. Pure JavaScript Storyline Layout Algorithm

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    This is a JavaScript library for a storyline layout algorithm. Storylines are adept at communicating complex change by encoding time on the x-axis and using the proximity of lines in the y direction to represent interaction between entities. The library in this disclosure takes as input a list of objects containing an id, time, and state. The output is a data structure that can be used to conveniently render a storyline visualization. Most importantly, the library computes the y-coordinate of the entities over time that decreases layout artifacts including crossings, wiggles, and whitespace. This is accomplished through multi-objective, multi-stage optimizationmore » problem, where the output of one stage produces input and constraints for the next stage.« less

  20. Using Firefly Tools to Enhance Archive Web Pages

    NASA Astrophysics Data System (ADS)

    Roby, W.; Wu, X.; Ly, L.; Goldina, T.

    2013-10-01

    Astronomy web developers are looking for fast and powerful HTML 5/AJAX tools to enhance their web archives. We are exploring ways to make this easier for the developer. How could you have a full FITS visualizer or a Web 2.0 table that supports paging, sorting, and filtering in your web page in 10 minutes? Can it be done without even installing any software or maintaining a server? Firefly is a powerful, configurable system for building web-based user interfaces to access astronomy science archives. It has been in production for the past three years. Recently, we have made some of the advanced components available through very simple JavaScript calls. This allows a web developer, without any significant knowledge of Firefly, to have FITS visualizers, advanced table display, and spectrum plots on their web pages with minimal learning curve. Because we use cross-site JSONP, installing a server is not necessary. Web sites that use these tools can be created in minutes. Firefly was created in IRSA, the NASA/IPAC Infrared Science Archive (http://irsa.ipac.caltech.edu). We are using Firefly to serve many projects including Spitzer, Planck, WISE, PTF, LSST and others.

  1. Open, Cross Platform Chemistry Application Unifying Structure Manipulation, External Tools, Databases and Visualization

    DTIC Science & Technology

    2012-11-27

    with powerful analysis tools and an informatics approach leveraging best-of-breed NoSQL databases, in order to store, search and retrieve relevant...dictionaries, and JavaScript also has good support. The MongoDB project[15] was chosen as a scalable NoSQL data store for the cheminfor- matics components

  2. N170 Tuning in Chinese: Logographic Characters and Phonetic Pinyin Script

    ERIC Educational Resources Information Center

    Qin, Rui; Maurits, Natasha; Maassen, Ben

    2016-01-01

    In alphabetic languages, print consistently elicits enhanced, left-lateralized N170 responses in the event-related potential compared to control stimuli. In the current study, we adopted a cross-linguistic design to investigate N170 tuning to logographic Chinese and to "pinyin," an auxiliary phonetic system in Chinese. The results…

  3. ECommerce: Meeting the Needs of Local Business with Cross-Departmental Education.

    ERIC Educational Resources Information Center

    Sagi, John P.

    This document offers a brief introduction to electronic commerce (known as eCommerce) and explains the challenges and frustrations of developing a course around the topic. ECommerce blends elements of computer science (HTML and JavaScript programming, for example) with traditional business functions, such as marketing, salesmanship, finance and…

  4. OPERATION COBRA. Deliberate Attack, Exploitation

    DTIC Science & Technology

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  5. Non-perturbative effects and wall-crossing from topological strings

    NASA Astrophysics Data System (ADS)

    Collinucci, Andrés; Soler, Pablo; Uranga, Angel M.

    2009-11-01

    We argue that the Gopakumar-Vafa interpretation of the topological string partition function can be used to compute and resum certain non-perturbative brane instanton effects of type II CY compactifications. In particular the topological string A-model encodes the non-perturbative corrections to the hypermultiplet moduli space metric from general D1/D(-1)-brane instantons in 4d Script N = 2 IIB models. We also discuss the reduction to 4d Script N = 1 by fluxes and/or orientifolds and/or D-branes, and the prospects to resum brane instanton contributions to non-perturbative superpotentials. We argue that the connection between non-perturbative effects and the topological string underlies the continuity of non-perturbative effects across lines of BPS stability. We also confirm this statement in mirror B-model matrix model examples, relating matrix model instantons to non-perturbative D-brane instantons. The computation of non-perturbative effects from the topological string requires a 3d circle compactification and T-duality, relating effects from particles and instantons, reminiscent of that involved in the physical derivation of the Kontsevich-Soibelmann wall-crossing formula.

  6. Accounting Data to Web Interface Using PERL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hargeaves, C

    2001-08-13

    This document will explain the process to create a web interface for the accounting information generated by the High Performance Storage Systems (HPSS) accounting report feature. The accounting report contains useful data but it is not easily accessed in a meaningful way. The accounting report is the only way to see summarized storage usage information. The first step is to take the accounting data, make it meaningful and store the modified data in persistent databases. The second step is to generate the various user interfaces, HTML pages, that will be used to access the data. The third step is tomore » transfer all required files to the web server. The web pages pass parameters to Common Gateway Interface (CGI) scripts that generate dynamic web pages and graphs. The end result is a web page with specific information presented in text with or without graphs. The accounting report has a specific format that allows the use of regular expressions to verify if a line is storage data. Each storage data line is stored in a detailed database file with a name that includes the run date. The detailed database is used to create a summarized database file that also uses run date in its name. The summarized database is used to create the group.html web page that includes a list of all storage users. Scripts that query the database folder to build a list of available databases generate two additional web pages. A master script that is run monthly as part of a cron job, after the accounting report has completed, manages all of these individual scripts. All scripts are written in the PERL programming language. Whenever possible data manipulation scripts are written as filters. All scripts are written to be single source, which means they will function properly on both the open and closed networks at LLNL. The master script handles the command line inputs for all scripts, file transfers to the web server and records run information in a log file. The rest of the scripts manipulate the accounting data or use the files created to generate HTML pages. Each script will be described in detail herein. The following is a brief description of HPSS taken directly from an HPSS web site. ''HPSS is a major development project, which began in 1993 as a Cooperative Research and Development Agreement (CRADA) between government and industry. The primary objective of HPSS is to move very large data objects between high performance computers, workstation clusters, and storage libraries at speeds many times faster than is possible with today's software systems. For example, HPSS can manage parallel data transfers from multiple network-connected disk arrays at rates greater than 1 Gbyte per second, making it possible to access high definition digitized video in real time.'' The HPSS accounting report is a canned report whose format is controlled by the HPSS developers.« less

  7. Interdisciplinary Workshop on the Physical-Chemical-Biological Processes Affecting Archeological Sites Held in College Station, Texas on May 27-29, 1987

    DTIC Science & Technology

    1989-01-01

    attack and rodent attack, and 3) fungal/bacterial decay. By far fungal decay, along with anaerobic bacteria, plays the largest role in the break down of...per Taxa of Rodents Recovered from 41 LK 28 Spermopbi- lus Geomys Perognath- Neotorna Sigrmodon Liomys me.,icanus personatus Geomvs s. us-D s59...of rodents recovered from a site in southern Texas, 41 LK 28 (Hellier, Steele and Hunter n.d.). In this example, as is typical at other sites, a

  8. A cross sectional study of the relationship between the exposure of pregnant women to military attacks in 2014 in Gaza and the load of heavy metal contaminants in the hair of mothers and newborns

    PubMed Central

    Manduca, Paola; Diab, Safwat Y; Qouta, Samir R; Albarqouni, Nabil MA; Punamaki, Raiija-Leena

    2017-01-01

    Objective Metal contamination of humans in war areas has rarely been investigated. Weaponry’s heavy metals become environmentally stable war remnants and accumulate in living things. They also pose health risks in terms of prenatal intake, with potential long term risks for reproductive and children’s health. We studied the contribution of military attacks to the load of 23 metals in the hair of Palestinian women in the Gaza Strip, who were pregnant at the time of the military attacks in 2014, and their newborns. We compared the metal load in the mothers with values for adult hair from outside the war area (RHS) as the reference. We investigated heavy metals trans-passing in utero, and assessed if the heavy metal intake could derive from sources unrelated to the war. Design Cross sectional study. Participants and setting Cross sectional convenience sample of 502 mothers delivering in the Gaza Strip and their newborns. Main outcome measured Measure of the load of heavy metals in mother and newborn hair by inductively coupled plasma-mass spectrometry (ICP-MS). Comparison of metal loads with the reference RHS, between groups with different exposures to attacks and house/agriculture chemicals, and between mothers and newborns. Data for birth registry and for exposures to war and other known risk factors were obtained at interview with the mothers. Photographic documentation of damage from military attacks was obtained. Results The whole cross sectional convenience sample had a significantly higher load of heavy metals than the reference RHS. Women exposed to military attacks had a significantly higher load of heavy metals than those not exposed; the load in newborns correlated positively with the mothers’ load. No significant difference was found between users/non-users of house/agriculture chemicals. No other known confounder was identified. Conclusions High heavy metal loads in mothers, reflected in those of their newborns, were associated with exposure to military attacks, posing a risk of immediate and long term negative outcomes for pregnancy and child health. Surveillance, biomonitoring and further research are recommended. Implications for general and public health are discussed. PMID:28768639

  9. A cross sectional study of the relationship between the exposure of pregnant women to military attacks in 2014 in Gaza and the load of heavy metal contaminants in the hair of mothers and newborns.

    PubMed

    Manduca, Paola; Diab, Safwat Y; Qouta, Samir R; Albarqouni, Nabil Ma; Punamaki, Raiija-Leena

    2017-08-02

    Metal contamination of humans in war areas has rarely been investigated. Weaponry's heavy metals become environmentally stable war remnants and accumulate in living things. They also pose health risks in terms of prenatal intake, with potential long term risks for reproductive and children's health. We studied the contribution of military attacks to the load of 23 metals in the hair of Palestinian women in the Gaza Strip, who were pregnant at the time of the military attacks in 2014, and their newborns. We compared the metal load in the mothers with values for adult hair from outside the war area (RHS) as the reference. We investigated heavy metals trans-passing in utero, and assessed if the heavy metal intake could derive from sources unrelated to the war. Cross sectional study. Cross sectional convenience sample of 502 mothers delivering in the Gaza Strip and their newborns. Measure of the load of heavy metals in mother and newborn hair by inductively coupled plasma-mass spectrometry (ICP-MS). Comparison of metal loads with the reference RHS, between groups with different exposures to attacks and house/agriculture chemicals, and between mothers and newborns. Data for birth registry and for exposures to war and other known risk factors were obtained at interview with the mothers. Photographic documentation of damage from military attacks was obtained. The whole cross sectional convenience sample had a significantly higher load of heavy metals than the reference RHS. Women exposed to military attacks had a significantly higher load of heavy metals than those not exposed; the load in newborns correlated positively with the mothers' load. No significant difference was found between users/non-users of house/agriculture chemicals. No other known confounder was identified. High heavy metal loads in mothers, reflected in those of their newborns, were associated with exposure to military attacks, posing a risk of immediate and long term negative outcomes for pregnancy and child health. Surveillance, biomonitoring and further research are recommended. Implications for general and public health are discussed. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. The World Trade Center attack. Observations from New York's Bellevue Hospital.

    PubMed

    Roccaforte, J D

    2001-12-01

    This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics.

  11. Experimental aerodynamics characteristics for bodies of elliptic cross section at angles of attack from 0 deg to 58 deg and Mach numbers from 0.6 to 2.0

    NASA Technical Reports Server (NTRS)

    Jorgensen, L. H.; Nelson, E. R.

    1975-01-01

    An experimental investigation was conducted to measure the static aerodynamic characteristics for two bodies of elliptic cross section and for their equivalent body of revolution. The equivalent body of revolution had the same length and axial distribution of cross-sectional area as the elliptic bodies. It consisted of a tangent ogive nose of fineness ratio 3 followed by a cylinder with a fineness ratio of 7. All bodies were tested at Mach numbers of 0.6, 0.9, 1.2, 1.5, and 2.0 at angles of attack from 0 deg to 58 deg. The data demonstrate that the aerodynamic characteristics can be significantly altered by changing the body cross section from circular to elliptic and by rolling the body from 0 deg to 90 deg. For example, the first elliptic body (with a constant cross-sectional axis ratio of 2) developed at zero roll about twice the normal force developed by the equivalent body of revolution. At some angles of attack greater than about 25 deg, side forces and yawing moments were measured in spite of the fact that the bodies were tested at zero angle of sideslip. The side-force and yawing-moment coefficients decreased with an increase in Mach number and essentially disappeared for all the bodies at Mach numbers greater than 1.2. From the standpoint of reducing undesirable side forces at high angles of attack, it is best to have the flattest side of the nose of the elliptic bodies pitching against the stream crossflow. The effect of Reynolds number was also the least significant for both elliptic bodies when the flattest side of the nose was pitched against the stream crossflow.

  12. Online clinical reasoning assessment with the Script Concordance test: a feasibility study

    PubMed Central

    Sibert, Louis; Darmoni, Stefan J; Dahamna, Badisse; Weber, Jacques; Charlin, Bernard

    2005-01-01

    Background The script concordance (SC) test is an assessment tool that measures capacity to solve ill-defined problems, that is, reasoning in context of uncertainty. This tool has been used up to now mainly in medicine. The purpose of this pilot study is to assess the feasibility of the test delivered on the Web to French urologists. Methods The principle of SC test construction and the development of the Web site are described. A secure Web site was created with two sequential modules: (a) The first one for the reference panel (n = 26) with two sub-tasks: to validate the content of the test and to elaborate the scoring system; (b) The second for candidates with different levels of experience in Urology: Board certified urologists, residents, medical students (5 or 6th year). Minimum expected number of participants is 150 for urologists, 100 for residents and 50 for medical students. Each candidate is provided with an individual access code to this Web site. He/she may complete the Script Concordance test several times during his/her curriculum. Results The Web site has been operational since April 2004. The reference panel validated the test in June of the same year during the annual seminar of the French Society of Urology. The Web site is available for the candidates since September 2004. In six months, 80% of the target figure for the urologists, 68% of the target figure for the residents and 20% of the target figure for the student passed the test online. During these six months, no technical problem was encountered. Conclusion The feasibility of the web-based SC test is successful as two-thirds of the expected number of participants was included within six months. Psychometric properties (validity, reliability) of the test will be evaluated on a large scale (N = 300). If positive, educational impact of this assessment tool will be useful to help urologists during their curriculum for the acquisition of clinical reasoning skills, which is crucial for professional competence. PMID:15967034

  13. Sexual scripts and sexual risk behaviors among Black heterosexual men: development of the Sexual Scripts Scale.

    PubMed

    Bowleg, Lisa; Burkholder, Gary J; Noar, Seth M; Teti, Michelle; Malebranche, David J; Tschann, Jeanne M

    2015-04-01

    Sexual scripts are widely shared gender and culture-specific guides for sexual behavior with important implications for HIV prevention. Although several qualitative studies document how sexual scripts may influence sexual risk behaviors, quantitative investigations of sexual scripts in the context of sexual risk are rare. This mixed methods study involved the qualitative development and quantitative testing of the Sexual Scripts Scale (SSS). Study 1 included qualitative semi-structured interviews with 30 Black heterosexual men about sexual experiences with main and casual sex partners to develop the SSS. Study 2 included a quantitative test of the SSS with 526 predominantly low-income Black heterosexual men. A factor analysis of the SSS resulted in a 34-item, seven-factor solution that explained 68% of the variance. The subscales and coefficient alphas were: Romantic Intimacy Scripts (α = .86), Condom Scripts (α = .82), Alcohol Scripts (α = .83), Sexual Initiation Scripts (α = .79), Media Sexual Socialization Scripts (α = .84), Marijuana Scripts (α = .85), and Sexual Experimentation Scripts (α = .84). Among men who reported a main partner (n = 401), higher Alcohol Scripts, Media Sexual Socialization Scripts, and Marijuana Scripts scores, and lower Condom Scripts scores were related to more sexual risk behavior. Among men who reported at least one casual partner (n = 238), higher Romantic Intimacy Scripts, Sexual Initiation Scripts, and Media Sexual Socialization Scripts, and lower Condom Scripts scores were related to higher sexual risk. The SSS may have considerable utility for future research on Black heterosexual men's HIV risk.

  14. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  15. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  16. 76 FR 26729 - Ceridian Corporation; Analysis of Proposed Consent Order to Aid Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... result of these failures, hackers executed an SQL injection attack on the Powerpay Web site and Web application. Through this attack, the hackers found personal information stored in Powerpay on Ceridian's...

  17. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  18. Talking about human papillomavirus and cancer: protocol for a patient-centred study to develop scripted consultations

    PubMed Central

    Hendry, Maggie; Pasterfield, Di; Adams, Richard; Evans, Mererid; Fiander, Alison; Robling, Michael; Campbell, Christine; Makin, Matthew; Gollins, Simon; Hiscock, Julia; Nafees, Sadia; Bekkers, Marie-Jet; Rose, Jan; Williams, Olwen; Stanley, Margaret; Wilkinson, Clare

    2016-01-01

    Introduction Persistent infection with sexually transmitted, high-risk human papillomavirus (HPV) types is the cause of all cervical cancers and some anogenital and oropharyngeal cancers. HPV is an extremely common asymptomatic infection but little known and poorly understood by the public. Patients with HPV-related cancers have new and challenging information needs due to the complex natural history of HPV and the stigma of sexual transmission. They may ask questions that are outside the remit of the traditional cancer consultation, and there is a lack of guidance on how to counsel them. This study aims to fulfil that need by developing and testing cancer site-specific scripted consultations. Methods and analysis A synthesis of findings generated from previous work, a systematic review of information-based interventions for patients with HPV-related cancers, and interviews with cancer clinicians will provide the evidence base underpinning provisional messages. These will be explored in three phases of face-to-face interviews with 75–90 purposively selected patients recruited in cancer clinics to: (1) select and prioritise the most salient messages, (2) phrase the messages appropriately in plain English and, (3) test their acceptability and usefulness. Phases 1 and 2 will draw on card-sorting methods used in website design. In phase three, we will create cancer site-specific versions of the script and test them using cognitive interviewing techniques. Ethics and dissemination The study has received ethical approval. Findings will be published in a peer-reviewed journal. The final product will be cancer-specific scripted consultations, most likely in the form of a two-sided information sheet with the most important messages to be conveyed in a consultation on one side, and frequently asked questions for later reading on the reverse. However, they will also be appropriate and readily adaptable to web-based uses. PMID:27113240

  19. Visualization of protein sequence features using JavaScript and SVG with pViz.js.

    PubMed

    Mukhyala, Kiran; Masselot, Alexandre

    2014-12-01

    pViz.js is a visualization library for displaying protein sequence features in a Web browser. By simply providing a sequence and the locations of its features, this lightweight, yet versatile, JavaScript library renders an interactive view of the protein features. Interactive exploration of protein sequence features over the Web is a common need in Bioinformatics. Although many Web sites have developed viewers to display these features, their implementations are usually focused on data from a specific source or use case. Some of these viewers can be adapted to fit other use cases but are not designed to be reusable. pViz makes it easy to display features as boxes aligned to a protein sequence with zooming functionality but also includes predefined renderings for secondary structure and post-translational modifications. The library is designed to further customize this view. We demonstrate such applications of pViz using two examples: a proteomic data visualization tool with an embedded viewer for displaying features on protein structure, and a tool to visualize the results of the variant_effect_predictor tool from Ensembl. pViz.js is a JavaScript library, available on github at https://github.com/Genentech/pviz. This site includes examples and functional applications, installation instructions and usage documentation. A Readme file, which explains how to use pViz with examples, is available as Supplementary Material A. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  20. Sexual Scripts and Sexual Risk Behaviors among Black Heterosexual Men: Development of the Sexual Scripts Scale

    PubMed Central

    Bowleg, Lisa; Burkholder, Gary J.; Noar, Seth M.; Teti, Michelle; Malebranche, David J.; Tschann, Jeanne M.

    2014-01-01

    Sexual scripts are widely shared gender and culture-specific guides for sexual behavior with important implications for HIV prevention. Although several qualitative studies document how sexual scripts may influence sexual risk behaviors, quantitative investigations of sexual scripts in the context of sexual risk are rare. This mixed methods study involved the qualitative development and quantitative testing of the Sexual Scripts Scale (SSS). Study 1 included qualitative semi-structured interviews with 30 Black heterosexual men about sexual experiences with main and casual sex partners to develop the SSS. Study 2 included a quantitative test of the SSS with 526 predominantly low-income Black heterosexual men. A factor analysis of the SSS resulted in a 34-item, seven-factor solution that explained 68% of the variance. The subscales and coefficient alphas were: Romantic Intimacy Scripts (α = .86), Condom Scripts (α = .82), Alcohol Scripts (α = .83), Sexual Initiation Scripts (α = .79), Media Sexual Socialization Scripts (α = .84), Marijuana Scripts (α = .85), and Sexual Experimentation Scripts (α = .84). Among men who reported a main partner (n = 401), higher Alcohol Scripts, Media Sexual Socialization Scripts, and Marijuana Scripts scores, and lower Condom Scripts scores were related to more sexual risk behavior. Among men who reported at least one casual partner (n = 238), higher Romantic Intimacy Scripts, Sexual Initiation Scripts, and Media Sexual Socialization Scripts, and lower Condom Scripts scores were related to higher sexual risk. The SSS may have considerable utility for future research on Black heterosexual men’s HIV risk. PMID:24311105

  1. A test of high-dose verbenone for stand-level protection of lodgepole and whitebark pine from mountain pine beetle (Coleoptera: Curculionidae: Scolytinae) attacks

    Treesearch

    B. J. Bentz; S. Kegley; K. Gibson; R. Their

    2005-01-01

    The effcacy of verbenone as a stand-level protectant against mountain pine beetle, Dendroctonus ponderosae Hopkins, attacks was tested in lodgepole and whitebark pine stands at five geographically separated sites, including three consecutive years at one site. Forty and 20 high-dose pouches, with a verbenone emission rate up to 50 mg/d per pouch, were spaced in a grid...

  2. Competence in Coping with Stress in Adolescents from Three Regions of the World

    ERIC Educational Resources Information Center

    Persike, Malte; Seiffge-Krenke, Inge

    2012-01-01

    The ways adolescents develop and use strategies to cope with stress vary according to cultural scripts and values. This cross-sectional study tested the impact of region and gender on adolescents' stress perceptions and coping styles. A total sample of 10,941 adolescents (51.3% female) from 20 countries completed questionnaires on stress and…

  3. Cross-species transferability and mapping of genomic and cDNA SSRs in pines

    Treesearch

    D. Chagne; P. Chaumeil; A. Ramboer; C. Collada; A. Guevara; M. T. Cervera; G. G. Vendramin; V. Garcia; J-M. Frigerio; Craig Echt; T. Richardson; Christophe Plomion

    2004-01-01

    Two unigene datasets of Pinus taeda and Pinus pinaster were screened to detect di-, tri and tetranucleotide repeated motifs using the SSRIT script. A total of 419 simple sequence repeats (SSRs) were identified, from which only 12.8% overlapped between the two sets. The position of the SSRs within the coding sequence were predicted...

  4. The Cross-Script Length Effect: Further Evidence Challenging PDP Models of Reading Aloud

    ERIC Educational Resources Information Center

    Rastle, Kathleen; Havelka, Jelena; Wydell, Taeko N.; Coltheart, Max; Besner, Derek

    2009-01-01

    The interaction between length and lexical status is one of the key findings used in support of models of reading aloud that postulate a serial process in the orthography-to-phonology translation (B. S. Weekes, 1997). However, proponents of parallel models argue that this effect arises in peripheral visual or articulatory processes. The authors…

  5. The World Trade Center Attack: Observations from New York's Bellevue Hospital

    PubMed Central

    Roccaforte, J David

    2001-01-01

    This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics. PMID:11737913

  6. Controlling sulfate attack in Mississippi Department of Transportation structures

    DOT National Transportation Integrated Search

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with sp...

  7. Controlling sulfate attack in Mississippi Department of Transportation structures.

    DOT National Transportation Integrated Search

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with specif...

  8. Why Does Mptcp Have To Make Things So Complicated : Cross Path Nids Evasion And Countermeasures

    DTIC Science & Technology

    2016-09-01

    previously only establish communication channels over single network paths to communicate over multiple network paths. MPTCP is an enhancement toTCP that...the attacker would fail to create a Command and Control (C2) channel unless the attacker had created a new mapping to the target on the splicing...machine. This would allow the attacker to conduct C2 over a spliced channel . This may even make the attacker’s C2 more evasive. In fact, the effect

  9. --No Title--

    Science.gov Websites

    You may be trying to access this site from a secured browser on the server. Please enable scripts and utilizing to make their lives easier and access to information literally at their fingertips. To make information readily available, U. S. Fleet Forces developed mobile applications to provide the

  10. Fermilab Science Education Office

    Science.gov Websites

    on the Education Server about Science Education, but turn on JavaScript to enable all this site's - About - FAQ - Fermilab Friends - Fermilab Home Fermilab Office of Education & Public Outreach @fnal.gov Lederman Science Education Center Fermilab MS 777 Box 500 Batavia, IL 60510 (630) 840-8258 * fax

  11. Writing (ONLINE) Space: Composing Webware in Perl.

    ERIC Educational Resources Information Center

    Hartley, Cecilia; Schendel, Ellen; Neal, Michael R.

    1999-01-01

    Points to scholarship that helped the authors think about the ideologies behind Writing Spaces, a Web-based site for computer-mediated communication that they constructed using Perl scripts. Argues that writing teachers can and should shape online spaces to facilitate their individual pedagogies rather than allowing commercial software to limit…

  12. Adolescents' sexual scripts: schematic representations of consensual and nonconsensual heterosexual interactions.

    PubMed

    Krahé, Barbara; Bieneck, Steffen; Scheinberger-Olwig, Renate

    2007-11-01

    The characteristic features of adolescents' sexual scripts were explored in 400 tenth and eleventh graders from Berlin, Germany. Participants rated the prototypical elements of three scripts for heterosexual interactions: (1) the prototypical script for the first consensual sexual intercourse with a new partner as pertaining to adolescents in general (general script); (2) the prototypical script for the first consensual sexual intercourse with a new partner as pertaining to themselves personally (individual script); and (3) the script for a nonconsensual sexual intercourse (rape script). Compared with the general script for the age group as a whole, the individual script contained fewer risk elements related to sexual aggression and portrayed more positive consequences of the sexual interaction. Few gender differences were found, and coital experience did not affect sexual scripts. The rape script was found to be close to the "real rape stereotype." The findings are discussed with respect to the role of sexual scripts as guidelines for behavior, particularly in terms of their significance for the prediction of sexual aggression.

  13. Time-Tag Generation Script

    NASA Technical Reports Server (NTRS)

    Jackson, Dan E.

    2010-01-01

    Time-Tag Generation Script (TTaGS) is an application program, written in the AWK scripting language, for generating commands for aiming one Ku-band antenna and two S-band antennas for communicating with spacecraft. TTaGS saves between 2 and 4 person-hours per every 24 hours by automating the repetitious process of building between 150 and 180 antenna-control commands. TTaGS reads a text database of communication satellite schedules and a text database of satellite rise and set times and cross-references items in the two databases. It then compares the scheduled start and stop with the geometric rise and set to compute the times to execute antenna control commands. While so doing, TTaGS determines whether to generate commands for guidance, navigation, and control computers to tell them which satellites to track. To help prevent Ku-band irradiation of the Earth, TTaGS accepts input from the user about horizon tolerance and accordingly restricts activation and effects deactivation of the transmitter. TTaGS can be modified easily to enable tracking of additional satellites and for such other tasks as reading Sun-rise/set tables to generate commands to point the solar photovoltaic arrays of the International Space Station at the Sun.

  14. From culture to symptom: Testing a structural model of "Chinese somatization".

    PubMed

    Zhou, Xiaolu; Peng, Yunshi; Zhu, Xiongzhao; Yao, Shuqiao; Dere, Jessica; Chentsova-Dutton, Yulia E; Ryder, Andrew G

    2016-02-01

    "Chinese somatization" has been frequently discussed over the past three decades of cultural psychiatry, and has more recently been demonstrated in cross-national comparisons. Empirical studies of potential explanations are lacking, however. Ryder and Chentsova-Dutton (2012) proposed that Chinese somatization can be understood as a cultural script for depression, noting that the literature is divided on whether this script primarily involves felt bodily experience or a stigma-avoiding communication strategy. Two samples from Hunan province, China-one of undergraduate students (n = 213) and one of depressed psychiatric outpatients (n = 281)-completed the same set of self-report questionnaires, including a somatization questionnaire developed in Chinese. Confirmatory factor analysis demonstrated that Chinese somatization could be understood as two correlated factors: one focusing on the experience and expression of distress, the other on its conceptualization and communication. Structural equation modeling demonstrated that traditional Chinese cultural values are associated with both of these factors, but only bodily experience is associated with somatic depressive symptoms. This study takes a first step towards directly evaluating explanations for Chinese somatization, pointing the way to future multimethod investigations of this cultural script. © The Author(s) 2015.

  15. R Script Approach to Infer Toxoplasma Infection Mechanisms From Microarrays and Domain-Domain Protein Interactions

    PubMed Central

    Arenas, Ailan F; Salcedo, Gladys E; Gomez-Marin, Jorge E

    2017-01-01

    Pathogen-host protein-protein interaction systems examine the interactions between the protein repertoires of 2 distinct organisms. Some of these pathogen proteins interact with the host protein system and may manipulate it for their own advantages. In this work, we designed an R script by concatenating 2 functions called rowDM and rowCVmed to infer pathogen-host interaction using previously reported microarray data, including host gene enrichment analysis and the crossing of interspecific domain-domain interactions. We applied this script to the Toxoplasma-host system to describe pathogen survival mechanisms from human, mouse, and Toxoplasma Gene Expression Omnibus series. Our outcomes exhibited similar results with previously reported microarray analyses, but we found other important proteins that could contribute to toxoplasma pathogenesis. We observed that Toxoplasma ROP38 is the most differentially expressed protein among toxoplasma strains. Enrichment analysis and KEGG mapping indicated that the human retinal genes most affected by Toxoplasma infections are those related to antiapoptotic mechanisms. We suggest that proteins PIK3R1, PRKCA, PRKCG, PRKCB, HRAS, and c-JUN could be the possible substrates for differentially expressed Toxoplasma kinase ROP38. Likewise, we propose that Toxoplasma causes overexpression of apoptotic suppression human genes. PMID:29317802

  16. Surface pressure data on a series of conical forebodies at Mach numbers from 1.70 to 4.50 and combined angles of attack and sideslip

    NASA Technical Reports Server (NTRS)

    Townsend, J. C.; Collins, I. K.; Howell, D. T.; Hayes, C.

    1979-01-01

    Tabulated surface pressure data for a series of forebodies which have analytically defined cross sections and are based on a 20 degs half-angle cone are presented without analysis. Five of the cross sections were ellipses having axis ratios of 3/1, 2/1, 1/1, 1/2, and 1/3. The sixth cross section was defined by a curve having a single lobe. The data generally cover angles of attack from -5 degs to 20 degs at angles of sideslip from 0 degs to 5 degs for Mach numbers of 1.70, 2.50, 3.95, and 4.50 at a constant Reynolds number.

  17. NASA Involvement in National Priority Support for Disasters

    NASA Technical Reports Server (NTRS)

    McGregor, Lloyd

    2002-01-01

    This viewgraph presentation provides an overview of the role NASA remote sensing played in planning recovery operations in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. The presentation includes AVIRIS and satellite imagery of the attack sites, and photographs taken on the ground after the attacks. One page of the presentation addresses NASA's role in disaster management of the 2002 Winter Olympics.

  18. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment whichmore » are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.« less

  19. Web Application Design Using Server-Side JavaScript

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hampton, J.; Simons, R.

    1999-02-01

    This document describes the application design philosophy for the Comprehensive Nuclear Test Ban Treaty Research & Development Web Site. This design incorporates object-oriented techniques to produce a flexible and maintainable system of applications that support the web site. These techniques will be discussed at length along with the issues they address. The overall structure of the applications and their relationships with one another will also be described. The current problems and future design changes will be discussed as well.

  20. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  1. Coordination analysis of players' distribution in football using cross-correlation and vector coding techniques.

    PubMed

    Moura, Felipe Arruda; van Emmerik, Richard E A; Santana, Juliana Exel; Martins, Luiz Eduardo Barreto; Barros, Ricardo Machado Leite de; Cunha, Sergio Augusto

    2016-12-01

    The purpose of this study was to investigate the coordination between teams spread during football matches using cross-correlation and vector coding techniques. Using a video-based tracking system, we obtained the trajectories of 257 players during 10 matches. Team spread was calculated as functions of time. For a general coordination description, we calculated the cross-correlation between the signals. Vector coding was used to identify the coordination patterns between teams during offensive sequences that ended in shots on goal or defensive tackles. Cross-correlation showed that opponent teams have a tendency to present in-phase coordination, with a short time lag. During offensive sequences, vector coding results showed that, although in-phase coordination dominated, other patterns were observed. We verified that during the early stages, offensive sequences ending in shots on goal present greater anti-phase and attacking team phase periods, compared to sequences ending in tackles. Results suggest that the attacking team may seek to present a contrary behaviour of its opponent (or may lead the adversary behaviour) in the beginning of the attacking play, regarding to the distribution strategy, to increase the chances of a shot on goal. The techniques allowed detecting the coordination patterns between teams, providing additional information about football dynamics and players' interaction.

  2. Comparing Two Examination Results Using Means of Sample Means and Control Charts

    ERIC Educational Resources Information Center

    Alabi-Labaika, A. Bisi; Ahani, E.

    2015-01-01

    Some examination candidates submit their scripts first, sometimes, for recognition as being brilliant, and some do for not knowing what to write. However, some equally submit last because they want to dot i's and cross t's. The objective of this research is to compare the results of both the earliest and latest submissions with the aim of finding…

  3. Bringing Control System User Interfaces to the Web

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Xihui; Kasemir, Kay

    With the evolution of web based technologies, especially HTML5 [1], it becomes possible to create web-based control system user interfaces (UI) that are cross-browser and cross-device compatible. This article describes two technologies that facilitate this goal. The first one is the WebOPI [2], which can seamlessly display CSS BOY [3] Operator Interfaces (OPI) in web browsers without modification to the original OPI file. The WebOPI leverages the powerful graphical editing capabilities of BOY and provides the convenience of re-using existing OPI files. On the other hand, it uses generic JavaScript and a generic communication mechanism between the web browser andmore » web server. It is not optimized for a control system, which results in unnecessary network traffic and resource usage. Our second technology is the WebSocket-based Process Data Access (WebPDA) [4]. It is a protocol that provides efficient control system data communication using WebSocket [5], so that users can create web-based control system UIs using standard web page technologies such as HTML, CSS and JavaScript. WebPDA is control system independent, potentially supporting any type of control system.« less

  4. Identification of Barramundi (Lates calcarifer) DC-SCRIPT, a Specific Molecular Marker for Dendritic Cells in Fish

    PubMed Central

    Zoccola, Emmanuelle; Delamare-Deboutteville, Jérôme; Barnes, Andrew C.

    2015-01-01

    Antigen presentation is a critical step bridging innate immune recognition and specific immune memory. In mammals, the process is orchestrated by dendritic cells (DCs) in the lymphatic system, which initiate clonal proliferation of antigen-specific lymphocytes. However, fish lack a classical lymphatic system and there are currently no cellular markers for DCs in fish, thus antigen-presentation in fish is poorly understood. Recently, antigen-presenting cells similar in structure and function to mammalian DCs were identified in various fish, including rainbow trout (Oncorhynchus mykiss) and zebrafish (Danio rerio). The present study aimed to identify a potential molecular marker for DCs in fish and therefore targeted DC-SCRIPT, a well-conserved zinc finger protein that is preferentially expressed in all sub-types of human DCs. Putative dendritic cells were obtained in culture by maturation of spleen and pronephros-derived monocytes. DC-SCRIPT was identified in barramundi by homology using RACE PCR and genome walking. Specific expression of DC-SCRIPT was detected in barramundi cells by Stellaris mRNA FISH, in combination with MHCII expression when exposed to bacterial derived peptidoglycan, suggesting the presence of DCs in L. calcarifer. Moreover, morphological identification was achieved by light microscopy of cytospins prepared from these cultures. The cultured cells were morphologically similar to mammalian and trout DCs. Migration assays determined that these cells have the ability to move towards pathogens and pathogen associated molecular patterns, with a preference for peptidoglycans over lipopolysaccharides. The cells were also strongly phagocytic, engulfing bacteria and rapidly breaking them down. Barramundi DCs induced significant proliferation of responder populations of T-lymphocytes, supporting their role as antigen presenting cells. DC-SCRIPT expression in head kidney was higher 6 and 24 h following intraperitoneal challenge with peptidoglycan and lipopolysaccharide and declined after 3 days relative to PBS-injected controls. Relative expression was also lower in the spleen at 3 days post challenge but increased again at 7 days. As DC-SCRIPT is a constitutively expressed nuclear receptor, independent of immune activation, this may indicate initial migration of immature DCs from head kidney and spleen to the injection site, followed by return to the spleen for maturation and antigen presentation. DC-SCRIPT may be a valuable tool in the investigation of antigen presentation in fish and facilitate optimisation of vaccines and adjuvants for aquaculture. PMID:26173015

  5. Neural pathways from thalamus associated with regulation of aggressive behavior.

    PubMed

    Bandler, R J; Flynn, J P

    1974-01-11

    Small electrolytic lesions were made through electrodes in the thalamus of cats at sites where electrical stimulation elicited attack on a rat. Staining by modified Nauta reduced silver methods revealed that significant degeneration passed caudally from the lesions and entered the midbrain dorsal central gray region. Electrical stimulation of this dorsal midbrain region elicited attack on a rat, and destruction of this region suppressed the attack elicited by thalamic stimulation.

  6. Surface pressure data on a series of analytic forebodies at Mach numbers from 1.70 to 4.50 and combined angles of attack and sideslip. [Langley Unitary Plan wind tunnel

    NASA Technical Reports Server (NTRS)

    Townsend, J. C.; Howell, D. T.; Collins, I. K.; Hayes, C.

    1979-01-01

    Tabulated surface pressure data for a series of four forebodies which have analytically defined cross sections and which are based on a parabolic arc profile having a 20 deg half angle at the nose are presented without analysis. The first forebody has a circular cross section, and the second has a cross section which is an ellipse with an axis ratio of 2/1. The third has a cross section defined by a lobed analytic curve. The fourth forebody has cross sections which develop smoothly from circular at the pointed nose through the lobed analytic curve and back to circular at the aft end. The data generally cover angles of attack from -5 deg to 20 deg at angles of sideslip from 0 deg to 5 deg for Mach numbers of 1.70, 2.50, 3.95, and 4.50 at a constant Reynolds number.

  7. Testing simple deceptive honeypot tools

    NASA Astrophysics Data System (ADS)

    Yahyaoui, Aymen; Rowe, Neil C.

    2015-05-01

    Deception can be a useful defensive technique against cyber-attacks; it has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. This work tested the effectiveness of two free honeypot tools in real networks by varying their location and virtualization, and the effects of adding more deception to them. We tested a Web honeypot tool, Glastopf and an SSH honeypot tool Kippo. We deployed the Web honeypot in both a residential network and our organization's network and as both real and virtual machines; the organization honeypot attracted more attackers starting in the third week. Results also showed that the virtual honeypots received attacks from more unique IP addresses. They also showed that adding deception to the Web honeypot, in the form of additional linked Web pages and interactive features, generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate Web-site www.cmand.org. The traffic distributions for the Web honeypot and the legitimate Web site showed similarities (with much malicious traffic from Brazil), but the SSH honeypot was different (with much malicious traffic from China). Contrary to previous experiments where traffic to static honeypots decreased quickly, our honeypots received increasing traffic over a period of three months. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods, and that additional deception is helpful.

  8. Descriptive study of damage caused by the rhinoceros beetle, Oryctes agamemnon, and its influence on date palm oases of Rjim Maatoug, Tunisia.

    PubMed

    Soltani, Rasmi; Lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees.

  9. 30 CFR 784.16 - Reclamation plan: Siltation structures, impoundments, and refuse piles.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Resources Conservation Service's Web site athttp://www.info.usda.gov/scripts/lpsiis.dll/TR/TR_210_60.htm... State program approval process engineering design standards that ensure stability comparable to a 1.3 minimum static safety factor in lieu of engineering tests to establish compliance with the minimum static...

  10. 30 CFR 780.25 - Reclamation plan: Siltation structures, impoundments, and refuse piles.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Resources Conservation Service's Web site at http://www.info.usda.gov/scripts/lpsiis.dll/TR/TR_210_60.htm... authority may establish through the State program approval process, engineering design standards that ensure stability comparable to a 1.3 minimum static safety factor in lieu of engineering tests to establish...

  11. Science Education at Fermilab Program Search

    Science.gov Websites

    JavaScript is Turned Off or Not Supported in Your Browser. To search for programs go to the Non -Javascript Search or turn on Javascript and reload this page. Programs | Science Adventures | Calendar | Undergraduates Fermilab Ed Site Search Google Custom Search Programs: Introducing You to the World of Science

  12. Open Technologies at Athabasca University's Geospace Observatories

    NASA Astrophysics Data System (ADS)

    Connors, M. G.; Schofield, I. S.

    2012-12-01

    Athabasca University Geophysical Observatories feature two auroral observation sites situated in the subauroral zone of western Canada, separated by approximately 25 km. These sites are both on high-speed internet and ideal for observing phenomena detectable from this latitude, which include noctilucent clouds, meteors, and magnetic and optical aspects of the aurora. General aspects of use of Linux in observatory management are described, with emphasis on recent imaging projects involving control of high resolution digital SLR cameras at low cadence, and inexpensive white light analog video cameras at 30 Hz. Linux shell scripts are extensively used, with image capture controlled by gphoto2, the ivtv-utils package, x264 video coding library, and ffmpeg. Imagemagick allows processing of images in an automated fashion. Image archives and movies are created and can be correlated with magnetic data. Much of the magnetic data stream also uses GMT (Generic Mapping Tools) within shell scripts for display. Additionally, SPASE metadata are generated for most of the magnetic data, thus allowing users of our AUTUMN magnetic data repository to perform SPASE queries on the dataset. Visualization products from our twin observatories will be presented.

  13. Component build-up method for engineering analysis of missiles at low-to-high angles of attack

    NASA Technical Reports Server (NTRS)

    Hemsch, Michael J.

    1992-01-01

    Methods are presented for estimating the component build-up terms, with the exception of zero-lift drag, for missile airframes in steady flow and at arbitrary angles of attack and bank. The underlying and unifying bases of all these efforts are slender-body theory and its nonlinear extensions through the equivalent angle-of-attack concept. Emphasis is placed on the forces and moments which act on each of the fins, so that control cross-coupling effects as well as longitudinal and lateral-directional effects can be determined.

  14. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  15. Secondary stroke prevention services in Canada: a cross-sectional survey and geospatial analysis of resources, capacity and geographic access

    PubMed Central

    Jewett, Lauren; Harroud, Adil; Hill, Michael D.; Côté, Robert; Wein, Theodore; Smith, Eric E.; Gubitz, Gord; Demchuk, Andrew M.; Sahlas, Demetrios J.; Gladstone, David J.; Lindsay, M. Patrice

    2018-01-01

    Background: Rapid assessment and management of transient ischemic attacks and nondisabling strokes by specialized stroke prevention services reduces the risk of recurrent stroke and improves outcomes. In Canada, with its vast geography and with 16.8% of the population living in rural areas, access to these services is challenging, and considerable variation in access to care exists. The purpose of this multiphase study was to identify sites across Canada providing stroke prevention services, evaluate resource capacity and determine geographic access for Canadians. Methods: We developed a Stroke Prevention Services Resource Inventory that contained 22 questions on the organization and delivery of stroke prevention services and quality monitoring. The inventory ran from November 2015 to January 2016 and was administered online. We conducted a geospatial analysis to estimate access by drive times. Considerations were made for hours of operation and access within and across provincial borders. Results: A total of 123 stroke prevention sites were identified, of which 119 (96.7%) completed the inventory. Most (95) are designated stroke prevention or rapid assessment clinics. Of the 119 sites, 68 operate full time, and 39 operate less than 2.5 days per week. A total of 87.3% of the Canadian population has access to a stroke prevention service within a 1-hour drive; however, only 69.2% has access to a service that operates 5-7 days a week. Allowing provincial border crossing improves access (< 6-h drive) for those who are beyond a 6-hour drive within their home province (3.4%). Interpretation: Most Canadians have reasonable geographic access to stroke prevention services. Allowing patients to cross borders improves the existing access for many, particularly some remote communities along the Ontario-Quebec and British Columbia-Alberta borders. PMID:29472251

  16. Extending a structural model of somatization to South Koreans: Cultural values, somatization tendency, and the presentation of depressive symptoms.

    PubMed

    Zhou, Xiaolu; Min, Seongho; Sun, Jiahong; Kim, Se Joo; Ahn, Joung-Sook; Peng, Yunshi; Noh, Samuel; Ryder, Andrew G

    2015-05-01

    Somatization refers to the tendency to emphasize somatic symptoms when experiencing a psychiatric disturbance. This tendency has been widely reported in patients from East Asian cultural contexts suffering from depression. Recent research in two Chinese samples have demonstrated that the local cultural script for depression, involving two aspects-the experience and expression of distress (EED) and conceptualization and communication of distress (CCD)-can be evoked to help explain somatization. Given the beliefs and practices broadly shared across Chinese and South Korean cultural contexts, the current study seeks to replicate this explanatory model in South Koreans. Our sample included 209 psychiatric outpatients from Seoul and Wonju, South Korea. Self-report questionnaires were used to assess somatization tendency, adherence to traditional values, and psychological and somatic symptoms of depression. Results from SEM showed that the EED and CCD factors of somatization tendency were differently associated with cultural values and somatic symptoms, replicating our previous findings in Chinese outpatients. The reliance on a brief self-report measure of somatization tendency, not originally designed to assess separate EED and CCD factors, highlights the need for measurement tools for the assessment of cultural scripts in cross-cultural depression research. The replication of the Chinese structural model of somatization in South Korea lends empirical support to the view that somatization can be understood as the consequence of specific cultural scripts. These scripts involve the experience and expression of distress as well as culturally meaningful ways in which this distress is conceptualized and communicated to others. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. KSC-2011-1496

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- "The National 9/11 Flag" is folded in the Rocket Garden at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  18. KSC-2011-1484

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- "The National 9/11 Flag" is on display in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  19. KSC-2011-1495

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- "The National 9/11 Flag" is raised in the Rocket Garden at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  20. Addressing numerical challenges in introducing a reactive transport code into a land surface model: A biogeochemical modeling proof-of-concept with CLM-PFLOTRAN 1.0: Modeling Archive

    DOE Data Explorer

    Tang, G.; Andre, B.; Hoffman, F. M.; Painter, S. L.; Thornton, P. E.; Yuan, F.; Bisht, G.; Hammond, G. E.; Lichtner, P. C.; Kumar, J.; Mills, R. T.; Xu, X.

    2016-04-19

    This Modeling Archive is in support of an NGEE Arctic discussion paper under review and available at doi:10.5194/gmd-9-927-2016. The purpose is to document the simulations to allow verification, reproducibility, and follow-up studies. This dataset contains shell scripts to create the CLM-PFLOTRAN cases, specific input files for PFLOTRAN and CLM, outputs, and python scripts to make the figures using the outputs in the publication. Through these results, we demonstrate that CLM-PFLOTRAN can approximately reproduce CLM results in selected cases for the Arctic, temperate and tropic sites. In addition, the new framework facilitates mechanistic representations of soil biogeochemistry processes in the land surface model.

  1. Tensor to scalar ratio and large scale power suppression from pre-slow roll initial conditions

    NASA Astrophysics Data System (ADS)

    Lello, Louis; Boyanovsky, Daniel

    2014-05-01

    We study the corrections to the power spectra of curvature and tensor perturbations and the tensor-to-scalar ratio r in single field slow roll inflation with standard kinetic term due to initial conditions imprinted by a ``fast-roll'' stage prior to slow roll. For a wide range of initial inflaton kinetic energy, this stage lasts only a few e-folds and merges smoothly with slow-roll thereby leading to non-Bunch-Davies initial conditions for modes that exit the Hubble radius during slow roll. We describe a program that yields the dynamics in the fast-roll stage while matching to the slow roll stage in a manner that is independent of the inflationary potentials. Corrections to the power spectra are encoded in a ``transfer function'' for initial conditions Script Tα(k), Script Pα(k) = PBDα(k)Script Tα(k), implying a modification of the ``consistency condition'' for the tensor to scalar ratio at a pivot scale k0: r(k0) = -8nT(k0) [Script TT(k0)/Script TScript R(k0)]. We obtain Script Tα(k) to leading order in a Born approximation valid for modes of observational relevance today. A fit yields Script Tα(k) = 1+Aαk-pcos [2πωk/Hsr+varphiα], with 1.5lesssimplesssim2, ω simeq 1 and Hsr the Hubble scale during slow roll inflation, where curvature and tensor perturbations feature the same p,ω for a wide range of initial conditions. These corrections lead to both a suppression of the quadrupole and oscillatory features in both PR(k) and r(k0) with a period of the order of the Hubble scale during slow roll inflation. The results are quite general and independent of the specific inflationary potentials, depending solely on the ratio of kinetic to potential energy κ and the slow roll parameters epsilonV, ηV to leading order in slow roll. For a wide range of κ and the values of epsilonV ηV corresponding to the upper bounds from Planck, we find that the low quadrupole is consistent with the results from Planck, and the oscillations in r(k0) as a function of k0 could be observable if the modes corresponding to the quadrupole and the pivot scale crossed the Hubble radius very few (2-3) e-folds after the onset of slow roll. We comment on possible impact on the recent BICEP2 results.

  2. Maritime Security: Potential Terrorist Attacks and Protection Priorities

    DTIC Science & Technology

    2007-01-09

    Liquefied Natural Gas: Siting and Safety .” Feb. 15, 2005. 108 U.S. Coast Guard. U.S. Coast Guard Captain of the Port Long Island Sound Waterways...Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities January 9, 2007 Paul W. Parfomak and John Frittelli...Terrorist Attacks and Protection Priorities 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  3. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  4. Simplifying and enhancing the use of PyMOL with horizontal scripts

    PubMed Central

    2016-01-01

    Abstract Scripts are used in PyMOL to exert precise control over the appearance of the output and to ease remaking similar images at a later time. We developed horizontal scripts to ease script development. A horizontal script makes a complete scene in PyMOL like a traditional vertical script. The commands in a horizontal script are separated by semicolons. These scripts are edited interactively on the command line with no need for an external text editor. This simpler workflow accelerates script development. In using PyMOL, the illustration of a molecular scene requires an 18‐element matrix of view port settings. The default format spans several lines and is laborious to manually reformat for one line. This default format prevents the fast assembly of horizontal scripts that can reproduce a molecular scene. We solved this problem by writing a function that displays the settings on one line in a compact format suitable for horizontal scripts. We also demonstrate the mapping of aliases to horizontal scripts. Many aliases can be defined in a single script file, which can be useful for applying costume molecular representations to any structure. We also redefined horizontal scripts as Python functions to enable the use of the help function to print documentation about an alias to the command history window. We discuss how these methods of using horizontal scripts both simplify and enhance the use of PyMOL in research and education. PMID:27488983

  5. Ada Compiler Validation Summary Report: Certificate Number: 890420W1. 10075 International Business Machines Corporation. IBM Development System, for the Ada Language CMS/MVS Ada Cross Compiler, Version 2.1.1 IBM 3083 Host and IBM 4381 Target

    DTIC Science & Technology

    1989-04-20

    International business Machines Corporati,:i IBM Development System for the Ada Language, CMS/MVS Ada Cross Compiler, Version 2.1.1, Wright-Patterson AFB, IBM...VALIDATION SUMMARY REPORT: Certificate Number: 890420W1.10075 International Business Machines Corporation IBM Development System for the Ada Language CMS...command scripts provided by International Business Machines Corporation and reviewed by the validation team. The compiler was tested using all default

  6. Soil carbon storage in plantation forests and pastures: land-use change implications

    NASA Astrophysics Data System (ADS)

    Scott, Neal A.; Tate, Kevin R.; Ford-Robertson, Justin; Giltrap, David J.; Tattersall Smith, C.

    1999-04-01

    Afforestation may lead to an accumulation of carbon (C) in vegetation, but little is known about changes in soil C storage with establishment of plantation forests. Plantation forest carbon budget models often omit mineral soil C changes from stand-level C budget calculations, while including forest floor C accumulation, or predict continuous soil C increases over several rotations. We used national soil C databases to quantify differences in soil C content between pasture and exotic pine forest plantations dominated by P. radiata (D. Don), and paired site studies to quantify changes in soil C with conversion of pasture to plantation forest in New Zealand. Overall, mineral soil C to 0.10 m was 20 40% lower under pine for all soil types (p<0.01) except soils with high clay activity (HCA), where there was no difference. Similar trends were observed in the 0.1 0.3 m layer. Moreover, mineral soil C to 0.1 m was 17 40% lower under pine than pasture in side-by-side comparisons. The only non-significant difference occurred at a site located on a HCA soil (p=0.08). When averaged across the site studies and the national databases, the difference in soil C between pasture and pine was about 16 t C ha-1on non-HCA soils. This is similar to forest floor C averaged across our individual sites (about 20 t C ha-1). The decrease in mineral soil C could result in about a 15% reduction in the average C sequestration potential (112 t C ha-1) when pasture is converted to exotic plantation forest on non-HCA soils. The relative importance of this change in mineral soil C will likely vary depending on the productivity potential of a site and harvest impacts on the forest floor C pool. Our results emphasize that changes in soil C should be included in any calculations of C sequestration attributed to plantation forestry.

  7. Defense strategies for cloud computing multi-site server infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S.; Ma, Chris Y. T.; He, Fei

    We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, andmore » also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.« less

  8. Department of Defense Information Enterprise: Strategic Plan 2010-2012

    DTIC Science & Technology

    2010-04-01

    migrate from circuit-based technology to a converged (voice, video , and data) IP network and UC services environment. Ensure the optimal...Kevin Coleman, “Cyber Attacks on Supply Chain Systems,” Defense Tech, April 15, 2009 8 Lolita C. Baldor, “Federal Web Sites Knocked Out by Cyber Attack

  9. Wibangbe: the making of a documentary about the training and supervision of traditional birth attendants in Zaire.

    PubMed

    Vansintejan, G A; Glaser, W A

    1988-01-01

    During the 1980's in Karawa, Northwestern Zaire, a motion picture was produced which showed the interaction of the modern and traditional systems. The maternity center of the Karawa hospital was central to this effort. Traditional birth attendants (TBAs) became leading participants. Locally trained midwives were key trainers. The training and supervision programs had been ongoing for 2 years when Karawa was chosen as the movie site in 1986. The script was written by a midwife who had trained trainers of TBAs and TBAs themselves. All the steps in the selection, training, supervision, and supplying of TBAs in Karawa and its neighboring villages are included in the script. A Zairian team shot the script. The 5-member crew were employees of the Office Zairois de la Radio-Television (OZRT), the country's official television, radio, and film service. "Wibange" has separate sound tracks in French and English. Costs of the movie were met by contributions from both the US Agency for International Development and from Zaire. "Wibange--Traditional Birth Attendants: Their Training and Supervision" was developed in New York City. There are 2 final productions, a French and an English version. Running time is 23 minutes.

  10. Managing an archive of weather satellite images

    NASA Technical Reports Server (NTRS)

    Seaman, R. L.

    1992-01-01

    The author's experiences of building and maintaining an archive of hourly weather satellite pictures at NOAO are described. This archive has proven very popular with visiting and staff astronomers - especially on windy days and cloudy nights. Given access to a source of such pictures, a suite of simple shell and IRAF CL scripts can provide a great deal of robust functionality with little effort. These pictures and associated data products such as surface analysis (radar) maps and National Weather Service forecasts are updated hourly at anonymous ftp sites on the Internet, although your local Atsmospheric Sciences Department may prove to be a more reliable source. The raw image formats are unfamiliar to most astronomers, but reading them into IRAF is straightforward. Techniques for performing this format conversion at the host computer level are described which may prove useful for other chores. Pointers are given to sources of data and of software, including a package of example tools. These tools include shell and Perl scripts for downloading pictures, maps, and forecasts, as well as IRAF scripts and host level programs for translating the images into IRAF and GIF formats and for slicing & dicing the resulting images. Hints for displaying the images and for making hardcopies are given.

  11. Sexual scripts among young heterosexually active men and women: continuity and change.

    PubMed

    Masters, N Tatiana; Casey, Erin; Wells, Elizabeth A; Morrison, Diane M

    2013-01-01

    Whereas gendered sexual scripts are hegemonic at the cultural level, research suggests they may be less so at dyadic and individual levels. Understanding "disjunctures" between sexual scripts at different levels holds promise for illuminating mechanisms through which sexual scripts can change. Through interviews with 44 heterosexually active men and women aged 18 to 25, the ways young people grappled with culture-level scripts for sexuality and relationships were delineated. Findings suggest that, although most participants' culture-level gender scripts for behavior in sexual relationships were congruent with descriptions of traditional masculine and feminine sexuality, there was heterogeneity in how or whether these scripts were incorporated into individual relationships. Specifically, three styles of working with sexual scripts were found: conforming, in which personal gender scripts for sexual behavior overlapped with traditional scripts; exception-finding, in which interviewees accepted culture-level gender scripts as a reality, but created exceptions to gender rules for themselves; and transforming, in which participants either attempted to remake culture-level gender scripts or interpreted their own nontraditional styles as equally normative. Changing sexual scripts can potentially contribute to decreased gender inequity in the sexual realm and to increased opportunities for sexual satisfaction, safety, and well-being, particularly for women, but for men as well.

  12. Development of a Web-Based Distributed Interactive Simulation (DIS) Environment Using JavaScript

    DTIC Science & Technology

    2014-09-01

    scripting that let users change or interact with web content depending on user input, which is in contrast with server-side scripts such as PHP, Java and...transfer, DIS usually broadcasts or multicasts its PDUs based on UDP socket. 3. JavaScript JavaScript is the scripting language of the web, and all...IDE) for developing desktop, mobile and web applications with JAVA , C++, HTML5, JavaScript and more. b. Framework The DIS implementation of

  13. Raft membrane domains: from a liquid-ordered membrane phase to a site of pathogen attack.

    PubMed

    van der Goot, F G; Harder, T

    2001-04-01

    While the existence of cholesterol/sphingolipid (raft) membrane domains in the plasma membrane is now supported by strong experimental evidence, the structure of these domains, their size, their dynamics, and their molecular composition remain to be understood. Raft domains are thought to represent a specific physical state of lipid bilayers, the liquid-ordered phase. Recent observations suggest that in the mammalian plasma membrane small raft domains in ordered lipid phases are in a dynamic equilibrium with a less ordered membrane environment. Rafts may be enlarged and/or stabilized by protein-mediated cross-linking of raft-associated components. These changes of plasma membrane structure are perceived by the cells as signals, most likely an important element of immunoreceptor signalling. Pathogens abuse raft domains on the host cell plasma membrane as concentration devices, as signalling platforms and/or entry sites into the cell. Elucidation of these interactions requires a detailed understanding raft structure and dynamics. Copyright 2001 Academic Press.

  14. Aryl sulfonate based anticancer alkylating agents.

    PubMed

    Sheikh, Hamdullah Khadim; Arshad, Tanzila; Kanwal, Ghazala

    2018-05-01

    This research work revolves around synthesis of antineoplastic alkylating sulfonate esters with dual alkylating sites for crosslinking of the DNA strands. These molecules were evaluated as potential antineoplastic cross linking alkylating agents by reaction with the nucleoside of Guanine DNA nucleobase at both ends of the synthesized molecule. Synthesis of the alkylating molecules and the crosslinking with the guanosine nucleoside was monitored by MALDITOF mass spectroscopy. The synthesized molecule's crosslinking or adduct forming rate with the nucleoside was compared with that of 1,4 butane disulfonate (busulfan), in form of time taken for the appearance of [M+H] + . It was found that aryl sulfonate leaving group was causing higher rate of nucleophilic attack by the Lewis basic site of the nucleobase. Furthermore, the rate was also found to be a function of electron withdrawing or donating nature of the substituent on the aryl ring. Compound with strong electron withdrawing substituent on the para position of the ring reacted fastest. Hence, new alkylating agents were synthesized with optimized or desired reactivity.

  15. Prescribed journeys through life: Cultural differences in mental time travel between Middle Easterners and Scandinavians.

    PubMed

    Ottsen, Christina Lundsgaard; Berntsen, Dorthe

    2015-12-01

    Mental time travel is the ability to remember past events and imagine future events. Here, 124 Middle Easterners and 128 Scandinavians generated important past and future events. These different societies present a unique opportunity to examine effects of culture. Findings indicate stronger influence of normative schemas and greater use of mental time travel to teach, inform and direct behaviour in the Middle East compared with Scandinavia. The Middle Easterners generated more events that corresponded to their cultural life script and that contained religious words, whereas the Scandinavians reported events with a more positive mood impact. Effects of gender were mainly found in the Middle East. Main effects of time orientation largely replicated recent findings showing that simulation of future and past events are not necessarily parallel processes. In accordance with the notion that future simulations rely on schema-based construction, important future events showed a higher overlap with life script events than past events in both cultures. In general, cross-cultural discrepancies were larger in future compared with past events. Notably, the high focus in the Middle East on sharing future events to give cultural guidance is consistent with the increased adherence to normative scripts found in this culture. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. The influence of pornography on sexual scripts and hooking up among emerging adults in college.

    PubMed

    Braithwaite, Scott R; Coulson, Gwen; Keddington, Krista; Fincham, Frank D

    2015-01-01

    The explosive growth in access to the Internet has led to a commensurate increase in the availability, anonymity, and affordability of pornography. An emerging body of research has shown associations between pornography and certain behaviors and attitudes; yet, how pornography actually influences these outcomes has not been documented. In two studies (Study 1 N = 969; Study 2 N = 992) we examined the hypothesis that pornography influences potentially risky sexual behavior (hooking up) among emerging adults via sexual scripts. Our results demonstrate that more frequent viewing of pornography is associated with a higher incidence of hooking up and a higher number of unique hook up partners. We replicated these effects both cross-sectionally and longitudinally while accounting for the stability of hook ups over the course of an academic semester. We also demonstrated that more frequent viewing of pornography is associated with having had more previous sexual partners of all types, more one occasion sexual partners ("one night stands"), and plans to have a higher number of sexual partners in the future. Finally, we provided evidence that more permissive sexual scripts mediated the association between more frequent pornography viewing and hooking up. We discuss these findings with an eye toward mitigating potential personal and public health risks among emerging adults.

  17. Pybel: a Python wrapper for the OpenBabel cheminformatics toolkit

    PubMed Central

    O'Boyle, Noel M; Morley, Chris; Hutchison, Geoffrey R

    2008-01-01

    Background Scripting languages such as Python are ideally suited to common programming tasks in cheminformatics such as data analysis and parsing information from files. However, for reasons of efficiency, cheminformatics toolkits such as the OpenBabel toolkit are often implemented in compiled languages such as C++. We describe Pybel, a Python module that provides access to the OpenBabel toolkit. Results Pybel wraps the direct toolkit bindings to simplify common tasks such as reading and writing molecular files and calculating fingerprints. Extensive use is made of Python iterators to simplify loops such as that over all the molecules in a file. A Pybel Molecule can be easily interconverted to an OpenBabel OBMol to access those methods or attributes not wrapped by Pybel. Conclusion Pybel allows cheminformaticians to rapidly develop Python scripts that manipulate chemical information. It is open source, available cross-platform, and offers the power of the OpenBabel toolkit to Python programmers. PMID:18328109

  18. Pybel: a Python wrapper for the OpenBabel cheminformatics toolkit.

    PubMed

    O'Boyle, Noel M; Morley, Chris; Hutchison, Geoffrey R

    2008-03-09

    Scripting languages such as Python are ideally suited to common programming tasks in cheminformatics such as data analysis and parsing information from files. However, for reasons of efficiency, cheminformatics toolkits such as the OpenBabel toolkit are often implemented in compiled languages such as C++. We describe Pybel, a Python module that provides access to the OpenBabel toolkit. Pybel wraps the direct toolkit bindings to simplify common tasks such as reading and writing molecular files and calculating fingerprints. Extensive use is made of Python iterators to simplify loops such as that over all the molecules in a file. A Pybel Molecule can be easily interconverted to an OpenBabel OBMol to access those methods or attributes not wrapped by Pybel. Pybel allows cheminformaticians to rapidly develop Python scripts that manipulate chemical information. It is open source, available cross-platform, and offers the power of the OpenBabel toolkit to Python programmers.

  19. Descriptive Study of Damage Caused by the Rhinoceros Beetle, Oryctes agamemnon, and Its Influence on Date Palm Oases of Rjim Maatoug, Tunisia

    PubMed Central

    Soltani, Rasmi; lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees. PMID:20302545

  20. Sparks Will Fly: engineering creative script conflicts

    NASA Astrophysics Data System (ADS)

    Veale, Tony; Valitutti, Alessandro

    2017-10-01

    Scripts are often dismissed as the stuff of good movies and bad politics. They codify cultural experience so rigidly that they remove our freedom of choice and become the very antithesis of creativity. Yet, mental scripts have an important role to play in our understanding of creative behaviour, since a deliberate departure from an established script can produce results that are simultaneously novel and familiar, especially when others stick to the conventional script. Indeed, creative opportunities often arise at the overlapping boundaries of two scripts that antagonistically compete to mentally organise the same situation. This work explores the computational integration of competing scripts to generate creative friction in short texts that are surprising but meaningful. Our exploration considers conventional macro-scripts - ordered sequences of actions - and the less obvious micro-scripts that operate at even the lowest levels of language. For the former, we generate plots that squeeze two scripts into a single mini-narrative; for the latter, we generate ironic descriptions that use conflicting scripts to highlight the speaker's pragmatic insincerity. We show experimentally that verbal irony requires both kinds of scripts - macro and micro - to work together to reliably generate creative sparks from a speaker's subversive intent.

  1. Using script theory to cultivate illness script formation and clinical reasoning in health professions education.

    PubMed

    Lubarsky, Stuart; Dory, Valérie; Audétat, Marie-Claude; Custers, Eugène; Charlin, Bernard

    2015-01-01

    Script theory proposes an explanation for how information is stored in and retrieved from the human mind to influence individuals' interpretation of events in the world. Applied to medicine, script theory focuses on knowledge organization as the foundation of clinical reasoning during patient encounters. According to script theory, medical knowledge is bundled into networks called 'illness scripts' that allow physicians to integrate new incoming information with existing knowledge, recognize patterns and irregularities in symptom complexes, identify similarities and differences between disease states, and make predictions about how diseases are likely to unfold. These knowledge networks become updated and refined through experience and learning. The implications of script theory on medical education are profound. Since clinician-teachers cannot simply transfer their customized collections of illness scripts into the minds of learners, they must create opportunities to help learners develop and fine-tune their own sets of scripts. In this essay, we provide a basic sketch of script theory, outline the role that illness scripts play in guiding reasoning during clinical encounters, and propose strategies for aligning teaching practices in the classroom and the clinical setting with the basic principles of script theory.

  2. Delusions of Singularity: Aesthetics, Discomfort and Bewilderment in Kashmir

    ERIC Educational Resources Information Center

    Dinesh, Nandita

    2015-01-01

    In Kashmir, where the act of performing a script-based play on a proscenium stage is still seen by many as a controversial gesture, "Cages" involved the devised creation of a site responsive and immersive performance that placed two spectators, literally, in the shoes of an(Other). The potential of these forms of spectatorship, as…

  3. Land Application of Wastes: An Educational Program. Waste Application Systems - Module 12, Objectives, and Script.

    ERIC Educational Resources Information Center

    Clarkson, W. W.; And Others

    Land application systems are discussed with reference to the options available for applying wastewater and sludge to the site. Spray systems, surface flow methods, and sludge application schemes are all included with discussions of the advantages and disadvantages of each option within these categories. A distinction is made between the choice of…

  4. Creating an Internal Content Management System

    ERIC Educational Resources Information Center

    Sennema, Greg

    2004-01-01

    In this article, the author talks about an internal content management system that they have created at Calvin College. It is a hybrid of CMS and intranet that organizes Web site content and a variety of internal tools to help librarians complete their daily tasks. Hobbes is a Web-based tool that uses Common Gateway Interface (CGI) scripts written…

  5. Improving Remote Voting Security with CodeVoting

    NASA Astrophysics Data System (ADS)

    Joaquim, Rui; Ribeiro, Carlos; Ferreira, Paulo

    One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors.

  6. Refractory Degradation by Slag Attack in Coal Gasification

    DTIC Science & Technology

    2009-02-01

    REFRACTORY DEGRADATION BY SLAG ATTACK IN COAL GASIFICATION Jinichiro Nakano 1,2 , Sridhar Seetharaman 1,2 , James Bennett 3 , Kyei-Sing...and two synthetic slags (coal and petcoke). Pulverized slag samples were placed at specific microstructure locations on refractory substrates and...heated to 1500 ºC at log(Po2) = -9, using a high-speed heating chamber. Cross-sections of the slag /refractory interface indicated unique slag

  7. Stand and tree characteristics influencing density of fir engraver beetle attack scars in white fir

    Treesearch

    George T. Ferrell

    1973-01-01

    Density of embedded scars resulting from old fir engraver (Scolytus ventralis Lec.) attacks was assessed in 3,430 bole cross sections cut from 603 white firs growing in both cutover and in virgin old-growth stands in northern California. Mean scar density was directly related to percentage of mature stand removed by logging and was higher in...

  8. Effect of bark beetle (Ips typographus L.) attack on bark VOC emissions of Norway spruce (Picea abies Karst.) trees

    NASA Astrophysics Data System (ADS)

    Ghimire, Rajendra P.; Kivimäenpää, Minna; Blomqvist, Minna; Holopainen, Toini; Lyytikäinen-Saarenmaa, Päivi; Holopainen, Jarmo K.

    2016-02-01

    Climate warming driven storms are evident causes for an outbreak of the European spruce bark beetle (Ips typographus L.) resulting in the serious destruction of mature Norway spruce (Picea abies Karst.) forests in northern Europe. Conifer species are major sources of biogenic volatile organic compounds (BVOCs) in the boreal zone. Climate relevant BVOC emissions are expected to increase when conifer trees defend against bark beetle attack by monoterpene (MT)-rich resin flow. In this study, BVOC emission rates from the bark surface of beetle-attacked and non-attacked spruce trees were measured from two outbreak areas, Iitti and Lahti in southern Finland, and from one control site at Kuopio in central Finland. Beetle attack increased emissions of total MTs 20-fold at Iitti compared to Kuopio, but decreased the emissions of several sesquiterpenes (SQTs) at Iitti. At the Lahti site, the emission rate of α-pinene was positively correlated with mean trap catch of bark beetles. The responsive individual MTs were tricyclene, α-pinene, camphene, myrcene, limonene, 1,8-cineole and bornyl acetate in both of the outbreak areas. Our results suggest that bark beetle outbreaks affect local BVOC emissions from conifer forests dominated by Norway spruce. Therefore, the impacts of insect outbreaks are worth of consideration to global BVOC emission models.

  9. The role of scripts in personal consistency and individual differences.

    PubMed

    Demorest, Amy; Popovska, Ana; Dabova, Milena

    2012-02-01

    This article examines the role of scripts in personal consistency and individual differences. Scripts are personally distinctive rules for understanding emotionally significant experiences. In 2 studies, scripts were identified from autobiographical memories of college students (Ns = 47 and 50) using standard categories of events and emotions to derive event-emotion compounds (e.g., Affiliation-Joy). In Study 1, scripts predicted responses to a reaction-time task 1 month later, such that participants responded more quickly to the event from their script when asked to indicate what emotion would be evoked by a series of events. In Study 2, individual differences in 5 common scripts were found to be systematically related to individual differences in traits of the Five-Factor Model. Distinct patterns of correlation revealed the importance of studying events and emotions in compound units, that is, in script form (e.g., Agreeableness was correlated with the script Affiliation-Joy but not with the scripts Fun-Joy or Affiliation-Love). © 2012 The Authors. Journal of Personality © 2012, Wiley Periodicals, Inc.

  10. [Effects of planning and executive functions on young children's script change strategy: A developmental perspective].

    PubMed

    Yanaoka, Kaichi

    2016-02-01

    This research examined the effects of planning and executive functions on young children's (ages 3-to 5-years) strategies in changing scripts. Young children (N = 77) performed a script task (doll task), three executive function tasks (DCCS, red/blue task, and nine box task), a planning task, and a receptive vocabulary task. In the doll task, young children first enacted a "changing clothes" script, and then faced a situation in which some elements of the script were inappropriate. They needed to enact a script by compensating inappropriate items for the other-script items or by changing to the other script in advance. The results showed that shifting, a factor of executive function, had a positive influence on whether young children could compensate inappropriate items. In addition, planning was also an important factor that helped children to change to the other script in advance. These findings suggest that shifting and planning play different roles in using the two strategies appropriately when young children enact scripts in unexpected situations.

  11. Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-05-22

    The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.

  12. 77 FR 23396 - Revisions to the Requirements for Authority To Manufacture and Distribute Postage Evidencing Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-19

    ... POSTAL SERVICE 39 CFR Part 501 Revisions to the Requirements for Authority To Manufacture and Distribute Postage Evidencing Systems AGENCY: Postal Service TM . ACTION: Final rule. SUMMARY: This rule... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  13. Presentation and response timing accuracy in Adobe Flash and HTML5/JavaScript Web experiments.

    PubMed

    Reimers, Stian; Stewart, Neil

    2015-06-01

    Web-based research is becoming ubiquitous in the behavioral sciences, facilitated by convenient, readily available participant pools and relatively straightforward ways of running experiments: most recently, through the development of the HTML5 standard. Although in most studies participants give untimed responses, there is a growing interest in being able to record response times online. Existing data on the accuracy and cross-machine variability of online timing measures are limited, and generally they have compared behavioral data gathered on the Web with similar data gathered in the lab. For this article, we took a more direct approach, examining two ways of running experiments online-Adobe Flash and HTML5 with CSS3 and JavaScript-across 19 different computer systems. We used specialist hardware to measure stimulus display durations and to generate precise response times to visual stimuli in order to assess measurement accuracy, examining effects of duration, browser, and system-to-system variability (such as across different Windows versions), as well as effects of processing power and graphics capability. We found that (a) Flash and JavaScript's presentation and response time measurement accuracy are similar; (b) within-system variability is generally small, even in low-powered machines under high load; (c) the variability of measured response times across systems is somewhat larger; and (d) browser type and system hardware appear to have relatively small effects on measured response times. Modeling of the effects of this technical variability suggests that for most within- and between-subjects experiments, Flash and JavaScript can both be used to accurately detect differences in response times across conditions. Concerns are, however, noted about using some correlational or longitudinal designs online.

  14. Discovery and characterization of a photo-oxidative histidine-histidine cross-link in IgG1 antibody utilizing ¹⁸O-labeling and mass spectrometry.

    PubMed

    Liu, Min; Zhang, Zhongqi; Cheetham, Janet; Ren, Da; Zhou, Zhaohui Sunny

    2014-05-20

    A novel photo-oxidative cross-linking between two histidines (His-His) has been discovered and characterized in an IgG1 antibody via the workflow of XChem-Finder, (18)O labeling and mass spectrometry (Anal. Chem. 2013, 85, 5900-5908). Its structure was elucidated by peptide mapping with multiple proteases with various specificities (e.g., trypsin, Asp-N, and GluC combined with trypsin or Asp-N) and mass spectrometry with complementary fragmentation modes (e.g., collision-induced dissociation (CID) and electron-transfer dissociation (ETD)). Our data indicated that cross-linking occurred across two identical conserved histidine residues on two separate heavy chains in the hinge region, which is highly flexible and solvent accessible. On the basis of model studies with short peptides, it has been proposed that singlet oxygen reacts with the histidyl imidazole ring to form an endoperoxide and then converted to the 2-oxo-histidine (2-oxo-His) and His+32 intermediates, the latter is subject to a nucleophilic attack by the unmodified histidine; and finally, elimination of a water molecule leads to the final adduct with a net mass increase of 14 Da. Our findings are consistent with this mechanism. Successful discovery of cross-linked His-His again demonstrates the broad applicability and utility of our XChem-Finder approach in the discovery and elucidation of protein cross-linking, particularly without a priori knowledge of the chemical nature and site of cross-linking.

  15. Provision of an X-environment using the HEPiX-X11 scripts

    NASA Astrophysics Data System (ADS)

    Jones, R. W. L.; Cons, L.; Taddei, A.

    1997-02-01

    At CERN, we have created a user X11 environment within the HEPiX framework. Customisation is possible at the HEPiX, site, cluster, machine, group and user level, in order of increasing priority. The management of the X11 session is divorced from the window management. FVWM is the default window manager, being light on system resources while providing most of the desired functionality. The assembly of a correctly ordered. fvwmrc is done automatically by the scripts, with customisation allowed at all of the above levels. Two tools are provided to query aspects of that environment. These may be used both at the start of the X-session or when commencing any application. The first is guesskbd, a tool to identify the user's keyboard. A second, provides useful information about a given display.

  16. Cross-Platform Development Techniques for Mobile Devices

    DTIC Science & Technology

    2013-09-01

    many other platforms including Windows, Blackberry , and Symbian. Each of these platforms has their own distinct architecture and programming language...sales of iPhones and the increasing use of Android-based devices have forced less successful competitors such as Microsoft, Blackberry , and Symbian... Blackberry and Windows Phone are planned [12] in this tool’s attempt to reuse code with a unified JavaScript API while at the same time supporting unique

  17. Alternative Environments for Army Recruiting, 1987-2001. Volume 3

    DTIC Science & Technology

    1988-01-01

    study investigating the cultural script, known as ’simpatia’, among Hispanic and mainstream recruits found’that Hispanics expect more positive...A16 joblessness of black men. Another reason for more black children in single-parent families is the high degree of teen-age pregnancies among ... investigate systematically the "cross correlations" among future events (and only future events) to determine, among other things, if improved

  18. Visualization of seismic tomography on Google Earth: Improvement of KML generator and its web application to accept the data file in European standard format

    NASA Astrophysics Data System (ADS)

    Yamagishi, Y.; Yanaka, H.; Tsuboi, S.

    2009-12-01

    We have developed a conversion tool for the data of seismic tomography into KML, called KML generator, and made it available on the web site (http://www.jamstec.go.jp/pacific21/google_earth). The KML generator enables us to display vertical and horizontal cross sections of the model on Google Earth in three-dimensional manner, which would be useful to understand the Earth's interior. The previous generator accepts text files of grid-point data having longitude, latitude, and seismic velocity anomaly. Each data file contains the data for each depth. Metadata, such as bibliographic reference, grid-point interval, depth, are described in other information file. We did not allow users to upload their own tomographic model to the web application, because there is not standard format to represent tomographic model. Recently European seismology research project, NEIRES (Network of Research Infrastructures for European Seismology), advocates that the data of seismic tomography should be standardized. They propose a new format based on JSON (JavaScript Object Notation), which is one of the data-interchange formats, as a standard one for the tomography. This format consists of two parts, which are metadata and grid-point data values. The JSON format seems to be powerful to handle and to analyze the tomographic model, because the structure of the format is fully defined by JavaScript objects, thus the elements are directly accessible by a script. In addition, there exist JSON libraries for several programming languages. The International Federation of Digital Seismograph Network (FDSN) adapted this format as a FDSN standard format for seismic tomographic model. There might be a possibility that this format would not only be accepted by European seismologists but also be accepted as the world standard. Therefore we improve our KML generator for seismic tomography to accept the data file having also JSON format. We also improve the web application of the generator so that the JSON formatted data file can be uploaded. Users can convert any tomographic model data to KML. The KML obtained through the new generator should provide an arena to compare various tomographic models and other geophysical observations on Google Earth, which may act as a common platform for geoscience browser.

  19. The Mechanics of CSCL Macro Scripts

    ERIC Educational Resources Information Center

    Dillenbourg, Pierre; Hong, Fabrice

    2008-01-01

    Macro scripts structure collaborative learning and foster the emergence of knowledge-productive interactions such as argumentation, explanations and mutual regulation. We propose a pedagogical model for the designing of scripts and illustrate this model using three scripts. In brief, a script disturbs the natural convergence of a team and in doing…

  20. Script Reforms--Are They Necessary?

    ERIC Educational Resources Information Center

    James, Gregory

    Script reform, the modification of an existing writing system, is often confused with script replacement of one writing system with another. Turkish underwent the replacement of Arabic script by an adaptation of Roman script under Kamel Ataturk, but a similar replacement in Persian was rejected because of the high rate of existing literacy in…

  1. Gender differences in performance of script analysis by older adults.

    PubMed

    Helmes, E; Bush, J D; Pike, D L; Drake, D G

    2006-12-01

    Script analysis as a test of executive functions is presumed sensitive to cognitive changes seen with increasing age. Two studies evaluated if gender differences exist in performance on scripts for familiar and unfamiliar tasks in groups of cognitively intact older adults. In Study 1, 26 older adults completed male and female stereotypical scripts. Results were not significant but a tendency was present, with genders making fewer impossible errors on the gender-typical script. Such an interaction was also noted in Study 2, which contrasted 50 older with 50 younger adults on three scripts, including a script with neutral familiarity. The pattern of significant interactions for errors suggested the need to use scripts that are based upon tasks that are equally familiar to both genders.

  2. The Departmental Script as an Ongoing Conversation into the Phronesis of Teaching Science as Inquiry

    NASA Astrophysics Data System (ADS)

    Melville, Wayne; Campbell, Todd; Fazio, Xavier; Bartley, Anthony

    2012-12-01

    This article investigates the extent to which a science department script supports the teaching and learning of science as inquiry and how this script is translated into individual teachers' classrooms. This study was completed at one school in Canada which, since 2000, has developed a departmental script supportive of teaching and learning of science as inquiry. Through a mixed-method strategy, multiple data sources were drawn together to inform a cohesive narrative about scripts, science departments, and individual classrooms. Results of the study reveal three important findings: (1) the departmental script is not an artefact, but instead is an ongoing conversation into the episteme, techne and phronesis of science teaching; (2) the consistently reformed teaching practices that were observed lead us to believe that a departmental script has the capacity to enhance the teaching of science as inquiry; and, (3) the existence of a departmental script does not mean that teaching will be `standardized' in the bureaucratic sense of the word. Our findings indicate that a departmental script can be considered to concurrently operate as an epistemic script that is translated consistently across the classes, and a social script that was more open to interpretation within individual teachers' classrooms.

  3. Page segmentation using script identification vectors: A first look

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hochberg, J.; Cannon, M.; Kelly, P.

    1997-07-01

    Document images in which different scripts, such as Chinese and Roman, appear on a single page pose a problem for optical character recognition (OCR) systems. This paper explores the use of script identification vectors in the analysis of multilingual document images. A script identification vector is calculated for each connected component in a document. The vector expresses the closest distance between the component and templates developed for each of thirteen scripts, including Arabic, Chinese, Cyrillic, and Roman. The authors calculate the first three principal components within the resulting thirteen-dimensional space for each image. By mapping these components to red, green,more » and blue, they can visualize the information contained in the script identification vectors. The visualization of several multilingual images suggests that the script identification vectors can be used to segment images into script-specific regions as large as several paragraphs or as small as a few characters. The visualized vectors also reveal distinctions within scripts, such as font in Roman documents, and kanji vs. kana in Japanese. Results are best for documents containing highly dissimilar scripts such as Roman and Japanese. Documents containing similar scripts, such as Roman and Cyrillic will require further investigation.« less

  4. CAPRRESI: Chimera Assembly by Plasmid Recovery and Restriction Enzyme Site Insertion.

    PubMed

    Santillán, Orlando; Ramírez-Romero, Miguel A; Dávila, Guillermo

    2017-06-25

    Here, we present chimera assembly by plasmid recovery and restriction enzyme site insertion (CAPRRESI). CAPRRESI benefits from many strengths of the original plasmid recovery method and introduces restriction enzyme digestion to ease DNA ligation reactions (required for chimera assembly). For this protocol, users clone wildtype genes into the same plasmid (pUC18 or pUC19). After the in silico selection of amino acid sequence regions where chimeras should be assembled, users obtain all the synonym DNA sequences that encode them. Ad hoc Perl scripts enable users to determine all synonym DNA sequences. After this step, another Perl script searches for restriction enzyme sites on all synonym DNA sequences. This in silico analysis is also performed using the ampicillin resistance gene (ampR) found on pUC18/19 plasmids. Users design oligonucleotides inside synonym regions to disrupt wildtype and ampR genes by PCR. After obtaining and purifying complementary DNA fragments, restriction enzyme digestion is accomplished. Chimera assembly is achieved by ligating appropriate complementary DNA fragments. pUC18/19 vectors are selected for CAPRRESI because they offer technical advantages, such as small size (2,686 base pairs), high copy number, advantageous sequencing reaction features, and commercial availability. The usage of restriction enzymes for chimera assembly eliminates the need for DNA polymerases yielding blunt-ended products. CAPRRESI is a fast and low-cost method for fusing protein-coding genes.

  5. Lessons learned from cross-border medical response to the terrorist bombings in Tabba and Ras-el-Satan, Egypt, on 07 October 2004.

    PubMed

    Leiba, Adi; Blumenfeld, Amir; Hourvitz, Ariel; Weiss, Gali; Peres, Michal; Laor, Dani; Schwartz, Dagan; Arad, Jacob; Goldberg, Avishay; Levi, Yeheskel; Bar-Dayan, Yaron

    2005-01-01

    Large-scale, terrorist attacks can happen in peripheral areas, which are located close to a country's borders and far from its main medical facilities and involve multi-national casualties and responders. The objective of this study was to analyze the terrorist suicide bombings that occurred on 07 October 2004, near the Israeli-Egyptian border, as representative of such a complex scenario. Data from formal debriefings after the event were processed in order to learn about victim outcomes, resource utilization, critical events, and time course of the emergency response. A total of 185 injured survivors were repatriated: four were severely wounded, 13 were moderately injured, and 168 were mildly injured. Thirty-eight people died. A forward medical team landed at the border town's airport, which provided reinforcement in the field and in the local hospital. Israeli and Egyptian search and rescue teams collaborated at the destruction site. One-hundred sixty-eight injured patients arrived at the small border hospital that rapidly organized itself for the mass-casualty incident, operating as an evacuation "staging hospital". Twenty-three casualties secondarily were distributed to two major trauma centers in the south and the center of Israel, respectively, either by ambulance or by helicopter. Large-scale, terrorist attacks at a peripheral border zone can be handled by international collaboration, reinforcement of medical teams at the site itself and at the peripheral neighboring hospital, rapid rearrangement of an "evacuation hospital", and efficient transport to trauma centers by ambulances, helicopters, and other aircraft.

  6. Securing a web-based teleradiology platform according to German law and "best practices".

    PubMed

    Spitzer, Michael; Ullrich, Tobias; Ueckert, Frank

    2009-01-01

    The Medical Data and Picture Exchange platform (MDPE), as a teleradiology system, facilitates the exchange of digital medical imaging data among authorized users. It features extensive support of the DICOM standard including networking functions. Since MDPE is designed as a web service, security and confidentiality of data and communication pose an outstanding challenge. To comply with demands of German laws and authorities, a generic data security concept considered as "best practice" in German health telematics was adapted to the specific demands of MDPE. The concept features strict logical and physical separation of diagnostic and identity data and thus an all-encompassing pseudonymization throughout the system. Hence, data may only be merged at authorized clients. MDPE's solution of merging data from separate sources within a web browser avoids technically questionable techniques such as deliberate cross-site scripting. Instead, data is merged dynamically by JavaScriptlets running in the user's browser. These scriptlets are provided by one server, while content and method calls are generated by another server. Additionally, MDPE uses encrypted temporary IDs for communication and merging of data.

  7. Effects of sarin on the nervous system in rescue team staff members and police officers 3 years after the Tokyo subway sarin attack.

    PubMed

    Nishiwaki, Y; Maekawa, K; Ogawa, Y; Asukai, N; Minami, M; Omae, K

    2001-11-01

    Although the clinical manifestations of acute sarin poisoning have been reported in detail, no comprehensive study of the chronic physical and psychiatric effects of acute sarin poisoning has been carried out. To clarify the chronic effects of sarin on the nervous system, a cross-sectional epidemiologic study was conducted 3 years after the Tokyo subway sarin attack. Subjects consisted of the rescue team staff members and police officers who had worked at the disaster site. Subjects consisted of 56 male exposed subjects and 52 referent subjects matched for age and occupation. A neurobehavioral test, stabilometry, and measurement of vibration perception thresholds were performed, as well as psychometric tests to assess traumatic stress symptoms. The exposed group performed less well in the backward digit span test than the referent group in a dose-effect manner. This result was the same after controlling for possible confounding factors and was independent of traumatic stress symptoms. In other tests of memory function, except for the Benton visual retention test (mean correct answers), effects related to exposure were also suggested, although they were not statistically significant. In contrast, the dose-effect relationships observed in the neurobehavioral tests (psychomotor function) were unclear. None of the stabilometry and vibration perception threshold parameters had any relation to exposure. Our findings suggest the chronic decline of memory function 2 years and 10 months to 3 years and 9 months after exposure to sarin in the Tokyo subway attack, and further study is needed.

  8. Effects of sarin on the nervous system in rescue team staff members and police officers 3 years after the Tokyo subway sarin attack.

    PubMed Central

    Nishiwaki, Y; Maekawa, K; Ogawa, Y; Asukai, N; Minami, M; Omae, K

    2001-01-01

    Although the clinical manifestations of acute sarin poisoning have been reported in detail, no comprehensive study of the chronic physical and psychiatric effects of acute sarin poisoning has been carried out. To clarify the chronic effects of sarin on the nervous system, a cross-sectional epidemiologic study was conducted 3 years after the Tokyo subway sarin attack. Subjects consisted of the rescue team staff members and police officers who had worked at the disaster site. Subjects consisted of 56 male exposed subjects and 52 referent subjects matched for age and occupation. A neurobehavioral test, stabilometry, and measurement of vibration perception thresholds were performed, as well as psychometric tests to assess traumatic stress symptoms. The exposed group performed less well in the backward digit span test than the referent group in a dose-effect manner. This result was the same after controlling for possible confounding factors and was independent of traumatic stress symptoms. In other tests of memory function, except for the Benton visual retention test (mean correct answers), effects related to exposure were also suggested, although they were not statistically significant. In contrast, the dose-effect relationships observed in the neurobehavioral tests (psychomotor function) were unclear. None of the stabilometry and vibration perception threshold parameters had any relation to exposure. Our findings suggest the chronic decline of memory function 2 years and 10 months to 3 years and 9 months after exposure to sarin in the Tokyo subway attack, and further study is needed. PMID:11713003

  9. Formatting scripts with computers and Extended BASIC.

    PubMed

    Menning, C B

    1984-02-01

    A computer program, written in the language of Extended BASIC, is presented which enables scripts, for educational media, to be quickly written in a nearly unformatted style. From the resulting script file, stored on magnetic tape or disk, the computer program formats the script into either a storyboard , a presentation, or a narrator 's script. Script headings and page and paragraph numbers are automatic features in the word processing. Suggestions are given for making personal modifications to the computer program.

  10. Stability and Topology of Scale-Free Networks under Attack and Defense Strategies

    NASA Astrophysics Data System (ADS)

    Gallos, Lazaros K.; Cohen, Reuven; Argyrakis, Panos; Bunde, Armin; Havlin, Shlomo

    2005-05-01

    We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction pc of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce pc. At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions.

  11. KSC-2011-1493

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- "The National 9/11 Flag" is transported from the Debus Conference Facility to the Rocket Garden at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  12. KSC-2011-1494

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- "The National 9/11 Flag" is transported from the Debus Conference Facility to the Rocket Garden at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  13. KSC-2011-1497

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- More than a dozen 9/11 first responders take part in "The National 9/11 Flag" stitching ceremony at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  14. Cal OES Internet Home Cal OES Home

    Science.gov Websites

    Sign In You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page. Turn on more accessible mode Turn off more accessible mode Skip Ribbon Commands Skip to main content Turn off Animations Turn on Animations image of CA.gov logo image of Cal OES

  15. Land Application of Wastes: An Educational Program. Non-Crop and Forest Systems - Module 13, Objectives, and Script.

    ERIC Educational Resources Information Center

    Clarkson, W. W.; And Others

    This module discusses the characteristics of alternate sites and management schemes and attempts to evaluate the efficiency of each alternative in terms of waste treatment. Three types of non-crop land application are discussed: (1) forest lands; (2) park and recreational application; and (3) land reclamation in surface or strip mined areas. (BB)

  16. [Risk perception and psychological reactions in public crisis situations using the example of terror attacks].

    PubMed

    Grimm, A; Hulse, L; Schmidt, S

    2009-12-01

    The reactions to the 9/11 terror attacks were immense in the western population. In the current review, the impact of terror attacks is presented with surveys, clinical interviews, and scientific polls, which were identified in a comprehensive literature search. Results show that the fear of further terror attacks is comparatively overestimated in the population and is associated with numerous psychological consequences and reactions. The overestimation of the probability of further terror attacks is related among other reasons to its unique features and its strong representation in the media. Several independent studies proved that the number of stress symptoms and psychiatric diagnoses is associated with a high risk perception in relation to terror attacks. This was not only the case for victims of terror attacks, but also for people indirectly exposed to the terror attacks. In addition, there is evidence that the number of the stress symptoms correlate with the duration of TV consumption of new findings about terror attempts. Methodologically, there is a critical lack of more in-depth analyses to explain the development of risk perceptions and its influence on mental and physical health. Because of the international importance and cross-cultural differences, an international standardization of research is desirable.

  17. Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    NASA Astrophysics Data System (ADS)

    Montminy, David P.

    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.

  18. [Preliminary application of scripting in RayStation TPS system].

    PubMed

    Zhang, Jianying; Sun, Jing; Wang, Yun

    2013-07-01

    Discussing the basic application of scripting in RayStation TPS system. On the RayStation 3.0 Platform, the programming methods and the points should be considered during basic scripting application were explored with the help of utility scripts. The typical planning problems in the field of beam arrangement and plan outputting were used as examples by ironprthon language. The necessary properties and the functions of patient object for script writing can be extracted from RayStation system. With the help of NET controls, planning functions such as the interactive parameter input, treatment planning control and the extract of the plan have been realized by scripts. With the help of demo scripts, scripts can be developed in RayStation, as well as the system performance can be upgraded.

  19. CADDIS Volume 4. Data Analysis: PECBO Appendix - R Scripts for Non-Parametric Regressions

    EPA Pesticide Factsheets

    Script for computing nonparametric regression analysis. Overview of using scripts to infer environmental conditions from biological observations, statistically estimating species-environment relationships, statistical scripts.

  20. Estimates of genetic parameters for oleoresin and growth traits in juvenile loblolly pine

    Treesearch

    James H. Roberds; Brian L. Strom; Fred P. Hain; David P. Gwaze; Steven E. McKeand; Larry H. Lott

    2003-01-01

    In southern pines of the United States, resistance to attack by southern pine beetle, Dendroctonus frontalis Zimmermann, is believed to principally involve flow of oleoresin to beetle attack sites. Both environmental and genetic factors are known to affect the quantity of oleoresin flow in loblolly pine, Pinus taeda L., but little...

  1. Asymmetric bias in perception of facial affect among Roman and Arabic script readers.

    PubMed

    Heath, Robin L; Rouhana, Aida; Ghanem, Dana Abi

    2005-01-01

    The asymmetric chimeric faces test is used frequently as an indicator of right hemisphere involvement in the perception of facial affect, as the test is considered free of linguistic elements. Much of the original research with the asymmetric chimeric faces test was conducted with subjects reading left-to-right Roman script, i.e., English. As readers of right-to-left scripts, such as Arabic, demonstrated a mixed or weak rightward bias in judgements of facial affect, the influence of habitual scanning direction was thought to intersect with laterality. We administered the asymmetric chimeric faces test to 1239 adults who represented a range of script experience, i.e., Roman script readers (English and French), Arabic readers, bidirectional readers of Roman and Arabic scripts, and illiterates. Our findings supported the hypothesis that the bias in facial affect judgement is rooted in laterality, but can be influenced by script direction. Specifically, right-handed readers of Roman script demonstrated the greatest mean leftward score, and mixed-handed Arabic script readers demonstrated the greatest mean rightward score. Biliterates showed a gradual shift in asymmetric perception, as their scores fell between those of Roman and Arabic script readers, basically distributed in the order expected by their handedness and most often used script. Illiterates, whose only directional influence was laterality, showed a slight leftward bias.

  2. Investigation of a supersonic cruise fighter model flow field

    NASA Technical Reports Server (NTRS)

    Reubush, D. E.; Bare, E. A.

    1985-01-01

    An investigation was conducted in the Langley 16-Foot Transonic Tunnel to survey the flow field around a model of a supersonic cruise fighter configuration. Local values of angle of attack, side flow, Mach number, and total pressure ratio were measured with a single multi-holed probe in three survey areas on a model previously used for nacelle/nozzle integration investigations. The investigation was conducted at Mach numbers of 0.6, 0.9, and 1.2, and at angles of attack from 0 deg to 10 deg. The purpose of the investigation was to provide a base of experimental data with which theoretically determined data can be compared. To that end the data are presented in tables as well as graphically, and a complete description of the model geometry is included as fuselage cross sections and wing span stations. Measured local angles of attack were generally greater than free stream angle of attack above the wing and generally smaller below. There were large spanwise local angle-of-attack and side flow gradients above the wing at the higher free stream angles of attack.

  3. Mechanistic Insights into Elastin Degradation by Pseudolysin, the Major Virulence Factor of the Opportunistic Pathogen Pseudomonas aeruginosa

    PubMed Central

    Yang, Jie; Zhao, Hui-Lin; Ran, Li-Yuan; Li, Chun-Yang; Zhang, Xi-Ying; Su, Hai-Nan; Shi, Mei; Zhou, Bai-Cheng; Chen, Xiu-Lan; Zhang, Yu-Zhong

    2015-01-01

    Pseudolysin is the most abundant protease secreted by Pseudomonas aeruginosa and is the major extracellular virulence factor of this opportunistic human pathogen. Pseudolysin destroys human tissues by solubilizing elastin. However, the mechanisms by which pseudolysin binds to and degrades elastin remain elusive. In this study, we investigated the mechanism of action of pseudolysin on elastin binding and degradation by biochemical assay, microscopy and site-directed mutagenesis. Pseudolysin bound to bovine elastin fibers and preferred to attack peptide bonds with hydrophobic residues at the P1 and P1’ positions in the hydrophobic domains of elastin. The time-course degradation processes of both bovine elastin fibers and cross-linked human tropoelastin by pseudolysin were further investigated by microscopy. Altogether, the results indicate that elastin degradation by pseudolysin began with the hydrophobic domains on the fiber surface, followed by the progressive disassembly of macroscopic elastin fibers into primary structural elements. Moreover, our site-directed mutational results indicate that five hydrophobic residues in the S1-S1’ sub-sites played key roles in the binding of pseudolysin to elastin. This study sheds lights on the pathogenesis of P. aeruginosa infection. PMID:25905792

  4. autokonf - A Configuration Script Generator Implemented in Perl

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reus, J F

    This paper discusses configuration scripts in general and the scripting language issues involved. A brief description of GNU autoconf is provided along with a contrasting overview of autokonf, a configuration script generator implemented in Perl, whose macros are implemented in Perl, generating a configuration script in Perl. It is very portable, easily extensible, and readily mastered.

  5. Patient confidence regarding secondary lifestyle modification and knowledge of 'heart attack' symptoms following percutaneous revascularisation in Japan: a cross-sectional study.

    PubMed

    Kitakata, Hiroki; Kohno, Takashi; Kohsaka, Shun; Fujino, Junko; Nakano, Naomi; Fukuoka, Ryoma; Yuasa, Shinsuke; Maekawa, Yuichiro; Fukuda, Keiichi

    2018-03-16

    To assess patient perspectives on secondary lifestyle modification and knowledge of 'heart attack' after percutaneous coronary intervention (PCI) for coronary artery disease (CAD). Observational cross-sectional study. A single university-based hospital centre in Japan. In total, 236 consecutive patients with CAD who underwent PCI completed a questionnaire (age, 67.4±10.1 years; women, 14.8%; elective PCI, 75.4%). The survey questionnaire included questions related to confidence levels about (1) lifestyle modification at the time of discharge and (2) appropriate recognition of heart attack symptoms and reactions to these symptoms on a four-point Likert scale (1=not confident to 4=completely confident). The primary outcome assessed was the patients' confidence level regarding lifestyle modification and the recognition of heart attack symptoms. Overall, patients had a high level of confidence (confident or completely confident,>75%) about smoking cessation, alcohol restriction and medication adherence. However, they had a relatively low level of confidence (<50%) about the maintenance of blood pressure control, healthy diet, body weight and routine exercise (≥3 times/week). After adjustment, male sex (OR 3.61, 95% CI 1.11 to 11.8) and lower educational level (OR 3.25; 95% CI 1.70 to 6.23) were identified as factors associated with lower confidence levels. In terms of confidence in the recognition of heart attack, almost all respondents answered 'yes' to the item 'I should go to the hospital as soon as possible when I have a heart attack'; however, only 28% of the responders were confident in their ability to distinguish between heart attack symptoms and other conditions. There were substantial disparities in the confidence levels associated with lifestyle modification and recognition/response to heart attack. These gaps need to be studied further and disseminated to improve cardiovascular care. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. A generic template for automated bioanalytical ligand-binding assays using modular robotic scripts in support of discovery biotherapeutic programs.

    PubMed

    Duo, Jia; Dong, Huijin; DeSilva, Binodh; Zhang, Yan J

    2013-07-01

    Sample dilution and reagent pipetting are time-consuming steps in ligand-binding assays (LBAs). Traditional automation-assisted LBAs use assay-specific scripts that require labor-intensive script writing and user training. Five major script modules were developed on Tecan Freedom EVO liquid handling software to facilitate the automated sample preparation and LBA procedure: sample dilution, sample minimum required dilution, standard/QC minimum required dilution, standard/QC/sample addition, and reagent addition. The modular design of automation scripts allowed the users to assemble an automated assay with minimal script modification. The application of the template was demonstrated in three LBAs to support discovery biotherapeutic programs. The results demonstrated that the modular scripts provided the flexibility in adapting to various LBA formats and the significant time saving in script writing and scientist training. Data generated by the automated process were comparable to those by manual process while the bioanalytical productivity was significantly improved using the modular robotic scripts.

  7. Toward a Script Theory of Guidance in Computer-Supported Collaborative Learning

    PubMed Central

    Fischer, Frank; Kollar, Ingo; Stegmann, Karsten; Wecker, Christof

    2013-01-01

    This article presents an outline of a script theory of guidance for computer-supported collaborative learning (CSCL). With its 4 types of components of internal and external scripts (play, scene, role, and scriptlet) and 7 principles, this theory addresses the question of how CSCL practices are shaped by dynamically reconfigured internal collaboration scripts of the participating learners. Furthermore, it explains how internal collaboration scripts develop through participation in CSCL practices. It emphasizes the importance of active application of subject matter knowledge in CSCL practices, and it prioritizes transactive over nontransactive forms of knowledge application in order to facilitate learning. Further, the theory explains how external collaboration scripts modify CSCL practices and how they influence the development of internal collaboration scripts. The principles specify an optimal scaffolding level for external collaboration scripts and allow for the formulation of hypotheses about the fading of external collaboration scripts. Finally, the article points toward conceptual challenges and future research questions. PMID:23378679

  8. Detection and Prevention of Insider Threats in Database Driven Web Services

    NASA Astrophysics Data System (ADS)

    Chumash, Tzvi; Yao, Danfeng

    In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider both insider and outsider attacks in the third-party web hosting scenarios. We present SafeWS, a modular solution that is inserted between server side scripts and databases in order to prevent and detect website hijacking and unauthorized access to stored data. To achieve the required security, SafeWS utilizes a combination of lightweight cryptographic integrity and encryption tools, software engineering techniques, and security data management principles. We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.

  9. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    NASA Astrophysics Data System (ADS)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  10. The Next Generation of Ground Operations Command and Control; Scripting in C Sharp and Visual Basic

    NASA Technical Reports Server (NTRS)

    Ritter, George; Pedoto, Ramon

    2010-01-01

    This slide presentation reviews the use of scripting languages in Ground Operations Command and Control. It describes the use of scripting languages in a historical context, the advantages and disadvantages of scripts. It describes the Enhanced and Redesigned Scripting (ERS) language, that was designed to combine the features of a scripting language and the graphical and IDE richness of a programming language with the utility of scripting languages. ERS uses the Microsoft Visual Studio programming environment and offers custom controls that enable an ERS developer to extend the Visual Basic and C sharp language interface with the Payload Operations Integration Center (POIC) telemetry and command system.

  11. Novel Technology for Treating Individuals with Aphasia and Concomitant Cognitive Deficits

    PubMed Central

    Cherney, Leora R.; Halper, Anita S.

    2009-01-01

    Purpose This article describes three individuals with aphasia and concomitant cognitive deficits who used state-of-the-art computer software for training conversational scripts. Method Participants were assessed before and after 9 weeks of a computer script training program. For each participant, three individualized scripts were developed, recorded on the software, and practiced sequentially at home. Weekly meetings with the speech-language pathologist occurred to monitor practice and assess progress. Baseline and posttreatment scripts were audiotaped, transcribed, and compared to the target scripts for content, grammatical productivity, and rate of production of script-related words. Interviews were conducted at the conclusion of treatment. Results There was great variability in improvements across scripts, with two participants improving on two of their three scripts in measures of content, grammatical productivity, and rate of production of script-related words. One participant gained more than 5 points on the Aphasia Quotient of the Western Aphasia Battery. Five positive themes were consistently identified from exit interviews: increased verbal communication, improvements in other modalities and situations, communication changes noticed by others, increased confidence, and satisfaction with the software. Conclusion Computer-based script training potentially may be an effective intervention for persons with chronic aphasia and concomitant cognitive deficits. PMID:19158062

  12. Dominant heterosexual sexual scripts in emerging adulthood: conceptualization and measurement.

    PubMed

    Sakaluk, John K; Todd, Leah M; Milhausen, Robin; Lachowsky, Nathan J

    2014-01-01

    Sexual script research (Simon & Gagnon 1969 , 1986 ) bourgeoned following Simon and Gagnon's groundbreaking work. Empirical measurement of sexual script adherence has been limited, however, as no measures exist that have undergone rigorous development and validation. We conducted three studies to examine current dominant sexual scripts of heterosexual adults and to develop a measure of endorsement of these scripts. In Study 1, we conducted three focus groups of men ( n = 19) and four of women ( n = 20) to discuss the current scripts governing sexual behavior. Results supported scripts for sex drive, physical and emotional sex, sexual performance, initiation and gatekeeping, and evaluation of sexual others. In Study 2, we used these qualitative findings to develop a measure of script endorsement, the Sexual Script Scale. Factor analysis of data from 721 participants revealed six interrelated factors demonstrating initial construct validity. In Study 3, confirmatory factor analysis of a separate sample of 289 participants supported the model from Study 2, and evidence of factorial invariance and test-retest reliability was obtained. This article presents the results of these studies, documenting the process of scale development from formative research through to confirmatory testing, and suggests future directions for the continued development of sexual scripting theory.

  13. Gold Digger or Video Girl: the salience of an emerging hip-hop sexual script.

    PubMed

    Ross, Jasmine N; Coleman, Nicole M

    2011-02-01

    Concerns have been expressed in the common discourse and scholarly literature about the negative influence of Hip-Hop on its young listeners' ideas about sex and sexuality. Most of the scholarly literature has focused on the impact of this urban, Black media on young African American girls' sexual self-concept and behaviours. In response to this discourse, Stephens and Phillips (2003) proposed a Hip-Hop sexual scripting model that theorises about specific sexual scripts for young African American women. Their model includes eight different sexual scripts including the Gold Digger script. The present study proposes a ninth emerging script - the Video Girl. Participants were 18 female African American college students, between the ages of 18 and 30 years old from a large urban public university in the Southwest USA. Using q-methodology the present study found support for the existence of a Video Girl script. In addition, the data indicates that this script is distinct but closely related to Stephens and Phillips' Gold Digger script. These findings support their theory by suggesting that Hip-Hop sexual scripts are salient and hold real meaning for this sample.

  14. Shallow and deep orthographies in Hebrew: the role of vowelization in reading development for unvowelized scripts.

    PubMed

    Schiff, Rachel

    2012-12-01

    The present study explored the speed, accuracy, and reading comprehension of vowelized versus unvowelized scripts among 126 native Hebrew speaking children in second, fourth, and sixth grades. Findings indicated that second graders read and comprehended vowelized scripts significantly more accurately and more quickly than unvowelized scripts, whereas among fourth and sixth graders reading of unvowelized scripts developed to a greater degree than the reading of vowelized scripts. An analysis of the mediation effect for children's mastery of vowelized reading speed and accuracy on their mastery of unvowelized reading speed and comprehension revealed that in second grade, reading accuracy of vowelized words mediated the reading speed and comprehension of unvowelized scripts. In the fourth grade, accuracy in reading both vowelized and unvowelized words mediated the reading speed and comprehension of unvowelized scripts. By sixth grade, accuracy in reading vowelized words offered no mediating effect, either on reading speed or comprehension of unvowelized scripts. The current outcomes thus suggest that young Hebrew readers undergo a scaffolding process, where vowelization serves as the foundation for building initial reading abilities and is essential for successful and meaningful decoding of unvowelized scripts.

  15. OpenSesame: an open-source, graphical experiment builder for the social sciences.

    PubMed

    Mathôt, Sebastiaan; Schreij, Daniel; Theeuwes, Jan

    2012-06-01

    In the present article, we introduce OpenSesame, a graphical experiment builder for the social sciences. OpenSesame is free, open-source, and cross-platform. It features a comprehensive and intuitive graphical user interface and supports Python scripting for complex tasks. Additional functionality, such as support for eyetrackers, input devices, and video playback, is available through plug-ins. OpenSesame can be used in combination with existing software for creating experiments.

  16. Techniques for Large-Scale Bacterial Genome Manipulation and Characterization of the Mutants with Respect to In Silico Metabolic Reconstructions.

    PubMed

    diCenzo, George C; Finan, Turlough M

    2018-01-01

    The rate at which all genes within a bacterial genome can be identified far exceeds the ability to characterize these genes. To assist in associating genes with cellular functions, a large-scale bacterial genome deletion approach can be employed to rapidly screen tens to thousands of genes for desired phenotypes. Here, we provide a detailed protocol for the generation of deletions of large segments of bacterial genomes that relies on the activity of a site-specific recombinase. In this procedure, two recombinase recognition target sequences are introduced into known positions of a bacterial genome through single cross-over plasmid integration. Subsequent expression of the site-specific recombinase mediates recombination between the two target sequences, resulting in the excision of the intervening region and its loss from the genome. We further illustrate how this deletion system can be readily adapted to function as a large-scale in vivo cloning procedure, in which the region excised from the genome is captured as a replicative plasmid. We next provide a procedure for the metabolic analysis of bacterial large-scale genome deletion mutants using the Biolog Phenotype MicroArray™ system. Finally, a pipeline is described, and a sample Matlab script is provided, for the integration of the obtained data with a draft metabolic reconstruction for the refinement of the reactions and gene-protein-reaction relationships in a metabolic reconstruction.

  17. Masturbation mimicking seizure in an infant.

    PubMed

    Deda, G; Caksen, H; Suskan, E; Gümüs, D

    2001-08-01

    A 3.5-month-old boy was referred to our hospital with the diagnosis of infantile spasm. His developmental milestones and physical examination were normal. During the follow-up we recorded about six to nine attacks a day and the duration of attacks was changed between 15 seconds-1.5 minutes. During the episodic attacks he was flushed and had tonic posturing associated with crossing of thighs, without loss of consciousness and his eye movements were normal. Routine and long-term electroencephalogram (EEG) were normal during attack. The patient was diagnosed as masturbation according to the clinical and EEG findings. In conclusion, we would like to stress that masturbation should also be considered in infants who were admitted with complaint of seizure, and aside from EEG monitoring a detailed history and careful observation are very important factors in differential diagnosis of these two different conditions.

  18. Bells, bomas and beefsteak: complex patterns of human-predator conflict at the wildlife-agropastoral interface in Zimbabwe.

    PubMed

    Loveridge, Andrew J; Kuiper, Timothy; Parry, Roger H; Sibanda, Lovemore; Hunt, Jane Hunt; Stapelkamp, Brent; Sebele, Lovelater; Macdonald, David W

    2017-01-01

    Reports of livestock depredation by large predators were systematically collected at three study sites in northwestern Zimbabwe from 2008-2013. We recorded 1,527 incidents (2,039 animals killed and 306 injured). Lions ( Panthera leo ) and spotted hyaenas ( Crocuta crocuta ) were mostly responsible, and cattle and donkeys most frequently attacked. Patterns of predation were variable among study sites. Nevertheless, some overall patterns were apparent. Predators selected livestock close to the size of their preferred wild prey, suggesting behaviours evolved to optimise foraging success may determine the domestic species primarily preyed upon. Most attacks occurred when livestock were roaming outside and away from their 'home' protective enclosures at night. Hyaena attacks were largely nocturnal; lions and leopards ( Panthera pardus ) were more flexible, with attacks occurring by day and at night. Livestock fitted with bells suffered a disproportionate number of attacks; the sound of bells appears to have conditioned predators to associate the sound with foraging opportunities. Lion and hyaena attacks on cattle were more frequent in the wet season suggesting that seasonal herding practices may result in cattle vulnerability. Only a small proportion of conflict incidents were reported to wildlife management officials with a bias towards lion predation events, potentially prejudicing conflict management policies. Predation on domestic stock involves an intricate interplay between predator behaviour and ecology on the one hand and human behaviour and husbandry practices on the other. Our data suggest that improved livestock husbandry (supervision of grazing animals, protection at night in strong enclosures) would greatly reduce livestock depredation.

  19. Bells, bomas and beefsteak: complex patterns of human-predator conflict at the wildlife-agropastoral interface in Zimbabwe

    PubMed Central

    Kuiper, Timothy; Parry, Roger H.; Sibanda, Lovemore; Hunt, Jane Hunt; Stapelkamp, Brent; Sebele, Lovelater; Macdonald, David W.

    2017-01-01

    Reports of livestock depredation by large predators were systematically collected at three study sites in northwestern Zimbabwe from 2008–2013. We recorded 1,527 incidents (2,039 animals killed and 306 injured). Lions (Panthera leo) and spotted hyaenas (Crocuta crocuta) were mostly responsible, and cattle and donkeys most frequently attacked. Patterns of predation were variable among study sites. Nevertheless, some overall patterns were apparent. Predators selected livestock close to the size of their preferred wild prey, suggesting behaviours evolved to optimise foraging success may determine the domestic species primarily preyed upon. Most attacks occurred when livestock were roaming outside and away from their ‘home’ protective enclosures at night. Hyaena attacks were largely nocturnal; lions and leopards (Panthera pardus) were more flexible, with attacks occurring by day and at night. Livestock fitted with bells suffered a disproportionate number of attacks; the sound of bells appears to have conditioned predators to associate the sound with foraging opportunities. Lion and hyaena attacks on cattle were more frequent in the wet season suggesting that seasonal herding practices may result in cattle vulnerability. Only a small proportion of conflict incidents were reported to wildlife management officials with a bias towards lion predation events, potentially prejudicing conflict management policies. Predation on domestic stock involves an intricate interplay between predator behaviour and ecology on the one hand and human behaviour and husbandry practices on the other. Our data suggest that improved livestock husbandry (supervision of grazing animals, protection at night in strong enclosures) would greatly reduce livestock depredation. PMID:28149682

  20. A script to highlight hydrophobicity and charge on protein surfaces

    PubMed Central

    Hagemans, Dominique; van Belzen, Ianthe A. E. M.; Morán Luengo, Tania; Rüdiger, Stefan G. D.

    2015-01-01

    The composition of protein surfaces determines both affinity and specificity of protein-protein interactions. Matching of hydrophobic contacts and charged groups on both sites of the interface are crucial to ensure specificity. Here, we propose a highlighting scheme, YRB, which highlights both hydrophobicity and charge in protein structures. YRB highlighting visualizes hydrophobicity by highlighting all carbon atoms that are not bound to nitrogen and oxygen atoms. The charged oxygens of glutamate and aspartate are highlighted red and the charged nitrogens of arginine and lysine are highlighted blue. For a set of representative examples, we demonstrate that YRB highlighting intuitively visualizes segments on protein surfaces that contribute to specificity in protein-protein interfaces, including Hsp90/co-chaperone complexes, the SNARE complex and a transmembrane domain. We provide YRB highlighting in form of a script that runs using the software PyMOL. PMID:26528483

  1. Enabling Remote and Automated Operations at The Red Buttes Observatory

    NASA Astrophysics Data System (ADS)

    Ellis, Tyler G.; Jang-Condell, Hannah; Kasper, David; Yeigh, Rex R.

    2016-01-01

    The Red Buttes Observatory (RBO) is a 60 centimeter Cassegrain telescope located ten miles south of Laramie, Wyoming. The size and proximity of the telescope comfortably make the site ideal for remote and automated observations. This task required development of confidence in control systems for the dome, telescope, and camera. Python and WinSCP script routines were created for the management of science images and weather. These scripts control the observatory via the ASCOM standard libraries and allow autonomous operation after initiation.The automation tasks were completed primarily to rejuvenate an aging and underutilized observatory with hopes to contribute to an international exoplanet hunting team with other interests in potentially hazardous asteroid detection. RBO is owned and operated solely by the University of Wyoming. The updates and proprietor status have encouraged the development of an undergraduate astronomical methods course including hands-on experience with a research telescope, a rarity in bachelor programs for astrophysics.

  2. Contribution to a Theory of CSCL Scripts: Taking into Account the Appropriation of Scripts by Learners

    ERIC Educational Resources Information Center

    Tchounikine, Pierre

    2016-01-01

    This paper presents a contribution to the development of a theory of CSCL scripts, i.e., an understanding of what happens when learners engage in such scripts. It builds on the Script Theory of Guidance (SToG) recently proposed by (Fischer et al. in "Educational Psychologist," 48(1), 56-66, 2013). We argue that, when engaged in a…

  3. Deterring Malicious Behavior in Cyberspace

    DTIC Science & Technology

    2015-01-01

    Malicious Behavior in Cyberspace Strategic Studies Quarterly ♦ Spring 2015 [ 79 ] 8. Chris Pepper, ed., Defending against Denial of Service Attacks...Jackson Higgins , “Chinese Cyberespionage Tool Updated for Traditional Cyber- crime,” Dark Reading, 27 November 2012, http://www.darkreading.com/attacks...content /uploads/sites/43/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf. 13. Kelly Jackson Higgins , “ ‘NetTraveler’ Cyberespionage Campaign

  4. Effectiveness of permethrin plus-C (Masterline®) and carbaryl (Sevin SL®) for protecting individual, high-value pines from bark beetle attack

    Treesearch

    Christopher J. Fettig; Thomas E. DeGomez; Kenneth E. Gibson; Christopher J. Dabney; Robert R. Borys

    2006-01-01

    Bark beetles (Coleoptera: Scolytidae) are commonly recognized as the most important mortality agent in western coniferous forests. High value trees, such as those located in residential, recreational, or administrative sites, are particularly susceptible to attack. Regardless of landowner objectives, tree losses in these unique environments generally have a...

  5. Environmental Assessment, Los Angeles AFB Parking Structure

    DTIC Science & Technology

    2007-08-01

    signed legislation that defined the Anti - Terrorism and Force Protection requirements for military installations. Based on these requirements, surface...11, 2001 terrorist attacks occurred. Following these attacks, Congress passed, and the President signed, legislation that defined the Anti Terrorism ...and to provide the necessary anti - terrorism security, LAAFB has initiated a project to consolidate the surface parking at the Raytheon site into a

  6. Land Application of Wastes: An Educational Program. Crop Selection and Management Alternatives - Module 20, Objectives, and Script.

    ERIC Educational Resources Information Center

    Clarkson, W. W.; And Others

    This module enumerates the benefits to be derived from cropping at a waste application site and criteria to be used in selecting a crop for use in a particular situation. Following basic discussions of the requirements of various crops for water, soil-plant-air moisture potentials, crop water tolerance, nutrient removals by various crops, and…

  7. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults.

    PubMed

    Swanoski, Michael T; Lutfiyya, May Nawal; Amaro, Maria L; Akers, Michael F; Huot, Krista L

    2012-06-01

    Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS) database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP), timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. The weighted n for this study overall was 103,262,115 U.S. adults  > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR=1.218 95%CI 1.216-1.219) rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR=1.353 95%CI 1.352-1.354), >65 years of age (OR=1.369 95%CI 1.368-1.371), African American (OR=1.892 95%CI 1.889-1.894), not educated beyond high school (OR=1.400 955CI 1.399-1.402), uninsured (OR=1.308 95%CI 1.3-6-1.310), without a HCP (OR=1.216 95%CI 1.215-1.218), and living in a household with an annual income of  < $50,000 (OR=1.429 95%CI 1.428-1.431). Analysis identified clear disparities between the knowledge levels U.S. adults have regarding heart attack and stroke symptoms. These disparities should guide educational endeavors focusing on improving knowledge of heart attack and stroke symptoms.

  8. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    PubMed Central

    2012-01-01

    Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS) database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP), timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219) rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354), >65 years of age (OR = 1.369 95%CI 1.368-1.371), African American (OR = 1.892 95%CI 1.889-1.894), not educated beyond high school (OR = 1.400 955CI 1.399-1.402), uninsured (OR = 1.308 95%CI 1.3-6-1.310), without a HCP (OR = 1.216 95%CI 1.215-1.218), and living in a household with an annual income of < $50,000 (OR = 1.429 95%CI 1.428-1.431). Conclusions Analysis identified clear disparities between the knowledge levels U.S. adults have regarding heart attack and stroke symptoms. These disparities should guide educational endeavors focusing on improving knowledge of heart attack and stroke symptoms. PMID:22490185

  9. Increasing play-based commenting in children with autism spectrum disorder using a novel script-frame procedure.

    PubMed

    Groskreutz, Mark P; Peters, Amy; Groskreutz, Nicole C; Higbee, Thomas S

    2015-01-01

    Children with developmental disabilities may engage in less frequent and more repetitious language than peers with typical development. Scripts have been used to increase communication by teaching one or more specific statements and then fading the scripts. In the current study, preschoolers with developmental disabilities experienced a novel script-frame protocol and learned to make play-related comments about toys. After the script-frame protocol, commenting occurred in the absence of scripts, with untrained play activities, and included untrained comments. © Society for the Experimental Analysis of Behavior.

  10. TH-D-BRB-04: Pinnacle Scripting: Improving Efficiency While Maintaining Safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, J.

    2016-06-15

    Scripting capabilities and application programming interfaces (APIs) are becoming commonly available in modern treatment planning systems. These links to the treatment planning system (TPS) allow users to read data from the TPS, and in some cases use TPS functionality and write data back to the TPS. Such tools are powerful extensions, allowing automation of routine clinical tasks and supporting research, particularly research involving repetitive tasks on large patient populations. The data and functionality exposed by scripting/API capabilities is vendor dependent, as are the languages used by script/API engines, such as the Microsoft .NET framework or Python. Scripts deployed in amore » clinical environment must be commissioned and validated like any other software tool. This session will provide an overview of scripting applications and a discussion of best practices, followed by a practical introduction to the scripting capabilities of three commercial treatment planning systems. Learning Objectives: Understand the scripting capabilities available in several treatment planning systems Learn how to get started using scripting capabilities Understand the best practices for safe script deployment in a clinical environment R. Popple, Varian Medical Systems has provided research support unrelated to the topic of this session.R. Cardan, Varian Medical Systems for grant research, product evaluation, and teaching honorarium.« less

  11. Hypersonic shock wave interaction and impingement

    NASA Technical Reports Server (NTRS)

    Kessler, W. C.; Reilly, J. F.; Sampatacos, E.

    1971-01-01

    An experimental investigation was conducted on space shuttle type, body-wing configurations. The purpose of the investigation was to determine the effects of body and wing geometry on the hypersonic shock structure about these vehicles and on the resulting surface impingement of interior flow field shock and expansion waves. Schlieren photographs and thermographic phosphor paint data were obtained on three body cross sections with three wing planforms at 40, 50 and 60 degree angles of attack. Specific configuration data were obtained at 0 and 30 degree angles of attack to develop trends. These data were obtained at a nominal Mach number of 13.5 and a freestream unit Reynolds number of 0.7 million per foot. For comparison with these straight wing configurations, data were also obtained on a model of a point design, high cross-range, delta wing orbiter at 40, 50 and 60 degree angles of attack. As expected, the data on this delta wing orbiter indicated that the shock intersection/impingement phenomena associated with straight wing vehicles are considerably more complex than, and result in both windward and leeward surface heating regions not present on, the delta configuration.

  12. Control integration concept for hypersonic cruise-turn maneuvers

    NASA Technical Reports Server (NTRS)

    Raney, David L.; Lallman, Frederick J.

    1992-01-01

    Piloting difficulties associated with conducting aircraft maneuvers in hypersonic flight are caused in part by the nonintuitive nature of the aircraft response and the stringent constraints anticipated on allowable angle of attack and dynamic pressure variations. An approach is documented that provides precise, coordinated maneuver control during excursions from a hypersonic cruise flight path and the necessary flight condition constraints. The approach is to achieve specified guidance commands by resolving altitude and cross range errors into a load factor and bank angle command by using a coordinate transformation that acts as an interface between outer and inner loop flight controls. This interface, referred to as a 'resolver', applies constraints on angle of attack and dynamic pressure perturbations while prioritizing altitude regulation over cross range. An unpiloted test simulation, in which the resolver was used to drive inner loop flight controls, produced time histories of responses to guidance commands and atmospheric disturbances at Mach numbers of 6, 10, 15, and 20. Angle of attack and throttle perturbation constraints, combined with high speed flight effects and the desire to maintain constant dynamic pressure, significantly impact the maneuver envelope for a hypersonic vehicle.

  13. Time-lagged relationships between leadership behaviors and psychological distress after a workplace terrorist attack.

    PubMed

    Birkeland, Marianne Skogbrott; Nielsen, Morten Birkeland; Knardahl, Stein; Heir, Trond

    2016-05-01

    The impact of leadership practices on employee health may be especially evident after extreme events that have physical, psychological, or material consequences for the members of an organization. In this prospective study, we aimed to examine the association between leadership behavior and psychological distress in employees who had experienced a workplace terror attack. Ten and 22 months after the 2011 Oslo bombing attack targeting their workplace, ministerial employees (n = 2272) responded to a questionnaire assessing fair, empowering, supportive, and laissez-faire leadership, as well as psychological distress. Cross-sectional and time-lagged associations between the constructs were tested using structural equation modeling. Cross-sectionally, higher levels of supportive leadership were associated with lower levels of psychological distress. Longitudinally, negative relationships were found between psychological distress and subsequent ratings of fair and empowering leadership. Supportive leadership was associated with employees' psychological health after trauma, but seems not to have long-term effects on subsequent psychological distress. Rather, psychological distress may lead the employees to perceive their leaders as more negative across time.

  14. Battle Analysis: Rapido River Crossing, Offensive, Deliberate Attack, River Crossing, January 1944

    DTIC Science & Technology

    1984-05-01

    Even the few employed were difficult to use due to the slippery surface and the lack of handrails. Direct and indirect fire chewed them up. The...were placed in the water and went down quickly, sometimes carrying men loaded with heavy combat equipment. 42 mmmimm^^mtm—mm^ elm ^tmmMMM

  15. Cultural neurolinguistics.

    PubMed

    Chen, Chuansheng; Xue, Gui; Mei, Leilei; Chen, Chunhui; Dong, Qi

    2009-01-01

    As the only species that evolved to possess a language faculty, humans have been surprisingly generative in creating a diverse array of language systems. These systems vary in phonology, morphology, syntax, and written forms. Before the advent of modern brain-imaging techniques, little was known about how differences across languages are reflected in the brain. This chapter aims to provide an overview of an emerging area of research - cultural neurolinguistics - that examines systematic cross-cultural/crosslinguistic variations in the neural networks of languages. We first briefly describe general brain networks for written and spoken languages. We then discuss language-specific brain regions by highlighting differences in neural bases of different scripts (logographic vs. alphabetic scripts), orthographies (transparent vs. nontransparent orthographies), and tonality (tonal vs. atonal languages). We also discuss neural basis of second language and the role of native language experience in second-language acquisition. In the last section, we outline a general model that integrates culture and neural bases of language and discuss future directions of research in this area.

  16. dREL: a relational expression language for dictionary methods.

    PubMed

    Spadaccini, Nick; Castleden, Ian R; du Boulay, Doug; Hall, Sydney R

    2012-08-27

    The provision of precise metadata is an important but a largely underrated challenge for modern science [Nature 2009, 461, 145]. We describe here a dictionary methods language dREL that has been designed to enable complex data relationships to be expressed as formulaic scripts in data dictionaries written in DDLm [Spadaccini and Hall J. Chem. Inf. Model.2012 doi:10.1021/ci300075z]. dREL describes data relationships in a simple but powerful canonical form that is easy to read and understand and can be executed computationally to evaluate or validate data. The execution of dREL expressions is not a substitute for traditional scientific computation; it is to provide precise data dependency information to domain-specific definitions and a means for cross-validating data. Some scientific fields apply conventional programming languages to methods scripts but these tend to inhibit both dictionary development and accessibility. dREL removes the programming barrier and encourages the production of the metadata needed for seamless data archiving and exchange in science.

  17. Cross-Linguistic Similarity and Task Demands in Japanese-English Bilingual Processing

    PubMed Central

    Allen, David B.; Conklin, Kathy

    2013-01-01

    Even in languages that do not share script, bilinguals process cognates faster than matched noncognates in a range of tasks. The current research more fully explores what underpins the cognate ‘advantage’ in different script bilinguals (Japanese-English). To do this, instead of the more traditional binary cognate/noncognate distinction, the current study uses continuous measures of phonological and semantic overlap, L2 (second language) proficiency and lexical variables (e.g., frequency). An L2 picture naming (Experiment 1) revealed a significant interaction between phonological and semantic similarity and demonstrates that degree of overlap modulates naming times. In lexical decision (Experiment 2), increased phonological similarity (e.g., bus/basu/vs. radio/rajio/) lead to faster response times. Interestingly, increased semantic similarity slowed response times in lexical decision. The studies also indicate how L2 proficiency and lexical variables modulate L2 word processing. These findings are explained in terms of current models of bilingual lexical processing. PMID:24015266

  18. Specifying Computer-Supported Collaboration Scripts

    ERIC Educational Resources Information Center

    Kobbe, Lars; Weinberger, Armin; Dillenbourg, Pierre; Harrer, Andreas; Hamalainen, Raija; Hakkinen, Paivi; Fischer, Frank

    2007-01-01

    Collaboration scripts facilitate social and cognitive processes of collaborative learning by shaping the way learners interact with each other. Computer-supported collaboration scripts generally suffer from the problem of being restrained to a specific learning platform. A standardization of collaboration scripts first requires a specification of…

  19. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks

    NASA Astrophysics Data System (ADS)

    Akiyama, Mitsuaki; Iwamura, Makoto; Kawakoya, Yuhei; Aoki, Kazufumi; Itoh, Mitsutaka

    Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.

  20. Framework for End-User Programming of Cross-Smart Space Applications

    PubMed Central

    Palviainen, Marko; Kuusijärvi, Jarkko; Ovaska, Eila

    2012-01-01

    Cross-smart space applications are specific types of software services that enable users to share information, monitor the physical and logical surroundings and control it in a way that is meaningful for the user's situation. For developing cross-smart space applications, this paper makes two main contributions: it introduces (i) a component design and scripting method for end-user programming of cross-smart space applications and (ii) a backend framework of components that interwork to support the brunt of the RDFScript translation, and the use and execution of ontology models. Before end-user programming activities, the software professionals must develop easy-to-apply Driver components for the APIs of existing software systems. Thereafter, end-users are able to create applications from the commands of the Driver components with the help of the provided toolset. The paper also introduces the reference implementation of the framework, tools for the Driver component development and end-user programming of cross-smart space applications and the first evaluation results on their application. PMID:23202169

  1. Transformative Rendering of Internet Resources

    DTIC Science & Technology

    2012-10-01

    4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any

  2. Security Design Flaws That Affect Usability in Online Banking

    ERIC Educational Resources Information Center

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  3. Collaboration Scripts--A Conceptual Analysis

    ERIC Educational Resources Information Center

    Kollar, Ingo; Fischer, Frank; Hesse, Friedrich W.

    2006-01-01

    This article presents a conceptual analysis of collaboration scripts used in face-to-face and computer-mediated collaborative learning. Collaboration scripts are scaffolds that aim to improve collaboration through structuring the interactive processes between two or more learning partners. Collaboration scripts consist of at least five components:…

  4. Comparison of high-angle-of-attack slender-body theory and exact solutions for potential flow over an ellipsoid

    NASA Technical Reports Server (NTRS)

    Hemsch, Michael J.

    1990-01-01

    The accuracy of high-alpha slender-body theory (HASBT) for bodies with elliptical cross-sections is presently demonstrated by means of a comparison with exact solutions for incompressible potential flow over a wide range of ellipsoid geometries and angles of attack and sideslip. The addition of the appropriate trigonometric coefficients to the classical slender-body theory decomposition yields the formally correct HASBT, and results in accuracies previously considered unattainable.

  5. Anzio to Libya: Strategic Direction in Coalition Warfare

    DTIC Science & Technology

    2012-03-22

    and Nettuno—2,300 British, 7,862 Americans, a cross or star bearing their names. A list in marble contains the names of 3,094 Americans missing in...Article 5 of the North Atlantic Treaty. Article 5 specifies that an attack on one nation is considered an attack on all. The impact of the Greek debt...the Jordanians and Qataris provided airlift, the Italians, French, and Greeks hosted the air armada and Germany provided logistics and access to United

  6. The role of scripts in psychological maladjustment and psychotherapy.

    PubMed

    Demorest, Amy P

    2013-12-01

    This article considers the value of script theory for understanding psychological maladjustment and psychotherapy. Scripts are implicit expectations that individuals develop to understand and deal with emotionally significant life experiences. Script theory provides a way to understand the complex patterns of thinking, feeling, and behavior that characterize personal consistency, as well as a way to address personality development and change. As such it is a vital model for understanding both personality and clinical phenomena. The article begins by describing script theory and noting similar models in personality and clinical psychology. It then outlines both idiographic and nomothetic methods for assessing scripts and discusses the strengths and weaknesses of each. A survey of the author's program of research follows, using a nomothetic method to examine the role of interpersonal scripts in psychological maladjustment and psychotherapy. The article concludes by presenting a promising method for future research synthesizing idiographic and nomothetic approaches and raising important questions for future research on the role of scripts in psychological maladjustment and psychotherapy. © 2012 Wiley Periodicals, Inc.

  7. ScriptingRT: A Software Library for Collecting Response Latencies in Online Studies of Cognition

    PubMed Central

    Schubert, Thomas W.; Murteira, Carla; Collins, Elizabeth C.; Lopes, Diniz

    2013-01-01

    ScriptingRT is a new open source tool to collect response latencies in online studies of human cognition. ScriptingRT studies run as Flash applets in enabled browsers. ScriptingRT provides the building blocks of response latency studies, which are then combined with generic Apache Flex programming. Six studies evaluate the performance of ScriptingRT empirically. Studies 1–3 use specialized hardware to measure variance of response time measurement and stimulus presentation timing. Studies 4–6 implement a Stroop paradigm and run it both online and in the laboratory, comparing ScriptingRT to other response latency software. Altogether, the studies show that Flash programs developed in ScriptingRT show a small lag and an increased variance in response latencies. However, this did not significantly influence measured effects: The Stroop effect was reliably replicated in all studies, and the found effects did not depend on the software used. We conclude that ScriptingRT can be used to test response latency effects online. PMID:23805326

  8. Automatic script identification from images using cluster-based templates

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hochberg, J.; Kerns, L.; Kelly, P.

    We have developed a technique for automatically identifying the script used to generate a document that is stored electronically in bit image form. Our approach differs from previous work in that the distinctions among scripts are discovered by an automatic learning procedure, without any handson analysis. We first develop a set of representative symbols (templates) for each script in our database (Cyrillic, Roman, etc.). We do this by identifying all textual symbols in a set of training documents, scaling each symbol to a fixed size, clustering similar symbols, pruning minor clusters, and finding each cluster`s centroid. To identify a newmore » document`s script, we identify and scale a subset of symbols from the document and compare them to the templates for each script. We choose the script whose templates provide the best match. Our current system distinguishes among the Armenian, Burmese, Chinese, Cyrillic, Ethiopic, Greek, Hebrew, Japanese, Korean, Roman, and Thai scripts with over 90% accuracy.« less

  9. Comparison of the Experimental and Theoretical Distribution of Lift on a Slender Inclined Body of Revolution at M = 2

    NASA Technical Reports Server (NTRS)

    Perkins, Edward W; Kuehn, Donald M

    1953-01-01

    Pressure distributions and force characteristics have been determined for a body of revolution consisting of a fineness ratio 5.75, circular-arc, ogival nose tangent to a cylindrical afterbody for an angle-of-attack range of 0 degrees to 35.5 degrees. The free-stream Mach number was 1.98 and the free-stream Reynolds number was approximately 0.5 x 10 sup 6, based on body diameter. Comparison of the theoretical and experimental pressure distributions shows that for zero lift, either slender-body theory or higher-order theories yield results which are in good agreement with experiment. For the lifting case, good agreement with theory is found only for low angles of attack and for the region in which the body cross-sectional area is increasing in the downstream direction. Because of the effects of cross-flow separation and the effects of compressibility due to the high cross-flow Mach numbers at large angles of attack, the experimental pressure distributions differ from those predicted by potential theory. Although the flow about the inclined body was, in general, similar to that assumed as the basis for Allen's method of estimating the forces resulting from viscous effects (NACA RM A91I26), the distribution of the forces was significantly different from that assumed. Nevertheless, the lift and pitching-moment characteristics were in fair agreement with the estimated value.

  10. Novel technology for treating individuals with aphasia and concomitant cognitive deficits.

    PubMed

    Cherney, Leora R; Halper, Anita S

    2008-01-01

    This article describes three individuals with aphasia and concomitant cognitive deficits who used state-of-theart computer software for training conversational scripts. Participants were assessed before and after 9 weeks of a computer script training program. For each participant, three individualized scripts were developed, recorded on the software, and practiced sequentially at home. Weekly meetings with the speech-language pathologist occurred to monitor practice and assess progress. Baseline and posttreatment scripts were audiotaped, transcribed, and compared to the target scripts for content, grammatical productivity, and rate of production of script-related words. Interviews were conducted at the conclusion of treatment. There was great variability in improvements across scripts, with two participants improving on two of their three scripts in measures of content, grammatical productivity, and rate of production of scriptrelated words. One participant gained more than 5 points on the Aphasia Quotient of the Western Aphasia Battery. Five positive themes were consistently identified from exit interviews: increased verbal communication, improvements in other modalities and situations, communication changes noticed by others, increased confidence, and satisfaction with the software. Computer-based script training potentially may be an effective intervention for persons with chronic aphasia and concomitant cognitive deficits.

  11. Gender and Ethnicity in Dating, Hanging Out, and Hooking Up: Sexual Scripts Among Hispanic and White Young Adults.

    PubMed

    Eaton, Asia A; Rose, Suzanna M; Interligi, Camille; Fernandez, Katherine; McHugh, Maureen

    2016-09-01

    We examined the scripts associated with heterosexual Hispanic and White young adults' most recent initial sexual or romantic encounter using two samples of heterosexual undergraduates: 224 Hispanic students (49% female) and 316 White students (51% female). Scripts were identified for three types of encounters: dating, hanging out, and hooking up. The three scripts had more than half of their actions in common. Items such as get to know one another, feel aroused, and engage in physical contact were present across all scripts for all participant groups. As expected, traditional gender roles were present within all scripts, but more so for dates than for hangouts and hookups. Men reported a higher presence of traditional gender roles than women across scripts and put a higher priority on the goal of physical intimacy across all scripts. Dating was the most prevalent script for all young adults, contradicting contemporary claims that "dating is dead." In terms of ethnicity, a higher proportion of Hispanic than White young adults went on dates, and a higher proportion of White students went on hookups, implying that social and contextual variables are important in understanding young adults' intimate relationships.

  12. Grain boundary engineering for control of tellurium diffusion in GH3535 alloy

    NASA Astrophysics Data System (ADS)

    Fu, Cai-Tao; Yinling, Wang; Chu, Xiang-Wei; Jiang, Li; Zhang, Wen-Zhu; Bai, Qin; Xia, Shuang; Leng, Bin; Li, Zhi-Jun; Ye, Xiang-Xi; Liu, Fang

    2017-12-01

    The effect of grain boundary engineering (GBE) on the Te diffusion along the surface grain boundaries was investigated in GH3535 alloy. It can be found that GBE treatment increases obviously the fraction of low-Σ coincidence site lattice (CSL) boundaries, especially the Σ3 ones, and introduces the large-size grain clusters. When the as-received (AR) and GBE-treated (GBET) specimens were exposed to Te vapor, only Σ3 boundaries were found to be resistant to Te diffusion. From the cross section and the surface, the fewer Te-attacked grain boundaries and the thinner corrosion layer can be observed in the GBET sample. The improvement of resistance to Te diffusion in the GBET sample can be attributed to the large size grain-clusters associated with high proportion of the Σ3n boundaries.

  13. KSC-2011-1485

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- Members of the Brevard Police and Fire Pipes and Drums kick off the "The National 9/11 Flag" stitching ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  14. KSC-2011-1489

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- Chief of Fire Training George Hoggard with NASA Kennedy Space Center Protective Services contributes stitches to the "National 9/11 Flag" during a ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  15. KSC-2011-1491

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- Kelvin Manning, associate director for Business Operations at NASA's Kennedy Space Center, contributes stitches to the "National 9/11 Flag" during a ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  16. KSC-2011-1490

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- Joe Dowdy, special operations manager at NASA's Kennedy Space Center, contributes stitches to the "National 9/11 Flag" during a ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  17. KSC-2011-1486

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- Members of the Brevard Police and Fire Pipes and Drums kick off the "The National 9/11 Flag" stitching ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  18. LDV Surveys Over a Fighter Model at Moderate to High Angles of Attack

    NASA Technical Reports Server (NTRS)

    Sellers, William L., III; Meyers, James F.; Hepner, Timothy E.

    2004-01-01

    The vortex flowfield over an advanced twin-tailed fighter configuration was measured in a low-speed wind tunnel at two angles of attack. The primary test data consisted of 3-component velocity surveys obtained using a Laser Doppler Velocimeter. Laser light sheet and surface flow visualization were also obtained to provide insight into the flowfield structure. Time-averaged velocities and the root mean square of the velocity fluctuations were obtained at two cross-sections above the model. At 15 degrees angle of attack, the vortices generated by the wing leading edge extension (LEX) were unburst over the model and passed outboard of the vertical tail. At 25 degrees angle of attack, the vortices burst in the vicinity of the wing-LEX intersection and impact directly on the vertical tails. The RMS levels of the velocity fluctuations reach values of approximately 30% in the region of the vertical tails.

  19. Investigation of High-alpha Lateral-directional Control Power Requirements for High-performance Aircraft

    NASA Technical Reports Server (NTRS)

    Foster, John V.; Ross, Holly M.; Ashley, Patrick A.

    1993-01-01

    Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high-angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high-angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes ground-based piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.

  20. Investigation of high-alpha lateral-directional control power requirements for high-performance aircraft

    NASA Technical Reports Server (NTRS)

    Foster, John V.; Ross, Holly M.; Ashley, Patrick A.

    1993-01-01

    Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes groundbased piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.

  1. Internal and External Scripts in Computer-Supported Collaborative Inquiry Learning

    ERIC Educational Resources Information Center

    Kollar, Ingo; Fischer, Frank; Slotta, James D.

    2007-01-01

    We investigated how differently structured external scripts interact with learners' internal scripts with respect to individual knowledge acquisition in a Web-based collaborative inquiry learning environment. Ninety students from two secondary schools participated. Two versions of an external collaboration script (high vs. low structured)…

  2. Effectiveness of bifenthrin (Onyx) and carbaryl (Sevin SL) for protecting individual, high-value conifers from bark beetle attack (Coleoptera: Curculionidae: Scolytinae) in the Western United States

    Treesearch

    Christopher J. Fettig; Kurt K. Allen; Robert R. Borys; John Christopherson; Christopher P. Dabney; Thomas J. Eager; Kenneth E. Gibson; Elizabeth G. Hebertson; Daniel F. Long; A. Steven Munson; Patrick J. Shea; Sheri L. Smith; Michael I. Haverty

    2006-01-01

    High-value trees, such as those located in residential, recreational, or administrative sites, are particularly susceptible to bark beetle (Coleoptera: Curculionidae: Scolytinae) attack as a result of increased amounts of stress associated with drought, soil compaction, mechanical injury, or vandalism. Tree losses in these unique environments generally have a...

  3. Securing SSL-VPN with LR-AKE to access personal health record.

    PubMed

    Eizen, Kimura; Masato, Saito; Kazukuni, Kobara; Yoshihito, Nakato; Takuji, Kuroda; Ken, Ishihara

    2013-01-01

    Using SSL-VPN requires special considerations for well-known issues such as attackers exploiting web browser vulnerabilities and phishing sites using man-in-the-middle attacks. We used leakage-resilient authenticated key exchange (LR-AKE) to develop a comprehensive solution to SSL-VPN issues. Our results show that the LR-AKE should contribute to building a robust infrastructure for personal health records.

  4. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  5. Associations between anxiety and love scripts.

    PubMed

    Gawda, Barbara

    2012-08-01

    Relations between trait anxiety and love scripts expressed in narratives were examined to assess how anxiety affects the perception of love. Stories about love (N = 160) written by 80 men and 80 women were analyzed. The content of the scripts was evaluated in terms of descriptions of actors, partners, expressed emotions of actor and of partner, importance of love, and the ending of the scenario. To test the differences between men and women on content of scripts and associations between trait anxiety level and frequencies of love script elements, a two-way analysis of variance was used. The main effect for sex was significant. There was an effect of trait anxiety on content of love scripts: high anxiety was associated with more frequent negative descriptions of the actor as well as more frequent negative descriptions of the partner's emotions, only in scripts written by women.

  6. Promoting interaction during sociodramatic play: teaching scripts to typical preschoolers and classmates with disabilities.

    PubMed

    Goldstein, H; Cisar, C L

    1992-01-01

    We investigated the effects of teaching sociodramatic scripts on subsequent interaction among three triads, each containing 2 typical children and 1 child with autistic characteristics. The same type and rate of teacher prompts were implemented throughout structured play observations to avoid the confounding effects of script training and teacher prompting. After learning the scripts, all children demonstrated more frequent theme-related social behavior. These improvements in social-communicative interaction were replicated with the training of three sociodramatic scripts (i.e., pet shop, carnival, magic show) according to a multiple baseline design. These effects were maintained during the training of successive scripts and when the triads were reconstituted to include new but similarly trained partners. Results provided support for the inclusion of systematic training of scripts to enhance interaction among children with and without disabilities during sociodramatic play.

  7. First Science Verification of the VLA Sky Survey Pilot

    NASA Astrophysics Data System (ADS)

    Cavanaugh, Amy

    2017-01-01

    My research involved analyzing test images by Steve Myers for the upcoming VLA Sky Survey. This survey will cover the entire sky visible from the VLA site in S band (2-4 GHz). The VLA will be in B configuration for the survey, as it was when the test images were produced, meaning a resolution of approximately 2.5 arcseconds. Conducted using On-the-Fly mode, the survey will have a speed of approximately 20 deg2 hr-1 (including overhead). New Python imaging scripts are being developed and improved to process the VLASS images. My research consisted of comparing a continuum test image over S band (from the new imaging scripts) to two previous images of the same region of the sky (from the CNSS and FIRST surveys), as well as comparing the continuum image to single spectral windows (from the new imaging scripts and of the same sky region). By comparing our continuum test image to images from CNSS and FIRST, we tested on-the-Fly mode and the imaging script used to produce our images. Another goal was to test whether individual spectral windows could be used in combination to calculate spectral indices close to those produced over S band (based only on our continuum image). Our continuum image contained 64 sources as opposed to the 99 sources found in the CNSS image. The CNSS image also had lower noise level (0.095 mJy/beam compared to 0.119 mJy/beam). Additionally, when our continuum image was compared to the CNSS image, separation showed no dependence on total flux density (in our continuum image). At lower flux densities, sources in our image were brighter than the same ones in the CNSS image. When our continuum image was compared to the FIRST catalog, the spectral index difference showed no dependence on total flux (in our continuum image). In conclusion, the quality of our images did not completely match the quality of the CNSS and FIRST images. More work is needed in developing the new imaging scripts.

  8. Mountain pine beetle attack associated with low levels of 4-allylanisole in ponderosa pine.

    PubMed

    Emerick, Jay J; Snyder, Aaron I; Bower, Nathan W; Snyder, Marc A

    2008-08-01

    Mountain pine beetle (Dendroctonus ponderosae) is the most important insect pest in southern Rocky Mountain ponderosa pine (Pinus ponderosa) forests. Tree mortality is hastened by the various fungal pathogens that are symbiotic with the beetles. The phenylpropanoid 4-allylanisole is an antifungal and semiochemical for some pine beetle species. We analyzed 4-allylanisole and monoterpene profiles in the xylem oleoresin from a total of 107 trees at six sites from two chemotypes of ponderosa pine found in Colorado and New Mexico using gas chromatography-mass spectroscopy (GC-MS). Although monoterpene profiles were essentially the same in attacked and nonattacked trees, significantly lower levels of 4-allylanisole were found in attacked trees compared with trees that showed no evidence of attack for both chemotypes.

  9. Comparison of Force and Moment Coefficients for the Same Test Article in Multiple Wind Tunnels

    NASA Technical Reports Server (NTRS)

    Deloach, Richard

    2013-01-01

    This paper compares the results of force and moment measurements made on the same test article and with the same balance in three transonic wind tunnels. Comparisons are made for the same combination of Reynolds number, Mach number, sideslip angle, control surface configuration, and angle of attack range. Between-tunnel force and moment differences are quantified. An analysis of variance was performed at four unique sites in the design space to assess the statistical significance of between-tunnel variation and any interaction with angle of attack. Tunnel to tunnel differences too large to attribute to random error were detected were observed for all forces and moments. In some cases these differences were independent of angle of attack and in other cases they changed with angle of attack.

  10. Mock Trials: Scripts for Wisconsin Lawyers and Teachers.

    ERIC Educational Resources Information Center

    Wisconsin State Dept. of Public Instruction, Madison. Div. of Instructional Services.

    The document presents scripts prepared by experienced lawyers for seven mock trials. Designed for high school or adult audiences as introductions to the American legal system, the scripts use community lawyers, judges, and law officers as well as actors. Script topics include cases concerning automobile accidents, drunken driving, homicide,…

  11. Performance Scripts Creation: Processes and Applications

    ERIC Educational Resources Information Center

    Lyons, Paul

    2006-01-01

    Purpose: Seeks to explain some of the dynamics of scripts creation as used in training, to offer some theoretical underpinning regarding the influence of script creation on behavior and performance, and to offer some examples of how script creation is applied in training activities. Design/methodology/approach: The paper explains in detail and…

  12. Script Templates: A Practical Approach to Script Training in Aphasia

    ERIC Educational Resources Information Center

    Kaye, Rosalind C.; Cherney, Leora R.

    2016-01-01

    Purpose: Script training for aphasia involves repeated practice of relevant phrases and sentences that, when mastered, can potentially be used in other communicative situations. Although an increasingly popular approach, script development can be time-consuming. We provide a detailed summary of the evidence supporting this approach. We then…

  13. Visual Scripting.

    ERIC Educational Resources Information Center

    Halas, John

    Visual scripting is the coordination of words with pictures in sequence. This book presents the methods and viewpoints on visual scripting of fourteen film makers, from nine countries, who are involved in animated cinema; it contains concise examples of how a storybook and preproduction script can be prepared in visual terms; and it includes a…

  14. Entropic evidence for linguistic structure in the Indus script.

    PubMed

    Rao, Rajesh P N; Yadav, Nisha; Vahia, Mayank N; Joglekar, Hrishikesh; Adhikari, R; Mahadevan, Iravatham

    2009-05-29

    The script of the ancient Indus civilization remains undeciphered. The hypothesis that the script encodes language has recently been questioned. Here, we present evidence for the linguistic hypothesis by showing that the script's conditional entropy is closer to those of natural languages than various types of nonlinguistic systems.

  15. MARATHI READER.

    ERIC Educational Resources Information Center

    APTE, MAHADEO L.

    THE MARATHI LANGUAGE, SPOKEN IN BOMBAY STATE, INDIA, IS WRITTEN IN THE SCRIPT TRADITIONALLY KNOWN AS THE DEVANAGARI SCRIPT. THE SCRIPT IS SYLLABIC IN NATURE, EACH CHARACTER OR LETTER REPRESENTS A SYLLABLE RATHER THAN A CONSONANT OR A VOWEL ALONE. THE MARATHI ALPHABET IS THE ADOPTION OF THE DEVANAGARI SCRIPT WITH A FEW CHANGES AND INNOVATIONS. A…

  16. The Latent Structure of Secure Base Script Knowledge

    ERIC Educational Resources Information Center

    Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.

    2015-01-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…

  17. Diseases of Landscape Ornamentals. Slide Script.

    ERIC Educational Resources Information Center

    Powell, Charles C.; Sydnor, T. Davis

    This slide script, part of a series of slide scripts designed for use in vocational agriculture classes, deals with recognizing and controlling diseases found on ornamental landscape plants. Included in the script are narrations for use with a total of 80 slides illustrating various foliar diseases (anthracnose, black spot, hawthorn leaf blight,…

  18. Side forces on forebodies at high angles of attack and Mach numbers from 0.1 to 0.7: two tangent ogives, paraboloid and cone

    NASA Technical Reports Server (NTRS)

    Keener, E. R.; Chapman, G. T.; Taleghani, J.; Cohen, L.

    1977-01-01

    An experimental investigation was conducted in the Ames 12-Foot Wind Tunnel to determine the subsonic aerodynamic characteristics of four forebodies at high angles of attack. The forebodies tested were a tangent ogive with fineness ratio of 5, a paraboloid with fineness ratio of 3.5, a 20 deg cone, and a tangent ogive with an elliptic cross section. The investigation included the effects of nose bluntness and boundary-layer trips. The tangent-ogive forebody was also tested in the presence of a short afterbody and with the afterbody attached. Static longitudinal and lateral/directional stability data were obtained. The investigation was conducted to investigate the existence of large side forces and yawing moments at high angles of attack and zero sideslip. It was found that all of the forebodies experience steady side forces that start at angles of attack of from 20 deg to 35 deg and exist to as high as 80 deg, depending on forebody shape. The side is as large as 1.6 times the normal force and is generally repeatable with increasing and decreasing angle of attack and, also, from test to test. The side force is very sensitive to the nature of the boundary layer, as indicated by large changes with boundary trips. The maximum side force caries considerably with Reynolds number and tends to decrease with increasing Mach number. The direction of the side force is sensitive to the body geometry near the nose. The angle of attack of onset of side force is not strongly influenced by Reynolds number or Mach number but varies with forebody shape. Maximum normal force often occurs at angles of attack near 60 deg. The effect of the elliptic cross section is to reduce the angle of onset by about 10 deg compared to that of an equivalent circular forebody with the same fineness ratio. The short afterbody reduces the angle of onset by about 5 deg.

  19. Changing the Paradigm: Implementation of Combined Law Enforcement, Fire, and Emergency Medical Service (EMS) Cross-Disciplinary Response to Hostile Events

    DTIC Science & Technology

    2014-12-01

    Mumbai , India; and Aw-ora Movie Theatre in Colorado require ftrst responders to incorporate methods and tactics that integrate operations and challenge...Cross-Disciplinaty Team, PAGES Cross-Disciplinary Response, Culture Change, Marauding Terrorist Fireatms Attack, Integrated 127 Response Framework...Columbine High School; Virginia Tech University; Mumbai , India; and Aurora Movie Theatre in Colorado require first responders to incorporate methods and

  20. Lift-enhancement in the gliding paradise tree snake

    NASA Astrophysics Data System (ADS)

    Krishnan, Anush; Barba, Lorena A.

    2012-11-01

    The paradise tree snake is a good glider, despite having no wing-like appendages. This snake jumps from tree branches, flattens its body and adopts an S-shape, then glides while undulating laterally in the air. Previous experimental studies in wind and water tunnels showed that the lift of the snake cross-section can peak markedly at about 35° angle of attack, a surprising feature that hints at a lift-enhancing mechanism. Here, we report numerical simulations on the snake cross-section using an immersed boundary method, which also show the peak in lift above a certain Reynolds number threshold. Our visualizations reveal a change in the vortex shedding pattern at that angle of attack. We also study variants of the cross-section, removing the anatomical overhanging lips on the fore and aft, and observe that they have a large impact on the flow field. The best performance is in fact obtained with the anatomically correct shape of the snake.

  1. The relative effects of entry parameters on thermal protection system weight. [space shuttle orbiters

    NASA Technical Reports Server (NTRS)

    Hirasaki, P. N.

    1971-01-01

    Shielding a spacecraft from the severe thermal environment of an atmospheric entry requires a sophisticated thermal protection system (TPS). Thermal computer program models were developed for two such TPS designs proposed for the space shuttle orbiter. The multilayer systems, a reusable surface insulation TPS, and a re-radiative metallic skin TPS, were sized for a cross-section of trajectories in the entry corridor. This analysis indicates the relative influence of the entry parameters on the weight of each TPS concept. The results are summarized graphically. The trajectory variables considered were down-range, cross-range, orbit inclination, entry interface velocity and flight path angle, maximum heating rate level, angle of attack, and ballistic coefficient. Variations in cross-range and flight path angle over the ranges considered had virtually no effect on the required entry TPS weight. The TPS weight was significantly more sensitive to variations in angle of attack than to dispersions in the other trajectory considered.

  2. Script identification from images using cluster-based templates

    DOEpatents

    Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.

    1998-12-01

    A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.

  3. Script identification from images using cluster-based templates

    DOEpatents

    Hochberg, Judith G.; Kelly, Patrick M.; Thomas, Timothy R.

    1998-01-01

    A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.

  4. Promoting interaction during sociodramatic play: teaching scripts to typical preschoolers and classmates with disabilities.

    PubMed Central

    Goldstein, H; Cisar, C L

    1992-01-01

    We investigated the effects of teaching sociodramatic scripts on subsequent interaction among three triads, each containing 2 typical children and 1 child with autistic characteristics. The same type and rate of teacher prompts were implemented throughout structured play observations to avoid the confounding effects of script training and teacher prompting. After learning the scripts, all children demonstrated more frequent theme-related social behavior. These improvements in social-communicative interaction were replicated with the training of three sociodramatic scripts (i.e., pet shop, carnival, magic show) according to a multiple baseline design. These effects were maintained during the training of successive scripts and when the triads were reconstituted to include new but similarly trained partners. Results provided support for the inclusion of systematic training of scripts to enhance interaction among children with and without disabilities during sociodramatic play. PMID:1386068

  5. Selected Landscape Plants. Slide Script.

    ERIC Educational Resources Information Center

    McCann, Kevin

    This slide script, part of a series of slide scripts designed for use in vocational agriculture classes, deals with commercially important woody ornamental landscape plants. Included in the script are narrations for use with a total of 253 slides illustrating 92 different plants. Several slides are used to illustrate each plant: besides a view of…

  6. Plasma Interactions with Spacecraft. Volume 1

    DTIC Science & Technology

    2011-04-15

    64-bit MacOS X environments. N2kScriptRunner, a C++ code that runs a Nascap-2k script outside of the Java user interface, was created. Using...Default Script and Original INIVEL Velocity Initialization ..........................................................15 Figure 6. Potentials at 25 µs...Current (Right Scale) Using Default Script and Modified INIVEL Velocity Initialization ........................................................16

  7. Variability in Written Japanese: Towards a Sociolinguistics of Script Choice.

    ERIC Educational Resources Information Center

    Smith, Janet S.; Schmidt, David L.

    1996-01-01

    Tests widely-held associations among script types, genres, writers, and target readers via statistical analysis in popular Japanese fiction. Subjects texts to lexical analysis to see whether choice of vocabulary can account for variability in script selection. Finds that Japanese writers fashion their script type choices to specific contexts, as…

  8. Appropriation from a Script Theory of Guidance Perspective: A Response to Pierre Tchounikine

    ERIC Educational Resources Information Center

    Stegmann, Karsten; Kollar, Ingo; Weinberger, Armin; Fischer, Frank

    2016-01-01

    In a recent paper, Pierre Tchounikine has suggested to advance the Script Theory of Guidance (SToG) by addressing the question how learners appropriate collaboration scripts presented to them in learning environments. Tchounikine's main criticism addresses SToG's "internal script configuration principle." This principle states that in…

  9. Multilingual Education Policy in Practice: Classroom Literacy Instruction in Different Scripts in Eritrea

    ERIC Educational Resources Information Center

    Asfaha, Yonas Mesfun; Kroon, Sjaak

    2011-01-01

    This contribution compares literacy instruction in three different scripts in Eritrea. It uses data stemming from classroom observations of beginning readers of Tigrinya (Ge'ez script), Arabic (Arabic script) and Saho (Roman alphabet), the examination of teaching materials, and teacher interviews. Our analysis focuses on literacy events. We…

  10. Effects of Peer-Mediated Implementation of Visual Scripts in Middle School

    ERIC Educational Resources Information Center

    Ganz, Jennifer B.; Heath, Amy K.; Lund, Emily M.; Camargo, Siglia P. H.; Rispoli, Mandy J.; Boles, Margot; Plaisance, Lauren

    2012-01-01

    Although research has investigated the impact of peer-mediated interventions and visual scripts on social and communication skills in children with autism spectrum disorders, no studies to date have investigated peer-mediated implementation of scripts. This study investigated the effects of peer-implemented scripts on a middle school student with…

  11. Who Benefits from a Low versus High Guidance CSCL Script and Why?

    ERIC Educational Resources Information Center

    Mende, Stephan; Proske, Antje; Körndle, Hermann; Narciss, Susanne

    2017-01-01

    Computer-supported collaborative learning (CSCL) scripts can foster learners' deep text comprehension. However, this depends on (a) the extent to which the learning activities targeted by a script promote deep text comprehension and (b) whether the guidance level provided by the script is adequate to induce the targeted learning activities…

  12. Shallow and Deep Orthographies in Hebrew: The Role of Vowelization in Reading Development for Unvowelized Scripts

    ERIC Educational Resources Information Center

    Schiff, Rachel

    2012-01-01

    The present study explored the speed, accuracy, and reading comprehension of vowelized versus unvowelized scripts among 126 native Hebrew speaking children in second, fourth, and sixth grades. Findings indicated that second graders read and comprehended vowelized scripts significantly more accurately and more quickly than unvowelized scripts,…

  13. Secure base representations in middle childhood across two Western cultures: Associations with parental attachment representations and maternal reports of behavior problems.

    PubMed

    Waters, Theodore E A; Bosmans, Guy; Vandevivere, Eva; Dujardin, Adinda; Waters, Harriet S

    2015-08-01

    Recent work examining the content and organization of attachment representations suggests that 1 way in which we represent the attachment relationship is in the form of a cognitive script. This work has largely focused on early childhood or adolescence/adulthood, leaving a large gap in our understanding of script-like attachment representations in the middle childhood period. We present 2 studies and provide 3 critical pieces of evidence regarding the presence of a script-like representation of the attachment relationship in middle childhood. We present evidence that a middle childhood attachment script assessment tapped a stable underlying script using samples drawn from 2 western cultures, the United States (Study 1) and Belgium (Study 2). We also found evidence suggestive of the intergenerational transmission of secure base script knowledge (Study 1) and relations between secure base script knowledge and symptoms of psychopathology in middle childhood (Study 2). The results from this investigation represent an important downward extension of the secure base script construct. (c) 2015 APA, all rights reserved).

  14. The Normative and the Personal Life: Individual Differences in Life Scripts and Life Story Events among U.S.A. and Danish Undergraduates

    PubMed Central

    Rubin, David C.; Berntsen, Dorthe; Hutson, Michael

    2011-01-01

    Life scripts are culturally shared expectations about the order and timing of life events in a prototypical life course. American and Danish undergraduates produced life story events and life scripts by listing the seven most important events in their own lives and in the lives of hypothetical people living ordinary lives. They also rated their events on several scales and completed measures of depression, PTSD symptoms, and centrality of a negative event to their lives. The Danish life script replicated earlier work; the American life script showed minor differences from the Danish life script, apparently reflecting genuine differences in shared events as well as less homogeneity in the American sample. Both consisted of mostly positive events that came disproportionately from ages 15 to 30. Valence of life story events correlated with life script valence, depression, PTSD symptoms, and identity. In the Danish undergraduates, measures of life story deviation from the life script correlated with measures of depression and PTSD symptoms. PMID:19105087

  15. A video depicting resuscitation did not impact upon patients' decision-making.

    PubMed

    Richardson-Royer, Caitlin; Naqvi, Imran; Riffel, Christopher; Harvey, Lawrence; Smith, Domonique; Ayalew, Dagmawe; Motayar, Nasim; Amoateng-Adjepong, Yaw; Manthous, Constantine A

    2018-01-01

    Previous studies have demonstrated that video of and scripted information about cardiopulmonary resuscitation (CPR) can be deployed during clinician-patient end-of-life discussions. Few studies, however, examine whether video adds to verbal information-sharing. We hypothesized that video augments script-only decision-making. Patients aged >65 years admitted to hospital wards were randomized to receive evidence-based information ("script") vs. script plus video of simulated CPR and intubation. Patients' decisions registered in the hospital record, by hospital discharge were compared for the two groups. Fifty script-only intervention patients averaging 77.7 years were compared to 50 script+video patients with a mean age of 74.7 years. Eleven of 50 (22%) in each group declined CPR; and an additional three (script) vs. four (script+video) refused intubation for respiratory failure. There were no differences in sex, self-reported health trajectory, functional limitations, length of stay, or mortality associated with decisions. The rate at which verbally informed hospitalized elders opted out of resuscitation was not impacted by adding a video depiction of CPR.

  16. Secure Base Representations in Middle Childhood Across Two Western Cultures: Associations with Parental Attachment Representations and Maternal Reports of Behavior Problems

    PubMed Central

    Waters, Theodore E. A.; Bosmans, Guy; Vandevivere, Eva; Dujardin, Adinda; Waters, Harriet S.

    2015-01-01

    Recent work examining the content and organization of attachment representations suggests that one way in which we represent the attachment relationship is in the form of a cognitive script. That said, this work has largely focused on early childhood or adolescence/adulthood, leaving a large gap in our understanding of script-like attachment representations in the middle childhood period. We present two studies and provide three critical pieces of evidence regarding the presence of a script-like representation of the attachment relationship in middle childhood. We present evidence that a middle childhood attachment script assessment tapped a stable underlying script using samples drawn from two western cultures, the United States (Study 1) and Belgium (Study 2). We also found evidence suggestive of the intergenerational transmission of secure base script knowledge (Study 1) and relations between secure base script knowledge and symptoms of psychopathology in middle childhood (Study 2). The results from this investigation represent an important downward extension of the secure base script construct. PMID:26147774

  17. Parents, peers and pornography: the influence of formative sexual scripts on adult HIV sexual risk behaviour among Black men in the USA.

    PubMed

    Hussen, Sophia A; Bowleg, Lisa; Sangaramoorthy, Thurka; Malebranche, David J

    2012-01-01

    Black men in the USA experience disproportionately high rates of HIV infection, particularly in the Southeastern part of the country. We conducted 90 qualitative in-depth interviews with Black men living in the state of Georgia and analysed the transcripts using Sexual Script Theory to: (1) characterise the sources and content of sexual scripts that Black men were exposed to during their childhood and adolescence and (2) describe the potential influence of formative scripts on adult HIV sexual risk behaviour. Our analyses highlighted salient sources of cultural scenarios (parents, peers, pornography, sexual education and television), interpersonal scripts (early sex- play, older female partners, experiences of child abuse) and intrapsychic scripts that participants described. Stratification of participant responses based on sexual-risk behaviour revealed that lower- and higher-risk men described exposure to similar scripts during their formative years; however, lower-risk men reported an ability to cognitively process and challenge the validity of risk-promoting scripts that they encountered. Implications for future research are discussed.

  18. Anger attacks in bipolar versus recurrent depression.

    PubMed

    Grover, Sandeep; Painuly, Nitesh; Gupta, Nitin; Mattoo, Surendra K

    2011-01-01

    Research on anger attacks has been mostly limited to unipolar depression, and only a few studies have focused on anger attacks in bipolar depression. In a cross-sectional study, 22 subjects with bipolar depression were compared to 22 subjects with recurrent unipolar depression using an anger attack questionnaire, irritability, depression and anxiety scale and quality of life scale. Anger attacks were present in 62.5% subjects with recurrent depression (RDD group) compared to 54.5% in subjects with bipolar depression (BD group), but the difference between the groups was not statistically significant. Also, there was no significant difference between the RDD and BD groups on the Irritability Depression and Anxiety Scale and WHOQOL-Bref except that the BD group had a poorer quality of life (QOL) compared to the RDD group in the social relationship domain (t=-2.30, p<0.05). In the BD group, the subjects with anger attacks were older (t=2.77, p<0.05), had significantly higher scores on the Irritability-Outwards component of IDA (t=3.90, p<0.01) and shorter duration of illness (Mann Whitney Signed ranked value 20.00, p<0.01) and duration of treatment (Mann Whitney Signed ranked value 28.00, p<0.05) compared to BD group members without anger attacks. In the RDD group, the subjects with anger attacks had poor QOL in the social domain (t= -2.12, p<0.05), environmental domain (t=2.99, p=.01) and total (t=2.56, p<0.05) QOL compared to those without anger attacks. Anger attacks are equally prevalent in unipolar and bipolar depression, are not influenced by sociodemographic and clinical variables, and lead to comparable impact on the subjective QOL in both groups.

  19. Investigation of the Low-Subsonic Stability and Control Characteristics of a Free-Flying Model of a Thick 70 deg Delta Reentry Configuration

    NASA Technical Reports Server (NTRS)

    Paulson, John W.; Shanks, Robert E.

    1961-01-01

    An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.

  20. Subjective Cognitive Symptoms During a Migraine Attack: A Prospective Study of a Clinic-Based Sample.

    PubMed

    Gil-Gouveia, Raquel; Oliveira, António G; Martins, Isabel Pavão

    2016-01-01

    A migraine attack aggregates a range of different symptoms, besides pain, that contribute to attack-related disability. Cognitive dysfunction is an unacknowledged part of the migraine attack. To provide a profile of the frequency and character of migraine attack-related cognitive symptoms occurring during the headache phase of the attack. Cross-sectional survey. Clinical-based sample of episodic migraine patients. Sequential patients were screened about the occurrence of cognitive symptoms during migraine attacks using an open-ended question followed by a self-fulfilled symptom checklist. Of 165 migraine patients (15 men, age average 37.3 ± 10.7 years), 89.7% described cognitive symptoms during the headache phase of the migraine attack. On average 2.5 ± 1.6 symptoms were reported per patient, uninfluenced by demographic or disease-related variables. The most common spontaneous symptoms related to executive functions, such as poor ability to concentrate (37%), difficulty in reasoning (25%), and thinking (23%). The pattern of responses on the symptoms checklist corroborated with those reported spontaneously and quantitative scores of the checklist were higher in patients with spontaneous symptoms. Open-ended questions tend to overestimate frequency; data accuracy may be influenced by the population chosen (clinical-based, some using prophylactic treatment). This study detailed the frequency and characteristics of migraine attack-related subjective cognitive symptoms and found its frequency to be similar to reports of other migraine defining symptoms (ex. nausea, photophobia) in recent clinical series. Patients' reports were consistent and dominated by complaints of attention difficulties, diminished cognitive efficiency, and processing speed impairment.

  1. PyCMSXiO: an external interface to script treatment plans for the Elekta® CMS XiO treatment planning system

    NASA Astrophysics Data System (ADS)

    Xing, Aitang; Arumugam, Sankar; Holloway, Lois; Goozee, Gary

    2014-03-01

    Scripting in radiotherapy treatment planning systems not only simplifies routine planning tasks but can also be used for clinical research. Treatment planning scripting can only be utilized in a system that has a built-in scripting interface. Among the commercially available treatment planning systems, Pinnacle (Philips) and Raystation (Raysearch Lab.) have inherent scripting functionality. CMS XiO (Elekta) is a widely used treatment planning system in radiotherapy centres around the world, but it does not have an interface that allows the user to script radiotherapy plans. In this study an external scripting interface, PyCMSXiO, was developed for XiO using the Python programming language. The interface was implemented as a python package/library using a modern object-oriented programming methodology. The package was organized as a hierarchy of different classes (objects). Each class (object) corresponds to a plan object such as the beam of a clinical radiotherapy plan. The interface of classes was implemented as object functions. Scripting in XiO using PyCMSXiO is comparable with Pinnacle scripting. This scripting package has been used in several research projects including commissioning of a beam model, independent three-dimensional dose verification for IMRT plans and a setup-uncertainty study. Ease of use and high-level functions provided in the package achieve a useful research tool. It was released as an open-source tool that may benefit the medical physics community.

  2. Impacts of silvicultural thinning treatments on beetle trap captures and tree attacks during low bark beetle populations in ponderosa pine forests of northern Arizona.

    PubMed

    Gaylord, M L; Hofstetter, R W; Wagner, M R

    2010-10-01

    Our research used a combination of passive traps, funnel traps with lures, baited trees, and surveys of long-term thinning plots to assess the impacts of different levels of stand basal area (BA) on bark beetle tree attack and on trap captures of Ips spp., Dendroctonus spp., and their predators. The study occurred at two sites in ponderosa pine, Pinus ponderosa Dougl. ex Laws., forests, from 2004 to 2007 during low bark beetle populations. Residual stand BA ranged from 9.0 to 37.0 m2/ha. More predators and bark beetles were collected in passive traps in stands of lower BA than in stands of higher BA; however, significance varied by species and site, and total number of beetles collected was low. Height of the clear panel passive traps affected trap catches for some species at some sites and years. When pheromone lures were used with funnel traps [Ips pini (Say) lure: lanierone, +03/-97 ipsdienol], we found no significant difference in trap catches among basal area treatments for bark beetles and their predators. Similarly, when trees were baited (Dendroctonus brevicomis LeConte lure: myrcene, exo-brevicomin and frontalin), we found no significant difference for days to first bark beetle attack. Surveys of long-term thinning treatments found evidence of bark beetle attacks only in unthinned plots (approximately 37 m2/ha basal area). We discuss our results in terms of management implications for bark beetle trapping and control.

  3. Towards a measurement of internalization of collaboration scripts in the medical context - results of a pilot study.

    PubMed

    Kiesewetter, Jan; Gluza, Martin; Holzer, Matthias; Saravo, Barbara; Hammitzsch, Laura; Fischer, Martin R

    2015-01-01

    Collaboration as a key qualification in medical education and everyday routine in clinical care can substantially contribute to improving patient safety. Internal collaboration scripts are conceptualized as organized - yet adaptive - knowledge that can be used in specific situations in professional everyday life. This study examines the level of internalization of collaboration scripts in medicine. Internalization is understood as fast retrieval of script information. The goals of the current study were the assessment of collaborative information, which is part of collaboration scripts, and the development of a methodology for measuring the level of internalization of collaboration scripts in medicine. For the contrastive comparison of internal collaboration scripts, 20 collaborative novices (medical students in their final year) and 20 collaborative experts (physicians with specialist degrees in internal medicine or anesthesiology) were included in the study. Eight typical medical collaborative situations as shown on a photo or video were presented to the participants for five seconds each. Afterwards, the participants were asked to describe what they saw on the photo or video. Based on the answers, the amount of information belonging to a collaboration script (script-information) was determined and the time each participant needed for answering was measured. In order to measure the level of internalization, script-information per recall time was calculated. As expected, collaborative experts stated significantly more script-information than collaborative novices. As well, collaborative experts showed a significantly higher level of internalization. Based on the findings of this research, we conclude that our instrument can discriminate between collaboration novices and experts. It therefore can be used to analyze measures to foster subject-specific competency in medical education.

  4. Reduction in Predator Defense in the Presence of Neighbors in a Colonial Fish

    PubMed Central

    Schädelin, Franziska C.; Fischer, Stefan; Wagner, Richard H.

    2012-01-01

    Predation pressure has long been considered a leading explanation of colonies, where close neighbors may reduce predation via dilution, alarming or group predator attacks. Attacking predators may be costly in terms of energy and survival, leading to the question of how neighbors contribute to predator deterrence in relationship to each other. Two hypotheses explaining the relative efforts made by neighbors are byproduct-mutualism, which occurs when breeders inadvertently attack predators by defending their nests, and reciprocity, which occurs when breeders deliberately exchange predator defense efforts with neighbors. Most studies investigating group nest defense have been performed with birds. However, colonial fish may constitute a more practical model system for an experimental approach because of the greater ability of researchers to manipulate their environment. We investigated in the colonial fish, Neolamprologus caudopunctatus, whether prospecting pairs preferred to breed near conspecifics or solitarily, and how breeders invested in anti-predator defense in relation to neighbors. In a simple choice test, prospecting pairs selected breeding sites close to neighbors versus a solitary site. Predators were then sequentially presented to the newly established test pairs, the previously established stimulus pairs or in between the two pairs. Test pairs attacked the predator eight times more frequently when they were presented on their non-neighbor side compared to between the two breeding sites, where stimulus pairs maintained high attack rates. Thus, by joining an established pair, test pairs were able to reduce their anti-predator efforts near neighbors, at no apparent cost to the stimulus pairs. These findings are unlikely to be explained by reciprocity or byproduct-mutualism. Our results instead suggest a commensal relationship in which new pairs exploit the high anti-predator efforts of established pairs, which invest similarly with or without neighbors. Further studies are needed to determine the scope of commensalism as an anti-predator strategy in colonial animals. PMID:22615741

  5. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  6. Effectiveness of bifenthrin (Onyx™) and carbaryl (Sevin® SL) for protecting individual, high-value trees from bark beetle attack (Coleoptera: Curculionidae: Scolytinae) in the western United States

    Treesearch

    Christopher J. Fettig; Kurt K. Allen; Robert R. Borys; John Christopherson; Christopher P. Dabney; Thomas J. Eager; Kenneth E. Gibson; Elizabeth G. Hebertson; Daniel F. Long; A. Steven Munson; Patrick J. Shea; Sheri L. Smith; Michael I. Haverty

    2006-01-01

    High-value trees, such as those located in residential, recreational, or administrative sites, are particularly susceptible to bark beetle (Coleoptera: Curculionidae: Scolytinae) attack as a result of increased amounts of stress associated with drought, soil compaction, mechanical injury, or vandalism. Tree losses in these unique environments generally have a...

  7. Contrasting Patterns of Diterpene Acid Induction by Red Pine and White Spruce to Simulated Bark Beetle Attack, and Interspecific Differences in Sensitivity Among Fungal Associates

    Treesearch

    Charles J. Mason; Kier D. Klepzig; Brian J. Kopper; Philip J. Kersten; Barbara L. Illman; Kenneth F. Raffa

    2015-01-01

    Conifers possess a suite of physiochemical defenses that protect their subcortical tissues from bark beetle -fungal complexes. These defenses include rapid induction of terpenoids and phenolics at the site of attack. Studies of the distribution, induction, and bioactivity of conifer terpenoids have focused heavily on monoterpenes. We assessed induction of diterpene...

  8. Quantum chemical studies on the inhibition potentials of some Penicillin compounds for the corrosion of mild steel in 0.1 M HCl.

    PubMed

    Eddy, Nnabuk Okon; Ebenso, Eno E

    2010-07-01

    Inhibitive and adsorption properties of Penicillin G, Amoxicillin and Penicillin V potassium were studied using gravimetric, gasometric and quantum chemical methods. The results obtained indicate that these compounds are good adsorption inhibitors for the corrosion of mild steel in HCl solution. The adsorption of the inhibitors on mild steel surface is spontaneous, exothermic and supports the mechanism of physical adsorption. From DFT results, the sites for nucleophilic attacks in the inhibitors are the carboxylic acid functional group while the sites for electrophilic attacks are in the phenyl ring. There was a strong correlation between theoretical and experimental inhibition efficiencies.

  9. A review of some Reynolds number effects related to bodies at high angles of attack

    NASA Technical Reports Server (NTRS)

    Polhamus, E. C.

    1984-01-01

    A review of some effects of Reynolds number on selected aerodynamic characteristics of two- and three-dimensional bodies of various cross sections in relation to fuselages at high angles of attack at subsonic and transonic speeds is presented. Emphasis is placed on the Reynolds number ranges above the subcritical and angles of attack where lee side vortex flow or unsteady wake type flows predominate. Lists of references, arranged in subject categories, are presented with emphasis on those which include data over a reasonable Reynolds number range. Selected Reynolds number data representative of various aerodynamic flows around bodies are presented and analyzed and some effects of these flows on fuselage aerodynamic parameters are discussed.

  10. XMGR5 users manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, K.R.; Fisher, J.E.

    1997-03-01

    ACE/gr is XY plotting tool for workstations or X-terminals using X. A few of its features are: User defined scaling, tick marks, labels, symbols, line styles, colors. Batch mode for unattended plotting. Read and write parameters used during a session. Polynomial regression, splines, running averages, DFT/FFT, cross/auto-correlation. Hardcopy support for PostScript, HP-GL, and FrameMaker.mif format. While ACE/gr has a convenient point-and-click interface, most parameter settings and operations are available through a command line interface (found in Files/Commands).

  11. Cross-Media Evaluation of Color T.V., Black and White T.V. and Color Photography in the Teaching of Endoscopy. Appendix A, Sample Schedule; Appendix B, Testing; Appendix C, Scripts; Appendix D, Analyses of Covariance.

    ERIC Educational Resources Information Center

    Balin, Howard; And Others

    Based on the premise that in situations where the subject requires visual identification, where students cannot see the subject physically from the standpoint of the instructor, and where there is a high dramatic impact, color and television might be significant factors in learning, a comparative evaluation was made of: color television, black and…

  12. CrossTalk. The Journal of Defense Software Engineering. Volume 16, Number 11, November 2003

    DTIC Science & Technology

    2003-11-01

    memory area, and stack pointer. These systems are classified as preemptive or nonpreemptive depending on whether they can preempt an existing task or not...of charge. The Software Technology Support Center was established at Ogden Air Logistics Center (AFMC) by Headquarters U.S. Air Force to help Air...device. A script file could be a list of commands for a command interpreter such as a batch file [15]. A communications port consists of a queue to hold

  13. Using Audio Script Fading and Multiple-Exemplar Training to Increase Vocal Interactions in Children with Autism

    ERIC Educational Resources Information Center

    Garcia-Albea, Elena; Reeve, Sharon A.; Brothers, Kevin J.; Reeve, Kenneth F.

    2014-01-01

    Script-fading procedures have been shown to be effective for teaching children with autism to initiate and participate in social interactions without vocal prompts from adults. In previous script and script-fading research, however, there has been no demonstration of a generalized repertoire of vocal interactions under the control of naturally…

  14. Arabic Script and the Rise of Arabic Calligraphy

    ERIC Educational Resources Information Center

    Alshahrani, Ali A.

    2008-01-01

    The aim of this paper is to present a concise coherent literature review of the Arabic Language script system as one of the oldest living Semitic languages in the world. The article discusses in depth firstly, Arabic script as a phonemic sound-based writing system of twenty eight, right to left cursive script where letterforms shaped by their…

  15. Scripted Collaboration and Group-Based Variations in a Higher Education CSCL Context

    ERIC Educational Resources Information Center

    Hamalainen, Raija; Arvaja, Maarit

    2009-01-01

    Scripting student activities is one way to make Computer-Supported Collaborative Learning more efficient. This case study examines how scripting guided student group activities and also how different groups interpreted the script; what kinds of roles students adopted and what kinds of differences there were between the groups in terms of their…

  16. Exploring the Presence of a Deaf American Cultural Life Script

    ERIC Educational Resources Information Center

    Clark, M. Diane; Daggett, Dorri J.

    2015-01-01

    Cultural life scripts are defined as culturally shared expectations that focus on a series of events that are ordered in time. In these scripts, generalized expectations for what to expect through the life course are outlined. This study examined the possibility of a Deaf American Life Script developed in relationship to the use of a visual…

  17. Disability perception in Menière's disease: when, how much and why?

    PubMed

    Soto-Varela, Andres; Huertas-Pardo, Belen; Gayoso-Diz, Pilar; Santos-Perez, Sofia; Sanchez-Sellero, Ines

    2016-04-01

    The purpose of the study was to evaluate self-perceived handicap in patients with definite Menière's disease (MD). A cross-sectional study was conducted. To examine the self-perception of disability, participants completed a DHI (Dizziness Handicap Inventory). Parameters compared with DHI scores: sex, age, unilateral/bilateral affectation, time elapsed since the onset of symptoms, pure-tone average (PTA), stages of MD, audiometric change (last 6 months), PTA in low frequencies (PTAl) and audiometric change in PTAl, subjective perception of fluctuating hearing threshold, tinnitus between attacks, number of vertiginous episodes (last 6 months), time elapsed since last attack, subjective perception of instability intercrises and Tumarkin attacks. 90 patients were included; they completed a total of 104 questionnaires. DHI scores ranged from 2 to 100 (average: 47.08, SD 24.45). In 29 cases (27.9 %) the disability perception was mild, in 43 (41.3 %) moderate, and in 32 (30.8 %) severe. Correlation between disability perception and some vestibular symptoms was found: number of typical attacks (last 6 months), time elapsed since last attack, instability intercrises and Tumarkin attacks. No relationship was found with the rest of variables. Disability perception in patients with MD depends primarily on vestibular symptoms (particularly, instability and frequency of attacks). So, we suggest to design a new staging system of MD taking into account both auditory criteria and also vestibular symptoms.

  18. General Curtis E. Lemay on Leadership and Command

    DTIC Science & Technology

    2010-06-01

    Service Cross , Silver Star, three Distinguished Flying Crosses and four Air Medals and various other campaign medals and foreign accolades.2 He was not...Tami Davis Biddle in Rhetoric and Reality in Air Warfare characterized the attacks as a willingness to “ cross the line and prosecute mass fire...is on the envelope in front of you.”45 The barracks were furnished. Instead of cots, they had Simmons beds, dressers , desks, and table lamps each

  19. Characterization of a Cross-Linked Protein–Nucleic Acid Substrate Radical in the Reaction Catalyzed by RlmN

    PubMed Central

    2015-01-01

    RlmN and Cfr are methyltransferases/methylsynthases that belong to the radical S-adenosylmethionine superfamily of enzymes. RlmN catalyzes C2 methylation of adenosine 2503 (A2503) of 23S rRNA, while Cfr catalyzes C8 methylation of the exact same nucleotide, and will subsequently catalyze C2 methylation if the site is unmethylated. A key feature of the unusual mechanisms of catalysis proposed for these enzymes is the attack of a methylene radical, derived from a methylcysteine residue, onto the carbon center undergoing methylation to generate a paramagnetic protein–nucleic acid cross-linked species. This species has been thoroughly characterized during Cfr-dependent C8 methylation, but does not accumulate to detectible levels in RlmN-dependent C2 methylation. Herein, we show that inactive C118S/A variants of RlmN accumulate a substrate-derived paramagnetic species. Characterization of this species by electron paramagnetic resonance spectroscopy in concert with strategic isotopic labeling shows that the radical is delocalized throughout the adenine ring of A2503, although predominant spin density is on N1 and N3. Moreover, 13C hyperfine interactions between the radical and the methylene carbon of the formerly [methyl-13C]Cys355 residue show that the radical species exists in a covalent cross-link between the protein and the nucleic acid substrate. X-ray structures of RlmN C118A show that, in the presence of SAM, the substitution does not alter the active site structure compared to that of the wild-type enzyme. Together, these findings have new mechanistic implications for the role(s) of C118 and its counterpart in Cfr (C105) in catalysis, and suggest involvement of the residue in resolution of the cross-linked species via a radical mediated process. PMID:24806349

  20. Characterization of a Cross-Linked Protein-Nucleic Acid Substrate Radical in the Reaction Catalyzed by RlmN

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Silakov, Alexey; Grove, Tyler L.; Radle, Matthew I.

    2014-08-14

    RlmN and Cfr are methyltransferases/methylsynthases that belong to the radical S-adenosylmethionine superfamily of enzymes. RlmN catalyzes C2 methylation of adenosine 2503 (A2503) of 23S rRNA, while Cfr catalyzes C8 methylation of the exact same nucleotide, and will subsequently catalyze C2 methylation if the site is unmethylated. A key feature of the unusual mechanisms of catalysis proposed for these enzymes is the attack of a methylene radical, derived from a methylcysteine residue, onto the carbon center undergoing methylation to generate a paramagnetic protein–nucleic acid cross-linked species. This species has been thoroughly characterized during Cfr-dependent C8 methylation, but does not accumulate tomore » detectible levels in RlmN-dependent C2 methylation. Herein, we show that inactive C118S/A variants of RlmN accumulate a substrate-derived paramagnetic species. Characterization of this species by electron paramagnetic resonance spectroscopy in concert with strategic isotopic labeling shows that the radical is delocalized throughout the adenine ring of A2503, although predominant spin density is on N1 and N3. Moreover, 13C hyperfine interactions between the radical and the methylene carbon of the formerly [methyl- 13C]Cys355 residue show that the radical species exists in a covalent cross-link between the protein and the nucleic acid substrate. X-ray structures of RlmN C118A show that, in the presence of SAM, the substitution does not alter the active site structure compared to that of the wild-type enzyme. Together, these findings have new mechanistic implications for the role(s) of C118 and its counterpart in Cfr (C105) in catalysis, and suggest involvement of the residue in resolution of the cross-linked species via a radical mediated process« less

  1. Accessing world knowledge: evidence from N400 and reaction time priming.

    PubMed

    Chwilla, Dorothee J; Kolk, Herman H J

    2005-12-01

    How fast are we in accessing world knowledge? In two experiments, we tested for priming for word triplets that described a conceptual script (e.g., DIRECTOR-BRIBE-DISMISSAL) but were not associatively related and did not share a category relationship. Event-related brain potentials were used to track the time course at which script information becomes available. In Experiment 1, in which participants made lexical decisions, we found a facilitation for script-related relative to unrelated triplets, as indicated by (i) a decrease in both reaction time and errors, and (ii) an N400-like priming effect. In Experiment 2, we further explored the locus of script priming by increasing the contribution of meaning integration processes. The participants' task was to indicate whether the three words presented a plausible scenario. Again, an N400 script priming effect was obtained. Directing attention to script relations was effective in enhancing the N400 effect. The time course of the N400 effect was similar to that of the standard N400 effect to semantic relations. The present results show that script priming can be obtained in the visual modality, and that script information is immediately accessed and integrated with context. This supports the view that script information forms a central aspect of word meaning. The RT and N400 script priming effects reported in this article are problematic for most current semantic priming models, like spreading activation models, expectancy models, and task-specific semantic matching/integration models. They support a view in which there is no clear cutoff point between semantic knowledge and world knowledge.

  2. Emergence of norovirus GI.2 outbreaks in military camps in Singapore.

    PubMed

    Ho, Zheng Jie Marc; Vithia, Gunalan; Ng, Ching Ging; Maurer-Stroh, Sebastian; Tan, Clive M; Loh, Jimmy; Lin, Tzer Pin Raymond; Lee, Jian Ming Vernon

    2015-02-01

    Simultaneous acute gastroenteritis (AGE) outbreaks occurred at two military camps. This study details the epidemiological findings, explores possible origins, and discusses preventive measures. Investigations included attack rate surveys, symptom surveys, hygiene inspections, and the testing of water, food, and stool samples. DNA/RNA was extracted from stool samples and amplified via real-time reverse transcription PCR (RT-PCR). Partial and full-length capsid nucleotide sequences were obtained, phylogenetic relationships inferred, and homology modelling of antigenic sites performed. The military outbreaks involved 775 persons and were preceded by two AGE outbreaks at restaurants in the local community. The outbreak was longer and larger in the bigger camp (21 days, attack rate 15.0%) than the smaller camp (6 days, attack rate 8.3%). Of 198 stool samples, norovirus GI.2 was detected in 32.5% (larger camp) and 28.6% (smaller camp). These were essentially identical to preceding community outbreaks. Antigenic site homology modelling also showed differences between identified and more common AGE outbreak strains (norovirus GII.4). Differences observed highlight difficulties in controlling person-to-person outbreaks among large groups in close proximity (e.g., military trainees). Distinct differences in antigenic sites may have contributed to increased immunological susceptibility of the soldiers to infection. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. An Exploration of the Examination Script Features that Most Influence Expert Judgements in Three Methods of Evaluating Script Quality

    ERIC Educational Resources Information Center

    Suto, Irenka; Novakovic, Nadezda

    2012-01-01

    Some methods of determining grade boundaries within examinations, such as awarding, paired comparisons, and rank ordering, entail expert judgements of script quality. We aimed to identify the features of examinees' scripts that most influence judgements in the three methods. For contrasting examinations in biology and English, a Latin square…

  4. "Can There Be Such a Delightful Feeling as This?" Variations of Sexual Scripts in Finnish Girls' Narratives

    ERIC Educational Resources Information Center

    Suvivuo, Pia; Tossavainen, Kerttu; Kontula, Osmo

    2010-01-01

    This study examined what kinds of sexual scripts were found in Finnish girls' narratives, what elements those scripts included and how different scripts were associated with sexually risky behavior. The data were comprised of the narratives of 173 14-15-year-old girls regarding their experiences in sexually motivating situations. The narratives…

  5. Accurate Arabic Script Language/Dialect Classification

    DTIC Science & Technology

    2014-01-01

    Army Research Laboratory Accurate Arabic Script Language/Dialect Classification by Stephen C. Tratz ARL-TR-6761 January 2014 Approved for public...1197 ARL-TR-6761 January 2014 Accurate Arabic Script Language/Dialect Classification Stephen C. Tratz Computational and Information Sciences...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 January 2014 Final Accurate Arabic Script Language/Dialect Classification

  6. "Writing It in English": Script Choices among Young Multilingual Muslims in the UK

    ERIC Educational Resources Information Center

    Rosowsky, Andrey

    2010-01-01

    Much attention has been paid in the literature to matters of script choice vis-a-vis languages. This attention, however, has focused on script choice in a national and political context. By contrast, there has not been any significant attention paid to more local and idiosyncratic instances of script choice operating on an individual and community…

  7. PsyScript: a Macintosh application for scripting experiments.

    PubMed

    Bates, Timothy C; D'Oliveiro, Lawrence

    2003-11-01

    PsyScript is a scriptable application allowing users to describe experiments in Apple's compiled high-level object-oriented AppleScript language, while still supporting millisecond or better within-trial event timing (delays can be in milliseconds or refresh-based, and PsyScript can wait on external I/O, such as eye movement fixations). Because AppleScript is object oriented and system-wide, PsyScript experiments support complex branching, code reuse, and integration with other applications. Included AppleScript-based libraries support file handling and stimulus randomization and sampling, as well as more specialized tasks, such as adaptive testing. Advanced features include support for the BBox serial port button box, as well as a low-cost USB-based digital I/O card for millisecond timing, recording of any number and types of responses within a trial, novel responses, such as graphics tablet drawing, and use of the Macintosh sound facilities to provide an accurate voice key, saving voice responses to disk, scriptable image creation, support for flicker-free animation, and gaze-dependent masking. The application is open source, allowing researchers to enhance the feature set and verify internal functions. Both the application and the source are available for free download at www.maccs.mq.edu.au/-tim/psyscript/.

  8. Spatial Characteristics of the Unsteady Differential Pressures on 16 percent F/A-18 Vertical Tails

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.; Ashley, Holt

    1998-01-01

    Buffeting is an aeroelastic phenomenon which plagues high performance aircraft at high angles of attack. For the F/A-18 at high angles of attack, vortices emanating from wing/fuselage leading edge extensions burst, immersing the vertical tails in their turbulent wake. The resulting buffeting of the vertical tails is a concern from fatigue and inspection points of view. Previous flight and wind-tunnel investigations to determine the buffet loads on the tail did not provide a complete description of the spatial characteristics of the unsteady differential pressures. Consequently, the unsteady differential pressures were considered to be fully correlated in the analyses of buffet and buffeting. The use of fully correlated pressures in estimating the generalized aerodynamic forces for the analysis of buffeting yielded responses that exceeded those measured in flight and in the wind tunnel. To learn more about the spatial characteristics of the unsteady differential pressures, an available 16%, sting-mounted, F-18 wind-tunnel model was modified and tested in the Transonic Dynamics Tunnel (TDT) at the NASA Langley Research Center as part of the ACROBAT (Actively Controlled Response Of Buffet-Affected Tails) program. Surface pressures were measured at high angles of attack on flexible and rigid tails. Cross-correlation and cross-spectral analyses of the pressure time histories indicate that the unsteady differential pressures are not fully correlated. In fact, the unsteady differential pressure resemble a wave that travels along the tail. At constant angle of attack, the pressure correlation varies with flight speed.

  9. Experimental study of effects of forebody geometry on high angle of attack static and dynamic stability and control

    NASA Technical Reports Server (NTRS)

    Brandon, J. M.; Murri, D. G.; Nguyen, L. T.

    1986-01-01

    A series of low-speed wind tunnel tests on a generic airplane model with a cylindrical fuselage were made to investigate the effects of forebody shape and fitness ratio, and fuselage/wing proximity on static and dynamic lateral/directional stability. In addition, some preliminary testing to determine the effectiveness of deflectable forebody strakes for high angle of attack yaw control was conducted. During the stability investigation, 11 forebodies were tested including three different cross-sectional shapes with fineness ratios of 2, 3, and 4. In addition, the wing was tested at two longitudinal positions to provide a substantial variation in forebody/wing proximity. Conventional force tests were conducted to determine static stability characteristics, and single-degree-of-freedom free-to-roll tests were conducted to study the wing rock characteristics of the model with the various forebodies. Flow visualization data were obtained to aid in the analysis of the complex flow phenomena involved. The results show that the forebody cross-sectional shape and fineness ratio and forebody/wing proximity can strongly affect both static and dynamic (roll) stability at high angles of attack. These characteristics result from the impact of these factors on forebody vortex development, the behavior of the vortices in sideslip, and their interaction with the wing flow field. Preliminary results from the deflectable strake investigation indicated that forebody flow control using this concept can provide very large yaw control moments at stall and post-stall angles of attack.

  10. The development of videos in culturally grounded drug prevention for rural native Hawaiian youth.

    PubMed

    Okamoto, Scott K; Helm, Susana; McClain, Latoya L; Dinson, Ay-Laina

    2012-12-01

    The purpose of this study was to adapt and validate narrative scripts to be used for the video components of a culturally grounded drug prevention program for rural Native Hawaiian youth. Scripts to be used to film short video vignettes of drug-related problem situations were developed based on a foundation of pre-prevention research funded by the National Institute on Drug Abuse. Seventy-four middle- and high-school-aged youth in 15 focus groups adapted and validated the details of the scripts to make them more realistic. Specifically, youth participants affirmed the situations described in the scripts and suggested changes to details of the scripts to make them more culturally specific. Suggested changes to the scripts also reflected preferred drug resistance strategies described in prior research, and varied based on the type of drug offerer described in each script (i.e., peer/friend, parent, or cousin/sibling). Implications for culturally grounded drug prevention are discussed.

  11. Using audio script fading and multiple-exemplar training to increase vocal interactions in children with autism.

    PubMed

    Garcia-Albea, Elena; Reeve, Sharon A; Brothers, Kevin J; Reeve, Kenneth F

    2014-01-01

    Script-fading procedures have been shown to be effective for teaching children with autism to initiate and participate in social interactions without vocal prompts from adults. In previous script and script-fading research, however, there has been no demonstration of a generalized repertoire of vocal interactions under the control of naturally occurring relevant stimuli. In this study, 4 boys with autism were taught to initiate a conversation in the presence of toys through the use of a script and script-fading procedure. Training with multiple categories and exemplars of toys was used to increase the likelihood of generalization of vocal interactions across novel toys. A multiple-probe design across participants was used to assess the effects of these procedures. The intervention successfully brought interactions by children with autism under the control of relevant stimuli in the environment. Future research pertaining to the specific implementation of these procedures (e.g., fading, script placement, participant characteristics) is discussed. © Society for the Experimental Analysis of Behavior.

  12. ACHP | News

    Science.gov Websites

    Efforts at 9/11 Historic Sites FEMA debris specialist overlooking work at World Trade Center site - photo , terrorist attacks on the Pentagon and World Trade Center, the Advisory Council on Historic Preservation community," said Milford Wayne Donaldson, FAIA, ACHP chairman. "Yesterday, the world began to see

  13. ATP hydrolysis in Eg5 kinesin involves a catalytic two-water mechanism.

    PubMed

    Parke, Courtney L; Wojcik, Edward J; Kim, Sunyoung; Worthylake, David K

    2010-02-19

    Motor proteins couple steps in ATP binding and hydrolysis to conformational switching both in and remote from the active site. In our kinesin.AMPPPNP crystal structure, closure of the active site results in structural transformations appropriate for microtubule binding and organizes an orthosteric two-water cluster. We conclude that a proton is shared between the lytic water, positioned for gamma-phosphate attack, and a second water that serves as a general base. To our knowledge, this is the first experimental detection of the catalytic base for any ATPase. Deprotonation of the second water by switch residues likely triggers subsequent large scale structural rearrangements. Therefore, the catalytic base is responsible for initiating nucleophilic attack of ATP and for relaying the positive charge over long distances to initiate mechanotransduction. Coordination of switch movements via sequential proton transfer along paired water clusters may be universal for nucleotide triphosphatases with conserved active sites, such as myosins and G-proteins.

  14. French Ministry of Health's response to Paris attacks of 13 November 2015.

    PubMed

    Philippe, Jean-Marc; Brahic, Olivier; Carli, Pierre; Tourtier, Jean-Pierre; Riou, Bruno; Vallet, Benoit

    2016-04-01

    On Friday November 13th at 9:20 pm, three kamikaze bombs went off around the Stade de France a stadium in Saint-Denis just outside Paris, 4 different shootings took place and bombings in Paris and hundreds of people were held hostage in a theater.This multi-site terrorist attack was the first of this magnitude in France. Drawing the lessons of these attacks and those which occurred in other countries from a health perspective is essential to continuously adapt and improve the French response to possible future attacks. Several issues would need to be further explored: Management of uncertainties: When to trigger the plans: after the 1st attack, the 2nd? When do attacks end and when to release mobilized resources? Management of victims: How to ensure that all victims are secured or taken care of? How to provide assistance when attacks are ongoing? Management of teams: Proper follow-up of persons involved in the response: health professionals, police and firemen, emergency call centers but also civil servants within administration that contributed to the response. Communication: Reactivity of all is a key element to secure appropriate resource is mobilized for the response. All actors have to be able to communicate quickly in a secured way.

  15. Wing Classification in the Virtual Research Center

    NASA Technical Reports Server (NTRS)

    Campbell, William H.

    1999-01-01

    The Virtual Research Center (VRC) is a Web site that hosts a database of documents organized to allow teams of scientists and engineers to store and maintain documents. A number of other workgroup-related capabilities are provided. My tasks as a NASA/ASEE Summer Faculty Fellow included developing a scheme for classifying the workgroups using the VRC using the various Divisions within NASA Enterprises. To this end I developed a plan to use several CGI Perl scripts to gather classification information from the leaders of the workgroups, and to display all the workgroups within a specified classification. I designed, implemented, and partially tested scripts which can be used to do the classification. I was also asked to consider directions for future development of the VRC. I think that the VRC can use XML to advantage. XML is a markup language with designer tags that can be used to build meaning into documents. An investigation as to how CORBA, an object-oriented object request broker included with JDK 1.2, might be used also seems justified.

  16. LAMDA programmer's manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, T.P.; Clark, R.M.; Mostrom, M.A.

    This report discusses the following topics on the LAMDA program: General maintenance; CTSS FCL script; DOS batch files; Macintosh MPW scripts; UNICOS FCL script; VAX/MS command file; LINC calling tree; and LAMDA calling tree.

  17. Using Diacritics in the Arabic Script of Malay to Scaffold Arab Postgraduate Students in Reading Malay Words

    ERIC Educational Resources Information Center

    Salehuddin, Khazriyati; Winskel, Heather

    2015-01-01

    Purpose: This study aims to investigate the use of diacritics in the Arabic script of Malay to facilitate Arab postgraduate students of UKM to read the Malay words accurately. It is hypothesised that the Arabic script could facilitate the reading of Malay words among the Arab students because of their earlier exposure to the Arabic script in…

  18. KSC-2011-1487

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- Members of the United States Air Force 45th Space Wing Honor Guard and more than a dozen 9/11 first responders take part in "The National 9/11 Flag" stitching ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  19. KSC-2011-1492

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. – Deputy Fire Chief Rick Anderson, left, Chief of Fire Training George Hoggard, and Assistant Chief of Fire Training David Seymour with NASA Kennedy Space Center Protective Services participated in the "National 9/11 Flag" stitching ceremony in the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida. The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  20. KSC-2011-1488

    NASA Image and Video Library

    2011-02-18

    CAPE CANAVERAL, Fla. -- In the Debus Conference Facility at the Kennedy Space Center Visitor Complex in Florida, Jeff Parness, the director, founder and chairman of the "New York Says Thank You Foundation" talks about the work and devotion that has gone into restoring "The National 9/11 Flag." The contributions of NASA, Kennedy Space Center and the state of Florida were stitched into the fabric of the American Flag, which was recovered near ground zero following the World Trade Center attacks on Sept. 11, 2001. The "New York Says Thank You Foundation" is taking the flag on a cross-country journey to be restored to its original 13-stripe design using pieces of fabric from American flags destined for retirement in all 50 states. Once the flag is restored, it will become a permanent collection of the National September 11 Memorial Museum being built at the World Trade Center site. Photo credit: NASA/Kim Shiflett

  1. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study.

    PubMed

    Abhishek, Abhishek; Valdes, Ana M; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12-2.68) after adjusting for covariates. Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes.

  2. Socioeconomic burden of hereditary angioedema: results from the hereditary angioedema burden of illness study in Europe.

    PubMed

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen; Hautamaki, Emily; Sisic, Zlatko; Wait, Suzanne; Boysen, Henrik B; Caballero, Teresa

    2014-07-04

    Hereditary angioedema (HAE) due to C1 inhibitor deficiency is a rare but serious and potentially life-threatening disease marked by spontaneous, recurrent attacks of swelling. The study objective was to characterize direct and indirect resource utilization associated with HAE from the patient perspective in Europe. The study was conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE via a cross-sectional survey of HAE patients, including direct and indirect resource utilization during and between attacks for patients and their caregivers over the past 6 months. A regression model examined predictors of medical resource utilization. Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p < 0.001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4-12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. HAE poses a considerable burden on patients and their families in terms of direct medical costs and indirect costs related to lost productivity. This burden is substantial at the time of attacks and in between attacks.

  3. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study

    PubMed Central

    Valdes, Ana M.; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    Objectives To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Methods Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. Results 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12–2.68) after adjusting for covariates. Conclusion Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes. PMID:29023487

  4. Comparing Asian American Women's Knowledge, Self-Efficacy, and Perceived Risk of Heart Attack to Other Racial and Ethnic Groups: The mPED Trial.

    PubMed

    Fukuoka, Yoshimi; Lisha, Nadra E; Vittinghoff, Eric

    2017-09-01

    The aim of the study was to compare knowledge and awareness of heart attacks/heart disease and perceived risk for future heart attack in Asian/Pacific Islander women, compared to other racial and ethnic groups. In this cross-sectional study, 318 women enrolled in a mobile phone-based physical activity education trial were analyzed. Heart attack knowledge, self-efficacy for recognizing and responding to heart attack symptoms, and perceived risk for a future heart attack were measured. Analyses were conducted using logistic, proportional odds, and linear regression models, depending on the outcome and adjusting for age. Pairwise differences between Asian/Pacific Islanders and the other four groups were assessed using a Bonferroni correction (p < 0.0125). Asian/Pacific Islander women had significantly lower total scores for knowledge of heart attack and self-efficacy for heart attack recognition and care seeking behavior compared to the Caucasian women (p = 0.001 and p = 0.002, respectively). However, perceived risk did not differ among the groups. Forty-six percent of the Asian American women, compared to 25% of Caucasian women, falsely believed "breast cancer is the number one cause of death for women (p = 0.002)." In addition, Asian/Pacific Islander women were less likely to report "arm pain, numbness, tingling, or radiating" as one of the heart attack symptoms compared to the Caucasian and the multiracial group (34%, 63% [p < 0.001], and 66% [p = 0.004], respectively). These findings highlight the urgent need to develop effective, tailored campaigns to close the knowledge gap between Asian/Pacific Islander women and Caucasian women.

  5. Socioeconomic burden of hereditary angioedema: results from the hereditary angioedema burden of illness study in Europe

    PubMed Central

    2014-01-01

    Background Hereditary angioedema (HAE) due to C1 inhibitor deficiency is a rare but serious and potentially life-threatening disease marked by spontaneous, recurrent attacks of swelling. The study objective was to characterize direct and indirect resource utilization associated with HAE from the patient perspective in Europe. Methods The study was conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE via a cross-sectional survey of HAE patients, including direct and indirect resource utilization during and between attacks for patients and their caregivers over the past 6 months. A regression model examined predictors of medical resource utilization. Results Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p < 0.001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4–12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. Conclusion HAE poses a considerable burden on patients and their families in terms of direct medical costs and indirect costs related to lost productivity. This burden is substantial at the time of attacks and in between attacks. PMID:24996814

  6. Refined Three-Dimensional Modelling of Thermally-Driven Flow in the Bormio System (Central Italian Alps)

    NASA Astrophysics Data System (ADS)

    Volpi, Giorgio; Riva, Federico; Frattini, Paolo; Battista Crosta, Giovanni; Magri, Fabien

    2016-04-01

    Thermal springs are widespread in the European Alps, where more than 80 geothermal sites are known and exploited. The quantitative assessment of those thermal flow systems is a challenging issue and requires accurate conceptual model and a thorough understanding of thermo-hydraulic properties of the aquifers. Accordingly in the last years, several qualitative studies were carried out to understand the heat and fluid transport processes driving deep fluids from the reservoir to the springs. Our work focused on thermal circulation and fluid outflows of the area around Bormio (Central Italian Alps), where nine geothermal springs discharge from dolomite bodies located close to a regional alpine thrust, called the Zebrù Line. At this site, water is heated in deep circulation systems and vigorously upwells at temperature of about 40°C. The aim of this paper is to explore the mechanisms of heat and fluid transport in the Bormio area by carrying out refined steady and transient three-dimensional finite element simulations of thermally-driven flow and to quantitatively assess the source area of the thermal waters. The full regional model (ca. 700 km2) is discretized with a highly refined triangular finite element planar grid obtained with Midas GTS NX software. The structural 3D features of the regional Zebrù thrust are built by interpolating series of geological cross sections using Fracman. A script was developed to convert and implement the thrust grid into FEFLOW mesh that comprises ca. 4 million elements. The numerical results support the observed discharge rates and temperature field within the simulated domain. Flow and temperature patterns suggest that thermal groundwater flows through a deep system crossing both sedimentary and metamorphic lithotypes, and a fracture network associated to the thrust system. Besides providing a numerical framework to simulate complex fractured systems, this example gives insights into the influence of deep alpine structures on groundwater circulation that underlies the development of many hydrothermal systems.

  7. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  8. Use of DNA from bite marks can determine species and individual animals that attack humans

    USGS Publications Warehouse

    Farley, Sean; Talbot, Sandra L.; Sage, George K.; Sinnott, Rick; Coltrane, Jessica

    2014-01-01

    During the summer of 2008, 6 documented attacks and close encounters with brown bears (Ursus arctos) occurred in the greater Anchorage, Alaska (USA) area. We discuss findings from 2 incidents in which people were mauled within 2 km of each other over a 6-week period and in which it was assumed that a single animal was responsible. To ensure public safety, authorities killed a brown bear implicated in the attacks by circumstantial evidence, though it was not known a priori that the animal was responsible. We extracted DNA from hairs and bite sites on the clothing of both victims and determined species and individual identity of the animal(s) involved in both incidents. Genetic data indicated the brown bear killed by authorities was responsible for one of the maulings, but not both. This research demonstrates that DNA-based techniques, with appropriate sampling, can provide unambiguous identification of animals involved in attacks, as well as provide reasonable justification for excluding others. Because DNA-based techniques can unequivocally identify individual bears carrying out attacks, they should be considered a standard method employed in wildlife attack investigations.

  9. The role of an active site Mg(2+) in HDV ribozyme self-cleavage: insights from QM/MM calculations.

    PubMed

    Mlýnský, Vojtěch; Walter, Nils G; Šponer, Jiří; Otyepka, Michal; Banáš, Pavel

    2015-01-07

    The hepatitis delta virus (HDV) ribozyme is a catalytic RNA motif embedded in the human pathogenic HDV RNA. It catalyzes self-cleavage of its sugar-phosphate backbone with direct participation of the active site cytosine C75. Biochemical and structural data support a general acid role of C75. Here, we used hybrid quantum mechanical/molecular mechanical (QM/MM) calculations to probe the reaction mechanism and changes in Gibbs energy along the ribozyme's reaction pathway with an N3-protonated C75H(+) in the active site, which acts as the general acid, and a partially hydrated Mg(2+) ion with one deprotonated, inner-shell coordinated water molecule that acts as the general base. We followed eight reaction paths with a distinct position and coordination of the catalytically important active site Mg(2+) ion. For six of them, we observed feasible activation barriers ranging from 14.2 to 21.9 kcal mol(-1), indicating that the specific position of the Mg(2+) ion in the active site is predicted to strongly affect the kinetics of self-cleavage. The deprotonation of the U-1(2'-OH) nucleophile and the nucleophilic attack of the resulting U-1(2'-O(-)) on the scissile phosphodiester are found to be separate steps, as deprotonation precedes the nucleophilic attack. This sequential mechanism of the HDV ribozyme differs from the concerted nucleophilic activation and attack suggested for the hairpin ribozyme. We estimate the pKa of the U-1(2'-OH) group to range from 8.8 to 11.2, suggesting that it is lowered by several units from that of a free ribose, comparable to and most likely smaller than the pKa of the solvated active site Mg(2+) ion. Our results thus support the notion that the structure of the HDV ribozyme, and particularly the positioning of the active site Mg(2+) ion, facilitate deprotonation and activation of the 2'-OH nucleophile.

  10. When Animators Attack

    ERIC Educational Resources Information Center

    Read, Brock

    2006-01-01

    College administrators across the US are learning that chatter on e-mail, blogs, and social-networking sites can turn even minor faux pas into major controversies. The issue is discussed with reference to the firing of a teaching assistant whose Web site lampooned the president of Columbia College Chicago and left the institution facing serious…

  11. Study of the VMM1 read-out chip in a neutron irradiation environment

    NASA Astrophysics Data System (ADS)

    Alexopoulos, T.; Fanourakis, G.; Geralis, T.; Kokkoris, M.; Kourkoumeli-Charalampidi, A.; Papageorgiou, K.; Tsipolitis, G.

    2016-05-01

    Within 2015, the LHC operated close to the design energy of √s = 13-14 TeV delivering instantaneous luminosities up to Script L = 5 × 1033 cm-2s-1. The ATLAS Phase-I upgrade in 2018/19 will introduce the MicroMEGAS detectors in the area of the small wheel at the end caps. Accompanying new electronics are designed and built such as the VMM front end ASIC, which provides energy, timing and triggering information and allows fast data read-out. The first VMM version (VMM1) has been widely produced and tested in various test beams, whilst the second version (VMM2) is currently being tested. This paper focuses on the VMM1 single event upset studies and more specifically on the response of the configuration registers under harsh radiation environments. Similar conditions are expected at Run III with Script L = 2 × 1034 cm-2s-1 and a mean of 55 interactions per bunch crossing. Two VMM1s were exposed in a neutron irradiation environment using the TANDEM Van Der Graaff accelerator at NSCR Demokritos, Athens, Greece. The results showed a rate of SEU occurrences at a measured cross section of (4.1±0.8)×10-14 cm2/bit for each VMM. Consequently, when extrapolating this value to the luminosity expected in Run III, the occurrence is roughly 6 SEUs/min in all the read-out system comprising 40,000 VMMs installed during the Phase-I upgrade.

  12. Comparison of artificial intelligence classifiers for SIP attack data

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2016-05-01

    Honeypot application is a source of valuable data about attacks on the network. We run several SIP honeypots in various computer networks, which are separated geographically and logically. Each honeypot runs on public IP address and uses standard SIP PBX ports. All information gathered via honeypot is periodically sent to the centralized server. This server classifies all attack data by neural network algorithm. The paper describes optimizations of a neural network classifier, which lower the classification error. The article contains the comparison of two neural network algorithm used for the classification of validation data. The first is the original implementation of the neural network described in recent work; the second neural network uses further optimizations like input normalization or cross-entropy cost function. We also use other implementations of neural networks and machine learning classification algorithms. The comparison test their capabilities on validation data to find the optimal classifier. The article result shows promise for further development of an accurate SIP attack classification engine.

  13. A water tunnel flow visualization study of the F-15

    NASA Technical Reports Server (NTRS)

    Lorincz, D. J.

    1978-01-01

    Water tunnel studies were performed to qualitatively define the flow field of the F-15 aircraft. Two lengthened forebodies, one with a modified cross-sectional shape, were tested in addition to the basic forebody. Particular emphasis was placed on defining vortex flows generated at high angles of attack. The flow visualization tests were conducted in the Northrop diagnostic water tunnel using a 1/48-scale model of the F-15. Flow visualization pictures were obtained over an angle-of-attack range to 55 deg and sideslip angles up to 10 deg. The basic aircraft configuration was investigated in detail to determine the vortex flow field development, vortex path, and vortex breakdown characteristics as a function of angle of attack and sideslip. Additional tests showed that the wing upper surface vortex flow fields were sensitive to variations in inlet mass flow ratio and inlet cowl deflection angle. Asymmetries in the vortex systems generated by each of the three forebodies were observed in the water tunnel at zero sideslip and high angles of attack.

  14. Experimental aerodynamic characteristics for slender bodies with thin wings at angles of attack from 0 deg to 58 deg and Mach numbers from 0.6 to 2.0

    NASA Technical Reports Server (NTRS)

    Jorgensen, L. H.; Howell, M. H.

    1976-01-01

    An experimental investigation was conducted in the Ames 6-by-6-Foot Wind Tunnel to measure the static aerodynamic characteristics for bodies of circular and elliptic cross section with various thin flat-plate wings. Eighteen configuration combinations were tested at Mach numbers of 0.6, 0.9, 1.2, 1.5, and 2.0 at angles of attack from 0 deg to 58 deg. The data demonstrate that taper ratio and aspect ratio had only small effect on the aerodynamic characteristics, especially at the higher angles of attack. Undesirable side forces and yawing moments, which developed at angles of attack greater than about 25 deg, were generally no greater than those for the bodies tested alone. As for the bodies alone, the side forces and yawing moments increased as the nose fineness ratio increased and/or as the subsonic Mach number decreased.

  15. The Next Generation of Ground Operations Command and Control; Scripting in C no. and Visual Basic

    NASA Technical Reports Server (NTRS)

    Ritter, George; Pedoto, Ramon

    2010-01-01

    Scripting languages have become a common method for implementing command and control solutions in space ground operations. The Systems Test and Operations Language (STOL), the Huntsville Operations Support Center (HOSC) Scripting Language Processor (SLP), and the Spacecraft Control Language (SCL) offer script-commands that wrap tedious operations tasks into single calls. Since script-commands are interpreted, they also offer a certain amount of hands-on control that is highly valued in space ground operations. Although compiled programs seem to be unsuited for interactive user control and are more complex to develop, Marshall Space flight Center (MSFC) has developed a product called the Enhanced and Redesign Scripting (ERS) that makes use of the graphical and logical richness of a programming language while offering the hands-on and ease of control of a scripting language. ERS is currently used by the International Space Station (ISS) Payload Operations Integration Center (POIC) Cadre team members. ERS integrates spacecraft command mnemonics, telemetry measurements, and command and telemetry control procedures into a standard programming language, while making use of Microsoft's Visual Studio for developing Visual Basic (VB) or C# ground operations procedures. ERS also allows for script-style user control during procedure execution using a robust graphical user input and output feature. The availability of VB and C# programmers, and the richness of the languages and their development environment, has allowed ERS to lower our "script" development time and maintenance costs at the Marshall POIC.

  16. An interactive GIS based tool on Chinese history and its topography

    NASA Astrophysics Data System (ADS)

    Konda, Ashish Reddy

    The aim of the thesis is to demonstrate how China was attacked by the foreign powers, the rise and fall of the empires, the border conflicts with India, Russia, Vietnam and territorial disputes in South China Sea. This thesis is focused on creating a GIS tool showcasing the modern Chinese history, which includes the major wars fought during that period. This tool is developed using the features of Google Maps that shows the location of the wars. The topography of China is also represented on the interactive Google Map by creating layers for rivers, mountain ranges and deserts. The provinces with highest population are also represented on the Google Map with circles. The application also shows the historical events in chronological order using a timeline feature. This has been implemented using JQuery, JavaScript, HTML5 and CSS. Chinese culture and biographies of important leaders are also included in this thesis, which is embedded with pictures and videos.

  17. Technology and operational considerations for low-heat-rate trajectories. [of future winged earth reentry vehicles

    NASA Technical Reports Server (NTRS)

    Wurster, K. E.; Eldred, C. H.

    1979-01-01

    A broad parametric study which examines several critical aspects of low-heat-rate entry trajectories is performed. Low planform loadings associated with future winged earth-entry vehicles coupled with the potential application of metallic thermal protection systems (TPS) suggest that such trajectories are of particular interest. Studied are three heating conditions - reference, stagnation, and windward centerline, for both laminar and turbulent flow; configuration-related factors including planform loading and hypersonic angle of attack; and mission-related factors such as cross-range and orbit inclination. Results indicate benefits in the design of TPS to be gained by utilizing moderate angles of attack as opposed to high-lift coefficient, high angles of attack, during entry. An assessment of design and technology implications is made.

  18. The cultural life script as cognitive schema: how the life script shapes memory for fictional life stories.

    PubMed

    Koppel, Jonathan; Berntsen, Dorthe

    2014-01-01

    We tested, across three studies, the effect of the cultural life script on memory and its phenomenological properties. We focused in particular on the mnemonic effects of both schema-consistency and frequency in the life script. In addition to testing recognition (in Study 1) and recall (in Studies 2 and 3), we also collected remember/know judgements for remembered events (in Studies 1 and 2) and memory for their emotional valence (in Study 2). Our primary finding was that, across all three studies, higher-frequency events were more memorable than lower-frequency events, as measured through either recognition or recall. We also attained three additional, complementary effects: First, schema-inconsistent events received remember ratings more often than schema-consistent events (in Study 2, with a trend to this effect in Study 1); second, where an event's emotional valence was inconsistent with the life script, memory for its valence was reconstructed to fit the script (in Study 2); and, third, intrusions in recall were disproportionately for life script events (in Study 3), although that was not the case in recognition (in Study 1). We conclude that the life script serves as a cognitive schema in how it shapes memory and its phenomenological properties.

  19. Leeward flow over delta wings at supersonic speeds

    NASA Technical Reports Server (NTRS)

    Szodruch, J. G.

    1980-01-01

    A survey was made of the parameters affecting the development of the leeward symmetric separated flow over slender delta wings immersed in a supersonic stream. The parameters included Mach number, Reynolds number, angle of attack, leading-edge sweep angle, and body cross-sectional shape, such that subsonic and supersonic leading-edge flows are encountered. It was seen that the boundaries between the various flow regimes existing about the leeward surface may conveniently be represented on a diagram with the components of angle of attack and Mach number normal to the leading edge as governing parameters.

  20. ABM Drag_Pass Report Generator

    NASA Technical Reports Server (NTRS)

    Fisher, Forest; Gladden, Roy; Khanampornpan, Teerapat

    2008-01-01

    dragREPORT software was developed in parallel with abmREPORT, which is described in the preceding article. Both programs were built on the capabilities created during that process. This tool generates a drag_pass report that summarizes vital information from the MRO aerobreaking drag_pass build process to facilitate both sequence reviews and provide a high-level summarization of the sequence for mission management. The script extracts information from the ENV, SSF, FRF, SCMFmax, and OPTG files, presenting them in a single, easy-to-check report providing the majority of parameters needed for cross check and verification as part of the sequence review process. Prior to dragReport, all the needed information was spread across a number of different files, each in a different format. This software is a Perl script that extracts vital summarization information and build-process details from a number of source files into a single, concise report format used to aid the MPST sequence review process and to provide a high-level summarization of the sequence for mission management reference. This software could be adapted for future aerobraking missions to provide similar reports, review and summarization information.

  1. KNIME for reproducible cross-domain analysis of life science data.

    PubMed

    Fillbrunn, Alexander; Dietz, Christian; Pfeuffer, Julianus; Rahn, René; Landrum, Gregory A; Berthold, Michael R

    2017-11-10

    Experiments in the life sciences often involve tools from a variety of domains such as mass spectrometry, next generation sequencing, or image processing. Passing the data between those tools often involves complex scripts for controlling data flow, data transformation, and statistical analysis. Such scripts are not only prone to be platform dependent, they also tend to grow as the experiment progresses and are seldomly well documented, a fact that hinders the reproducibility of the experiment. Workflow systems such as KNIME Analytics Platform aim to solve these problems by providing a platform for connecting tools graphically and guaranteeing the same results on different operating systems. As an open source software, KNIME allows scientists and programmers to provide their own extensions to the scientific community. In this review paper we present selected extensions from the life sciences that simplify data exploration, analysis, and visualization and are interoperable due to KNIME's unified data model. Additionally, we name other workflow systems that are commonly used in the life sciences and highlight their similarities and differences to KNIME. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  2. Counter-Flow Cooling Tower Test Cell

    NASA Astrophysics Data System (ADS)

    Dvořák, Lukáš; Nožička, Jiří

    2014-03-01

    The article contains a design of a functional experimental model of a cross-flow mechanical draft cooling tower and the results and outcomes of measurements. This device is primarily used for measuring performance characteristics of cooling fills, but with a simple rebuild, it can be used for measuring other thermodynamic processes that take part in so-called wet cooling. The main advantages of the particular test cell lie in the accuracy, size, and the possibility of changing the water distribution level. This feature is very useful for measurements of fills of different heights without the influence of the spray and rain zone. The functionality of this test cell has been verified experimentally during assembly, and data from the measurement of common film cooling fills have been compared against the results taken from another experimental line. For the purpose of evaluating the data gathered, computational scripts were created in the MATLAB numerical computing environment. The first script is for exact calculation of the thermal balance of the model, and the second is for determining Merkel's number via Chebyshev's method.

  3. LAMDA programmer`s manual. [Final report, Part 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, T.P.; Clark, R.M.; Mostrom, M.A.

    This report discusses the following topics on the LAMDA program: General maintenance; CTSS FCL script; DOS batch files; Macintosh MPW scripts; UNICOS FCL script; VAX/MS command file; LINC calling tree; and LAMDA calling tree.

  4. Dcs Data Viewer, an Application that Accesses ATLAS DCS Historical Data

    NASA Astrophysics Data System (ADS)

    Tsarouchas, C.; Schlenker, S.; Dimitrov, G.; Jahn, G.

    2014-06-01

    The ATLAS experiment at CERN is one of the four Large Hadron Collider experiments. The Detector Control System (DCS) of ATLAS is responsible for the supervision of the detector equipment, the reading of operational parameters, the propagation of the alarms and the archiving of important operational data in a relational database (DB). DCS Data Viewer (DDV) is an application that provides access to the ATLAS DCS historical data through a web interface. Its design is structured using a client-server architecture. The pythonic server connects to the DB and fetches the data by using optimized SQL requests. It communicates with the outside world, by accepting HTTP requests and it can be used stand alone. The client is an AJAX (Asynchronous JavaScript and XML) interactive web application developed under the Google Web Toolkit (GWT) framework. Its web interface is user friendly, platform and browser independent. The selection of metadata is done via a column-tree view or with a powerful search engine. The final visualization of the data is done using java applets or java script applications as plugins. The default output is a value-over-time chart, but other types of outputs like tables, ascii or ROOT files are supported too. Excessive access or malicious use of the database is prevented by a dedicated protection mechanism, allowing the exposure of the tool to hundreds of inexperienced users. The current configuration of the client and of the outputs can be saved in an XML file. Protection against web security attacks is foreseen and authentication constrains have been taken into account, allowing the exposure of the tool to hundreds of users world wide. Due to its flexible interface and its generic and modular approach, DDV could be easily used for other experiment control systems.

  5. Aerodynamics of the flying snake Chrysopelea paradisi: how a bluff body cross-sectional shape contributes to gliding performance.

    PubMed

    Holden, Daniel; Socha, John J; Cardwell, Nicholas D; Vlachos, Pavlos P

    2014-02-01

    A prominent feature of gliding flight in snakes of the genus Chrysopelea is the unique cross-sectional shape of the body, which acts as the lifting surface in the absence of wings. When gliding, the flying snake Chrysopelea paradisi morphs its circular cross-section into a triangular shape by splaying its ribs and flattening its body in the dorsoventral axis, forming a geometry with fore-aft symmetry and a thick profile. Here, we aimed to understand the aerodynamic properties of the snake's cross-sectional shape to determine its contribution to gliding at low Reynolds numbers. We used a straight physical model in a water tunnel to isolate the effects of 2D shape, analogously to studying the profile of an airfoil of a more typical flyer. Force measurements and time-resolved (TR) digital particle image velocimetry (DPIV) were used to determine lift and drag coefficients, wake dynamics and vortex-shedding characteristics of the shape across a behaviorally relevant range of Reynolds numbers and angles of attack. The snake's cross-sectional shape produced a maximum lift coefficient of 1.9 and maximum lift-to-drag ratio of 2.7, maintained increases in lift up to 35 deg, and exhibited two distinctly different vortex-shedding modes. Within the measured Reynolds number regime (Re=3000-15,000), this geometry generated significantly larger maximum lift coefficients than many other shapes including bluff bodies, thick airfoils, symmetric airfoils and circular arc airfoils. In addition, the snake's shape exhibited a gentle stall region that maintained relatively high lift production even up to the highest angle of attack tested (60 deg). Overall, the cross-sectional geometry of the flying snake demonstrated robust aerodynamic behavior by maintaining significant lift production and near-maximum lift-to-drag ratios over a wide range of parameters. These aerodynamic characteristics help to explain how the snake can glide at steep angles and over a wide range of angles of attack, but more complex models that account for 3D effects and the dynamic movements of aerial undulation are required to fully understand the gliding performance of flying snakes.

  6. ANLPS. Graphics Driver for PostScript Output

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engert, D.E.

    1987-09-01

    ANLPS is a PostScript graphics device driver for use with the proprietary CA TELLAGRAF, CUECHART, and DISSPLA products. The driver allows the user to create and send text and graphics output in the Adobe Systems` PostScript page description language, which is accepted by many print devices. The PostScript output can be generated by TELLAGRAF 6.0 and DISSPLA 10.0. The files containing the PostScript output are sent to PostScript laser printers, such as the Apple LaserWriter. It is not necessary to initialize the printer, as the output for each plot is self-contained. All CA fonts are mapped to PostScript fonts, e.g.more » Swiss-Medium is mapped to Helvetica, and the mapping is easily changed. Hardware shading and hardware characters, area fill, and color are included. Auxiliary routines are provided which allow graphics files containing figures, logos, and diagrams to be merged with text files. The user can then position, scale, and rotate the figures on the output page in the reserved area specified.« less

  7. [Effect of spatial location on the generality of block-wise conflict adaptation between different types of scripts].

    PubMed

    Watanabe, Yurina; Yoshizaki, Kazuhito

    2014-10-01

    This study aimed to investigate the generality of conflict adaptation associated with block-wise conflict frequency between two types of stimulus scripts (Kanji and Hiragana). To this end, we examined whether the modulation of the compatibility effect with one type of script depending on block-wise conflict frequency (75% versus 25% generalized to the other type of script whose block-wise conflict frequency was kept constant (50%), using the Spatial Stroop task. In Experiment 1, 16 participants were required to identify the target orientation (up or down) presented in the upper or lower visual-field. The results showed that block-wise conflict adaptation with one type of stimulus script generalized to the other. The procedure in Experiment 2 was the same as that in Experiment 1, except that the presentation location differed between the two types of stimulus scripts. We did not find a generalization from one script to the other. These results suggest that presentation location is a critical factor contributing to the generality of block-wise conflict adaptation.

  8. WILD PIG ATTACKS ON HUMANS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayer, J.

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animalsmore » were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.« less

  9. Media exposure and prolonged grief: A study of bereaved parents and siblings after the 2011 Utøya Island terror attack.

    PubMed

    Kristensen, Pål; Dyregrov, Kari; Dyregrov, Atle; Heir, Trond

    2016-11-01

    After terror attacks, the media coverage can be a potential secondary stressor for bereaved families. In the present study, we aimed to examine the level of prolonged grief (PG), and to explore the association between media exposure and PG in parents and siblings of individuals who were killed in a terror attack. Parents and siblings (n = 103) from 42 different families bereaved by the 2011 Utøya Island mass shooting participated in a survey 18 months after the attack. The survey measured the amount of media exposure experienced by the bereaved during the first month after the attack. PG was self-reported using the Inventory of Complicated Grief (ICG). Data was analyzed with multilevel methods with mixed effects models. Of the total sample of participants, 78.6% (n = 81/103) had sum scores higher than the designated cutoff >25 on ICG, indicating a probable prolonged grief disorder (PGD). Multilevel analysis showed significantly higher level of PG among those who reported high exposure to the media coverage (>4 hours daily) the first month after the attack, among females, and among those who were in contact with their son/daughter/brother/sister by telephone during the attack. With the cross-sectional design, caution should be taken about making interpretations about causal effects. Media exposure may trigger or maintain prolonged grief reactions. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  10. Anti-spoofing for display and print attacks on palmprint verification systems

    NASA Astrophysics Data System (ADS)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  11. Using exterior building surface films to assess human exposure and health risks from PCDD/Fs in New York City, USA, after the World Trade Center attacks.

    PubMed

    Rayne, Sierra

    2005-12-09

    Concentrations of tetra- through octa-chlorinated dibenzo-p-dioxins and dibenzofurans (PCDD/Fs) were determined in exterior window films from Manhattan and Brooklyn in New York City (NYC), USA, 6 weeks after the World Trade Center (WTC) attacks of 11 September 2001. High concentrations of the 2,3,7,8-substituted congeners (P(2378)CDD/Fs) were observed, at levels up to 6600 pg-TEQ g(-1) nearest the WTC site. An equilibrium partitioning model was developed to reconstruct total gas + particle-phase atmospheric concentrations of P(2378)CDD/Fs at each site. The reconstructed atmospheric and window film concentrations were subsequently used in a preliminary human health risk assessment to estimate the potential cancer and non-cancer risks posed to residents of lower Manhattan from these contaminants over the 6 week exposure period between the WTC attacks and sampling dates. Residents of lower Manhattan appear to have a slightly elevated cancer risk (up to 1.6% increase over background) and increased P(2378)CDD/F body burden (up to 8.0% increase over background) because of above-background exposure to high concentrations of P(2378)CDD/Fs produced from the WTC attacks during the short period between 11 September 2001, and window film sampling 6 weeks later.

  12. The design and implementation of web mining in web sites security

    NASA Astrophysics Data System (ADS)

    Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li

    2003-06-01

    The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.

  13. Health-related quality of life and treatment satisfaction in patients with gout: results from a cross-sectional study in a managed care setting.

    PubMed

    Khanna, Puja P; Shiozawa, Aki; Walker, Valery; Bancroft, Tim; Essoi, Breanna; Akhras, Kasem S; Khanna, Dinesh

    2015-01-01

    Patient satisfaction with treatment directly impacts adherence to medication. The objective was to assess and compare treatment satisfaction with the Treatment Satisfaction Questionnaire for Medication (TSQM), gout-specific health-related quality of life (HRQoL) with the Gout Impact Scale (GIS), and generic HRQoL with the SF-12v2(®) Health Survey (SF-12) in patients with gout in a real-world practice setting. This cross-sectional mail survey included gout patients enrolled in a large commercial health plan in the US. Patients were ≥18 years with self-reported gout diagnosis, who filled ≥1 prescription for febuxostat during April 26, 2012 to July 26, 2012 and were not taking any other urate-lowering therapies. The survey included the TSQM version II (TSQM vII, score 0-100, higher scores indicate better satisfaction), GIS (score 0-100, higher scores indicate worse condition), and SF-12 (physical component summary and mental component summary). Patients were stratified by self-report of currently experiencing a gout attack or not to assess the discriminant ability of the questionnaires. A total of 257 patients were included in the analysis (mean age, 54.9 years; 87% male). Patients with current gout attack (n=29, 11%) had worse scores than those without gout attack on most instrument scales. Mean differences between current attack and no current attack for the TSQM domains were: -20.6, effectiveness; -10.6, side effects; -12.1, global satisfaction (all P<0.05); and -6.1, convenience (NS). For the GIS, mean differences were: 30.5, gout overall concern; 14.6, gout medication side effects; 22.7, unmet gout treatment needs; 11.5, gout concern during attack (all P<0.05); and 7.9, well-being during attack (NS). Mean difference in SF-12 was -6.6 for physical component summary (P<0.05) and -2.9 for mental component summary (NS). Correlations between several TSQM and GIS scales were moderate. The TSQM and GIS were complementary in evaluating the impact of gout flare on treatment satisfaction and HRQoL. Correlations between the two instruments supported the relationship between treatment satisfaction and HRQoL.

  14. Health-related quality of life and treatment satisfaction in patients with gout: results from a cross-sectional study in a managed care setting

    PubMed Central

    Khanna, Puja P; Shiozawa, Aki; Walker, Valery; Bancroft, Tim; Essoi, Breanna; Akhras, Kasem S; Khanna, Dinesh

    2015-01-01

    Background Patient satisfaction with treatment directly impacts adherence to medication. Objective The objective was to assess and compare treatment satisfaction with the Treatment Satisfaction Questionnaire for Medication (TSQM), gout-specific health-related quality of life (HRQoL) with the Gout Impact Scale (GIS), and generic HRQoL with the SF-12v2® Health Survey (SF-12) in patients with gout in a real-world practice setting. Methods This cross-sectional mail survey included gout patients enrolled in a large commercial health plan in the US. Patients were ≥18 years with self-reported gout diagnosis, who filled ≥1 prescription for febuxostat during April 26, 2012 to July 26, 2012 and were not taking any other urate-lowering therapies. The survey included the TSQM version II (TSQM vII, score 0–100, higher scores indicate better satisfaction), GIS (score 0–100, higher scores indicate worse condition), and SF-12 (physical component summary and mental component summary). Patients were stratified by self-report of currently experiencing a gout attack or not to assess the discriminant ability of the questionnaires. Results A total of 257 patients were included in the analysis (mean age, 54.9 years; 87% male). Patients with current gout attack (n=29, 11%) had worse scores than those without gout attack on most instrument scales. Mean differences between current attack and no current attack for the TSQM domains were: −20.6, effectiveness; −10.6, side effects; −12.1, global satisfaction (all P<0.05); and −6.1, convenience (NS). For the GIS, mean differences were: 30.5, gout overall concern; 14.6, gout medication side effects; 22.7, unmet gout treatment needs; 11.5, gout concern during attack (all P<0.05); and 7.9, well-being during attack (NS). Mean difference in SF-12 was −6.6 for physical component summary (P<0.05) and −2.9 for mental component summary (NS). Correlations between several TSQM and GIS scales were moderate. Conclusion The TSQM and GIS were complementary in evaluating the impact of gout flare on treatment satisfaction and HRQoL. Correlations between the two instruments supported the relationship between treatment satisfaction and HRQoL. PMID:26185426

  15. 42 CFR 423.160 - Standards for electronic prescribing.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Council for Prescription Drug Programs Prescriber/Pharmacist Interface SCRIPT Standard, Implementation... National Council for Prescription Drug Programs Prescriber/Pharmacist Interface SCRIPT Standard... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide Version 8, Release 1 (Version 8.1...

  16. 42 CFR 423.160 - Standards for electronic prescribing.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... National Council for Prescription Drug Programs Prescriber/Pharmacist Interface SCRIPT Standard... National Council for Prescription Drug Programs Prescriber/Pharmacist Interface SCRIPT Standard... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide Version 8, Release 1 (Version 8.1...

  17. 42 CFR 423.160 - Standards for electronic prescribing.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... National Council for Prescription Drug Programs Prescriber/Pharmacist Interface SCRIPT Standard... National Council for Prescription Drug Programs Prescriber/Pharmacist Interface SCRIPT Standard... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide Version 8, Release 1 (Version 8.1...

  18. Python Scripts for Automation of Current-Voltage Testing of Semiconductor Devices (FY17)

    DTIC Science & Technology

    2017-01-01

    ARL-TR-7923 ● JAN 2017 US Army Research Laboratory Python Scripts for Automation of Current- Voltage Testing of Semiconductor...manual device-testing procedures is reduced or eliminated through automation. This technical report includes scripts written in Python , version 2.7, used ...nothing. 3.1.9 Exit Program The script exits the entire program. Line 505, sys.exit(), uses the sys package that comes with Python to exit system

  19. Word Spotting for Indic Documents to Facilitate Retrieval

    NASA Astrophysics Data System (ADS)

    Bhardwaj, Anurag; Setlur, Srirangaraj; Govindaraju, Venu

    With advances in the field of digitization of printed documents and several mass digitization projects underway, information retrieval and document search have emerged as key research areas. However, most of the current work in these areas is limited to English and a few oriental languages. The lack of efficient solutions for Indic scripts has hampered information extraction from a large body of documents of cultural and historical importance. This chapter presents two relevant topics in this area. First, we describe the use of a script-specific keyword spotting for Devanagari documents that makes use of domain knowledge of the script. Second, we address the needs of a digital library to provide access to a collection of documents from multiple scripts. This requires intelligent solutions which scale across different scripts. We present a script-independent keyword spotting approach for this purpose. Experimental results illustrate the efficacy of our methods.

  20. A randomized double-blind, placebo-controlled, cross-over trial (Vestparoxy) of the treatment of vestibular paroxysmia with oxcarbazepine.

    PubMed

    Bayer, Otmar; Brémová, Tatiana; Strupp, Michael; Hüfner, Katharina

    2018-02-01

    Vestibular paroxysmia (VP) is characterized by short, often oligosymptomatic attacks of vertigo which occur spontaneously or are sometimes provoked by turning the head. Despite the description of the disease almost 40 years ago (first termed "disabling positional vertigo"), no controlled treatment trial has been published to date. The Vestparoxy trial was designed as a randomized, placebo-controlled, double-blind cross-over trial to examine the therapeutic effect of oxcarbazepine (OXA) in patients with definite or probable VP. Patients were recruited from August 2005 to December 2011 in the outpatient Dizziness Unit of the Department of Neurology of the Munich University Hospital, and randomized to receive OXA (first week: 300 mg once per day, second week: 300 mg b.i.d., third week: 300 mg t.i.d. until the end of the third month), followed by placebo or vice versa with a 1-month wash-out period in between. The primary endpoint was the number of days with one or more attacks. Secondary endpoints were the number of attacks during the observed days, and the median (for each day) duration of attacks. All these endpoints were assessed using standardized diaries collected at the end of each treatment phase. Forty-three patients were randomized, 18 patients provided usable data (2525 patient days) for at least one treatment phase and were included in the main (intention-to-treat) analysis. The most common reasons for discontinuation documented were adverse events. The risk of experiencing a day with at least one attack was 0.41 under OXA, and 0.62 under placebo treatment, yielding a relative risk of 0.67 (95% CI 0.47-0.95, p = 0.025). The number of attacks during the observed days ratio was 0.53 (95% CI 0.42-0.68, p < 0.001) under OXA compared to placebo. Median attack duration was 4 s (Q25: 2 s, Q75: 120 s) under OXA, and 3 s (Q25: 2 s, Q75: 60 s) under placebo treatment. When days with no attacks, i.e., duration = 0, were included in the analysis, these figures changed to 0 (Q25: 0, Q75: 3 s), and 2 (Q25: 0, Q75: 6 s). No serious adverse events or new safety findings were identified during the trial. The Vestparoxy trial showed a significant reduction of VP attacks under OXA compared to placebo treatment, confirming the known and revealing no new side effects.

  1. PRIMED: PRIMEr Database for Deleting and Tagging All Fission and Budding Yeast Genes Developed Using the Open-Source Genome Retrieval Script (GRS)

    PubMed Central

    Cummings, Michael T.; Joh, Richard I.; Motamedi, Mo

    2015-01-01

    The fission (Schizosaccharomyces pombe) and budding (Saccharomyces cerevisiae) yeasts have served as excellent models for many seminal discoveries in eukaryotic biology. In these organisms, genes are deleted or tagged easily by transforming cells with PCR-generated DNA inserts, flanked by short (50-100bp) regions of gene homology. These PCR reactions use especially designed long primers, which, in addition to the priming sites, carry homology for gene targeting. Primer design follows a fixed method but is tedious and time-consuming especially when done for a large number of genes. To automate this process, we developed the Python-based Genome Retrieval Script (GRS), an easily customizable open-source script for genome analysis. Using GRS, we created PRIMED, the complete PRIMEr D atabase for deleting and C-terminal tagging genes in the main S. pombe and five of the most commonly used S. cerevisiae strains. Because of the importance of noncoding RNAs (ncRNAs) in many biological processes, we also included the deletion primer set for these features in each genome. PRIMED are accurate and comprehensive and are provided as downloadable Excel files, removing the need for future primer design, especially for large-scale functional analyses. Furthermore, the open-source GRS can be used broadly to retrieve genome information from custom or other annotated genomes, thus providing a suitable platform for building other genomic tools by the yeast or other research communities. PMID:25643023

  2. Launch Support Video Site

    NASA Technical Reports Server (NTRS)

    OFarrell, Zachary L.

    2013-01-01

    The goal of this project is to create a website that displays video, countdown clock, and event times to customers during launches, without needing to be connected to the internal operations network. The requirements of this project are to also minimize the delay in the clock and events to be less than two seconds. The two parts of this are the webpage, which will display the data and videos to the user, and a server to send clock and event data to the webpage. The webpage is written in HTML with CSS and JavaScript. The JavaScript is responsible for connecting to the server, receiving new clock data, and updating the webpage. JavaScript is used for this because it can send custom HTTP requests from the webpage, and provides the ability to update parts of the webpage without having to refresh the entire page. The server application will act as a relay between the operations network, and the open internet. On the operations network side, the application receives multicast packets that contain countdown clock and events data. It will then parse the data into current countdown times and events, and create a packet with that information that can be sent to webpages. The other part will accept HTTP requests from the webpage, and respond to them with current data. The server is written in C# with some C++ files used to define the structure of data packets. The videos for the webpage will be shown in an embedded player from UStream.

  3. 6 CFR 27.225 - Site security plans.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... performance standards and potential modes of terrorist attack including, as applicable, vehicle-borne explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes...

  4. 6 CFR 27.225 - Site security plans.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... performance standards and potential modes of terrorist attack including, as applicable, vehicle-borne explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes...

  5. 6 CFR 27.225 - Site security plans.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... performance standards and potential modes of terrorist attack including, as applicable, vehicle-borne explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes...

  6. Association of Job Stressors With Panic Attack and Panic Disorder in a Working Population in Japan: A Cross-Sectional Study.

    PubMed

    Asai, Yumi; Imamura, Kotaro; Kawakami, Norito

    2017-06-01

    This study aimed to investigate associations of job stressors with panic attack (PA) and panic disorder (PD) among Japanese workers. A cross-sectional online questionnaire survey was conducted of 2060 workers. Job strain, effort/reward imbalance, and workplace social support were measured by the job content questionnaire and effort/reward imbalance questionnaire. These variables were classified into tertiles. PA/PD were measured by self-report based on the mini international neuropsychiatric interview (MINI). Multiple logistic regression was conducted, adjusting for demographic, lifestyle, and health-related covariates. Data from 1965 participants were analyzed. Adjusted odds ratio (OR) of PA/PD was significantly greater for the group with high effort/reward imbalance compared with the group with low effort/reward imbalance (ORs, 2.64 and 2.94, respectively, both P < 0.05). This study found effort/reward imbalance was associated with having PA/PD among Japanese workers.

  7. The dislocations of terror: Assessments of risk during the Second Intifada.

    PubMed

    Spilerman, Seymour; Stecklov, Guy

    2013-05-01

    The goal of terrorism is to create havoc and disrupt the normal functioning of society. To understand the impact of terrorism on a country it is useful to consider two types of country experiences with these shocks to the social order-the instance of a very small number of attacks against high profile targets and the case of chronic terror with a great number of attacks, generally against targets that are part of routine daily activities. The present study explores the Israeli experience with chronic terror. Using expenditure information from coffee shops and restaurants we examine how individuals assess their vulnerability to an attack and adjust their behavior. Specifically, we explore whether distance from the site of an attack, and similarity of a contemplated undertaking to the target of a recent attack, influence decision making in a context of chronic terror. We find strong support for a situational similarity effect but only weak evidence for a proximity effect. We examine the implications of these findings for the organization of economic activity. Copyright © 2012 Elsevier Inc. All rights reserved.

  8. Management of victims of urban chemical attack: the French approach.

    PubMed

    Laurent, J F; Richter, F; Michel, A

    1999-10-01

    Since the early 1980s several disasters involving mass release of toxic substances have focused the attention of different administrations and the fire services into producing protocols and guidelines for action in civilian situations. The bomb attack in the Tokyo subway, in March 1995, made it clear that a terrorist attack using highly toxic agents is now feasible. Management of disasters in the civil sector in France is based upon two interlinked plans: the Red Plan, which covers on-site organisation, and the White Plan, which concerns the interface with hospital services. Special procedures have been developed to adapt the Red and White Plans for use in the event of toxic attack and concern the deployment of emergency responding personnel, the provision of life support and antidotes in the contaminated zone, the prevention of secondary contamination and the transport and reception of victims at the hospital. Based on the established principle of pre-hospital resuscitation and well-tried assistance plans, this doctrine allows a safe and effective response to terrorist attacks as well as to other toxic release incidents.

  9. Let's Write a Script.

    ERIC Educational Resources Information Center

    Harding, T. E.

    Some problems of writing scripts for radio and/or television are discussed, with examples provided to illustrate the rules. Writing both fictional scripts and documentaries are considered. Notes are also included to help the freelance writer who wishes to sell his work. (RH)

  10. Does processing a shallow and a deep orthography produce different brain activity patterns? An ERP study conducted in Hebrew.

    PubMed

    Bar-Kochva, Irit

    2011-01-01

    Orthographies range from shallow orthographies with transparent grapheme-phoneme relations, to deep orthographies, in which these relations are opaque. Two forms of script transcribe the Hebrew language: the shallow pointed script (with diacritics) and the deep unpointed script (without diacritics). This study was set out to examine whether the reading of these scripts evokes distinct brain activity. Preliminary results indicate distinct Event-related-potentials (ERPs). As an equivalent finding was absent when ERPs of non-orthographic stimuli with and without meaningless diacritics were compared, the results imply that print-specific aspects of processing account for the distinct activity elicited by the pointed and unpointed scripts.

  11. Analysis of the staging maneuver and booster glideback guidance for a two-stage, winged, fully reusable launch vehicle. M.S. Thesis - George Washington Univ.

    NASA Technical Reports Server (NTRS)

    Naftel, J. Christopher; Powell, Richard W.

    1993-01-01

    One of the promising launch concepts that could replace the current space shuttle launch system is a two-stage, winged, vertical-takeoff, fully reusable launch vehicle. During the boost phase of ascent, the booster provides propellant for the orbiter engines through a cross-feed system. When the vehicle reaches a Mach number of 3, the booster propellants are depleted and the booster is staged and glides unpowered to a horizontal landing at a launch site runway. Two major design issues for this class of vehicle are the staging maneuver and the booster glideback. For the staging maneuver analysis, a technique was developed that provides for a successful separation of the booster from the orbiter over a wide range of staging angles of attack. A longitudinal flight control system was developed for control of the booster during the staging maneuver. For the booster glide back analysis, a guidance algorithm was developed that successfully guides the booster from the completion of the staging maneuver to a launch site runway while encountering many off-nominal atmospheric, aerodynamic, and staging conditions.

  12. [Ecologic evaluation in the cognitive assessment of brain injury patients: generation and execution of script].

    PubMed

    Baguena, N; Thomas-Antérion, C; Sciessere, K; Truche, A; Extier, C; Guyot, E; Paris, N

    2006-06-01

    Assessment of executive functions in an everyday life activity, evaluating brain injury subjects with script generation and execution tasks. We compared a script generation task to a script execution task, whereby subjects had to make a cooked dish. Two grids were used for the quotation, qualitative and quantitative, as well as the calculation of an anosognosis score. We checked whether the execution task was more sensitive to a dysexecutive disorder than the script generation task and compared the scores obtained in this evaluation with those from classical frontal tests. Twelve subjects with brain injury 6 years+/-4.79 ago and 12 healthy control subjects were tested. The subjects carried out a script generation task whereby they had to explain the necessary stages to make a chocolate cake. They also had to do a script execution task corresponding to the cake making. The 2 quotation grids were operational and complementary. The quantitative grid is more sensitive to a dysexecutive disorder. The brain injury subjects made more errors in the execution task. It is important to evaluate the executive functions of subjects with brain injury in everyday life tasks, not just in psychometric or script-generation tests. Indeed the ecological realization of a very simple task can reveal executive function difficulties such as the planning or the sequencing of actions, which are under-evaluated in laboratory tests.

  13. 76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...

  14. Examining pediatric resuscitation education using simulation and scripted debriefing: a multicenter randomized trial.

    PubMed

    Cheng, Adam; Hunt, Elizabeth A; Donoghue, Aaron; Nelson-McMillan, Kristen; Nishisaki, Akira; Leflore, Judy; Eppich, Walter; Moyer, Mike; Brett-Fleegler, Marisa; Kleinman, Monica; Anderson, Jodee; Adler, Mark; Braga, Matthew; Kost, Susanne; Stryjewski, Glenn; Min, Steve; Podraza, John; Lopreiato, Joseph; Hamilton, Melinda Fiedor; Stone, Kimberly; Reid, Jennifer; Hopkins, Jeffrey; Manos, Jennifer; Duff, Jonathan; Richard, Matthew; Nadkarni, Vinay M

    2013-06-01

    Resuscitation training programs use simulation and debriefing as an educational modality with limited standardization of debriefing format and content. Our study attempted to address this issue by using a debriefing script to standardize debriefings. To determine whether use of a scripted debriefing by novice instructors and/or simulator physical realism affects knowledge and performance in simulated cardiopulmonary arrests. DESIGN Prospective, randomized, factorial study design. The study was conducted from 2008 to 2011 at 14 Examining Pediatric Resuscitation Education Using Simulation and Scripted Debriefing (EXPRESS) network simulation programs. Interprofessional health care teams participated in 2 simulated cardiopulmonary arrests, before and after debriefing. We randomized 97 participants (23 teams) to nonscripted low-realism; 93 participants (22 teams) to scripted low-realism; 103 participants (23 teams) to nonscripted high-realism; and 94 participants (22 teams) to scripted high-realism groups. INTERVENTION Participants were randomized to 1 of 4 arms: permutations of scripted vs nonscripted debriefing and high-realism vs low-realism simulators. Percentage difference (0%-100%) in multiple choice question (MCQ) test (individual scores), Behavioral Assessment Tool (BAT) (team leader performance), and the Clinical Performance Tool (CPT) (team performance) scores postintervention vs preintervention comparison (PPC). There was no significant difference at baseline in nonscripted vs scripted groups for MCQ (P = .87), BAT (P = .99), and CPT (P = .95) scores. Scripted debriefing showed greater improvement in knowledge (mean [95% CI] MCQ-PPC, 5.3% [4.1%-6.5%] vs 3.6% [2.3%-4.7%]; P = .04) and team leader behavioral performance (median [interquartile range (IQR)] BAT-PPC, 16% [7.4%-28.5%] vs 8% [0.2%-31.6%]; P = .03). Their improvement in clinical performance during simulated cardiopulmonary arrests was not significantly different (median [IQR] CPT-PPC, 7.9% [4.8%-15.1%] vs 6.7% [2.8%-12.7%], P = .18). Level of physical realism of the simulator had no independent effect on these outcomes. The use of a standardized script by novice instructors to facilitate team debriefings improves acquisition of knowledge and team leader behavioral performance during subsequent simulated cardiopulmonary arrests. Implementation of debriefing scripts in resuscitation courses may help to improve learning outcomes and standardize delivery of debriefing, particularly for novice instructors.

  15. Pathology and toxicology findings for search-and-rescue dogs deployed to the September 11, 2001, terrorist attack sites: initial five-year surveillance.

    PubMed

    Fitzgerald, Scott D; Rumbeiha, Wilson K; Emmett Braselton, W; Downend, Amanda B; Otto, Cynthia M

    2008-07-01

    A long-term surveillance study was conducted on 95 search-and-rescue (S&R) dogs deployed to the September 11, 2001, terrorist attack sites; an additional 55 nondeployed S&R dogs served as controls. After 5 years of surveillance, 32% of the deployed dogs have died and 24% of the nondeployed dogs. The mean age at the time of death in these 2 groups of dogs is not significantly different. Causes of death in both groups of dogs include inflammatory, degenerative, and proliferative conditions. No primary pulmonary tumors have been identified to date nor has any significant level of toxicant been found in the tissues from these dogs using assays for general organic compounds and metals or, specifically, for polychlorinated biphenyls. However, significant numbers of both deployed and nondeployed dogs have evidence of inhaled matter as demonstrated by the presence of anthracotic pigments or refractile particulate matter in pulmonary tissue. Although S&R activities in response to the 9/11 terrorist attacks exposed dogs to a wide variety of potentially toxic compounds, to date, these dogs do not appear to suffer from higher mortality or increased pulmonary disease compared with nondeployed dogs. To the authors' knowledge, the current survey represents the first long-term and large-scale survey of the pathology and toxicology of S&R dogs deployed to a major disaster site.

  16. 42 CFR 423.160 - Standards for electronic prescribing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide, Version 8, Release 1, (Version 8.1... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide, Version 8, Release 1 (Version 8.1... Programs Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide Version 8, Release 1...

  17. The Potential of CGI: Using Pre-Built CGI Scripts to Make Interactive Web Pages.

    ERIC Educational Resources Information Center

    Nackerud, Shane A.

    1998-01-01

    Describes CGI (Common Gateway Interface) scripts that are available on the Web and explains how librarians can use them to make Web pages more interactive. Topics include CGI security; Perl scripts; UNIX; and HTML. (LRW)

  18. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study.

    PubMed

    Krymchantowski, Abouch Valenty; Carneiro, Henrique; Barbosa, Jackeline; Jevoux, Carla

    2008-06-01

    Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Society (IHS) (2004) were studied. The patients were randomized into 2 groups when presenting to an emergency department with a severe migraine attack. The study was single-blind. Headache intensity, nausea, photophobia and side effects were evaluated at 0, 30, 60 and 90 minutes after the drug administration. Rectal indomethacin as rescue medication (RM) was available after 2 hours and its use compared between groups. All patients completed the study. At 30 minutes, 0% of the dipyrone group 13% of the LC group were pain free (p=0.46). At 60 and 90 minutes, 2 (13%) and 5 (33%) patients from the dipyrone group and 11 (73%) and 13 (86.7%) patients from the LC group were pain free (p<0.001). At 60 minutes, significantly more patients from the LC group were nausea-free (p<0.001). Regarding photophobia, there were no differences between groups at 60 minutes (p=0.11). The use of RM at 2 hours did not differ among groups (p=0.50). Pain in the site of the injection was reported by more patients of the LC group compared to the dipyrone group (p<0.0001). LC is significantly superior to dipyrone in treating severe migraine attacks. LC promotes significantly more burning at the site of the injection.

  19. PSTOOLS - FOUR PROGRAMS THAT INTERPRET/FORMAT POSTSCRIPT FILES

    NASA Technical Reports Server (NTRS)

    Choi, D.

    1994-01-01

    PSTOOLS is a package of four programs that operate on files written in the page description language, PostScript. The programs include a PostScript previewer for the IRIS workstation, a PostScript driver for the Matrix QCRZ film recorder, a PostScript driver for the Tektronix 4693D printer, and a PostScript code beautifier that formats PostScript files to be more legible. The three programs PSIRIS, PSMATRIX, and PSTEK are similar in that they all interpret the PostScript language and output the graphical results to a device, and they support color PostScript images. The common code which is shared by these three programs is included as a library of routines. PSPRETTY formats a PostScript file by appropriately indenting procedures and code delimited by "saves" and "restores." PSTOOLS does not use Adobe fonts. PSTOOLS is written in C-language for implementation on SGI IRIS 4D series workstations running IRIX 3.2 or later. A README file and UNIX man pages provide information regarding the installation and use of the PSTOOLS programs. A six-page manual which provides slightly more detailed information may be purchased separately. The standard distribution medium for this package is one .25 inch streaming magnetic tape cartridge in UNIX tar format. PSIRIS (the largest program) requires 1.2Mb of main memory. PSMATRIX requires the "gpib" board (IEEE 488) available from Silicon Graphics. Inc. The programs with graphical interfaces require that the IRIS have at least 24 bit planes. This package was developed in 1990 and updated in 1991. SGI, IRIS 4D, and IRIX are trademarks of Silicon Graphics, Inc. Matrix QCRZ is a registered trademark of the AGFA Group. Tektronix 4693D is a trademark of Tektronix, Inc. Adobe is a trademark of Adobe Systems Incorporated. PostScript is a registered trademark of Adobe Systems Incorporated. UNIX is a registered trademark of AT&T Bell Laboratories.

  20. Cultural scripts for a good death in Japan and the United States: similarities and differences.

    PubMed

    Long, Susan Orpett

    2004-03-01

    Japan and the United States are both post-industrial societies, characterised by distinct trajectories of dying. Both contain multiple "cultural scripts" of the good death. Seale (Constructing Death: the Sociology of Dying and Bereavement, Cambridge University Press, Cambridge, 1998) has identified at least four "cultural scripts", or ways to die well, that are found in contemporary anglophone countries: modern medicine, revivalism, an anti-revivalist script and a religious script. Although these scripts can also be found in Japan, different historical experiences and religious traditions provide a context in which their content and interpretation sometimes differ from those of the anglophone countries. To understand ordinary people's ideas about dying well and dying poorly, we must recognise not only that post-industrial society offers multiple scripts and varying interpretive frameworks, but also that people actively select from among them in making decisions and explaining their views. Moreover, ideas and metaphors may be based on multiple scripts simultaneously or may offer different interpretations for different social contexts. Based on ethnographic fieldwork in both countries, this paper explores the metaphors that ordinary patients and caregivers draw upon as they use, modify, combine or ignore these cultural scripts of dying. Ideas about choice, time, place and personhood, elements of a good death that were derived inductively from interviews, are described. These Japanese and American data suggest somewhat different concerns and assumptions about human life and the relation of the person to the wider social world, but indicate similar concerns about the process of medicalised dying and the creation of meaning for those involved. While cultural differences do exist, they cannot be explained by reference to 'an American' and 'a Japanese' way to die. Rather, the process of creating and maintaining cultural scripts requires the active participation of ordinary people as they in turn respond to the constraints of post-industrial technology, institutions, demographics and notions of self.

  1. Assessing clinical reasoning in optometry using the script concordance test.

    PubMed

    Faucher, Caroline; Dufour-Guindon, Marie-Pier; Lapointe, Gabrielle; Gagnon, Robert; Charlin, Bernard

    2016-05-01

    Clinical reasoning is central to any health profession but its development among learners is difficult to assess. Over the last few decades, the script concordance test (SCT) has been developed to solve this dilemma and has been used in many health professions; however, no study has been published on the use of the script concordance test in optometry. The purpose of this study was to develop and validate a script concordance test for the field of optometry. A 101-question script concordance test (27 short clinical scenarios) was developed and administered online to a convenience sample of 23 second-year and 19 fourth-year students of optometry. It was also administered to a reference panel of 12 experienced optometrists to develop the scoring key. An item-total correlation was calculated for each question. Cronbach's alpha coefficient was used to evaluate the script concordance test reliability and a t-test compared the two groups. A final 77-question script concordance test was created by eliminating questions with low item-total correlation. Cronbach's alpha for this optimised 77-question script concordance test was 0.80. A group comparison revealed that the second-year students' scores (n = 23; mean score = 66.4 ± 7.87 per cent) were statistically lower (t = -4.141; p < 0.001) than those of the fourth-year students (n = 19; mean score = 75.5 ± 5.97 per cent). The online script concordance test developed for this study was found to be both reliable and capable of discriminating between second- and fourth-year optometric students. These results demonstrate that the script concordance test may be considered as a new tool in the optometric educators' assessment arsenal. Further studies will be needed to cover additional levels of professional development. © 2016 The Authors. Clinical and Experimental Optometry © 2016 Optometry Australia.

  2. Disparities in adult African American women's knowledge of heart attack and stroke symptomatology: an analysis of 2003-2005 Behavioral Risk Factor Surveillance Survey data.

    PubMed

    Lutfiyya, May Nawal; Cumba, Marites T; McCullough, Joel Emery; Barlow, Erika Laverne; Lipsky, Martin S

    2008-06-01

    Heart disease and stroke are the first and third leading causes of death of American women, respectively. African American women experience a disproportionate burden of these diseases compared with Caucasian women and are also more likely to delay seeking treatment for acute symptoms. As knowledge is a first step in seeking care, this study examined the knowledge of heart attack and stroke symptoms among African American women. This was a cross-sectional study analyzing 2003-2005 Behavioral Risk Factor Surveillance Survey (BRFSS) data. A composite heart attack and stroke knowledge score was computed for each respondent from the 13 heart attack and stroke symptom knowledge questions. Multivariate logistic regression was performed using low scores on the heart attack and stroke knowledge questions as the dependent variable. Twenty percent of the respondents were low scorers, and 23.8% were high scorers. Logistic regression analysis showed that adult African American women who earned low scores on the composite heart attack and stroke knowledge questions (range 0-8 points) were more likely to be aged 18-34 (OR = 1.36, CI 1.35, 1.37), be uninsured (OR = 1.32, CI 1.31, 1.33), have an annual household income <$35,000 (OR = 1.46, CI 1.45, 1.47), and have a primary healthcare provider (OR = 1.22, CI 1.20, 1.23). The findings indicated that knowledge of heart attack and stroke symptoms varied significantly among African American women, depending on socioeconomic variables. Targeting interventions to African American women, particularly those in lower socioeconomic groups, may increase knowledge of heart attack and stroke symptoms, subsequently improving preventive action taken in response to these conditions.

  3. Departure scripts and life review of parents living with abusive adult children with mental disorder.

    PubMed

    Avieli, Hila; Smeloy, Yael; Band-Winterstein, Tova

    2015-08-01

    Increasing numbers of aging parents are finding themselves in the role of caregiver for their mentally ill adult child due to global deinstitutionalization policy. The aim of this article is to explore preparations for the end of life in light of the life review process among old parents of abusive children with mental disorder. Data collection was performed through in-depth semi-structured interviews with 20 parents, followed by phenomenological analysis. Five different types of departure scripts emerged: a pragmatic departure script, a burned-out departure script, a dead-end departure script, an optimistic departure script, and a violent departure script. The parents in this study tended to interpret events in their past to fit their perception of the current relationship with their child, thus connecting past, present, and future into one coherent picture. Years of extended care have led to a unique aging process which does not allow separation from the child or the development of a sense of closure that characterizes the aging process. This calls for better insights and deeper understanding in regard to intervention with such families. Copyright © 2015. Published by Elsevier Inc.

  4. Partial N=2 to N=1 supersymmetry breaking and gravity deformed chiral rings.

    NASA Astrophysics Data System (ADS)

    David, Justin R.; Gava, Edi; Narain, K. S.

    2004-06-01

    We present a derivation of the chiral ring relations, arising in Script N = 1 gauge theories in the presence of (anti-)self-dual background gravitational field Galphabetagamma and graviphoton field strength Falphabeta. These were previously considered in the literature in order to prove the relation between gravitational F-terms in the gauge theory and coefficients of the topological expansion of the related matrix integral. We consider the spontaneous breaking of Script N = 2 to Script N = 1 supergravity coupled to vector- and hyper-multiplets, and take a rigid limit which keeps a non-trivial Galphabetagamma and Falphabeta with a finite supersymmetry breaking scale. We derive the resulting effective, global, Script N = 1 theory and show that the chiral ring relations are just a consequence of the standard Script N = 2 supergravity Bianchi identities. We can also obtain models with matter in different representations and in particular quiver theories. We also show that, in the presence of non-trivial Falphabeta, consistency of the Konishi-anomaly loop equations with the chiral ring relations, demands that the gauge kinetic function and the superpotential, a priori unrelated for an Script N = 1 theory, should be derived from a prepotential, indicating an underlying Script N = 2 structure.

  5. Multiple Domains of Parental Secure Base Support During Childhood and Adolescence Contribute to Adolescents’ Representations of Attachment as a Secure Base Script

    PubMed Central

    Vaughn, Brian E.; Waters, Theodore E. A.; Steele, Ryan D.; Roisman, Glenn I.; Bost, Kelly K.; Truitt, Warren; Waters, Harriet S.; Booth-LaForce, Cathryn

    2016-01-01

    Although attachment theory claims that early attachment representations reflecting the quality of the child’s “lived experiences” are maintained across developmental transitions, evidence that has emerged over the last decade suggests that the association between early relationship quality and adolescents’ attachment representations is fairly modest in magnitude. We used aspects of parenting beyond sensitivity over childhood and adolescence and early security to predict adolescents’ scripted attachment representations. At age 18 years, 673 participants from the NICHD Study of Early Child Care and Youth Development (SECCYD) completed the Attachment Script Assessment (ASA) from which we derived an assessment of secure base script knowledge. Measures of secure base support from childhood through age 15 years (e.g., parental monitoring of child activity, father presence in the home) were selected as predictors and accounted for an additional 8% of the variance in secure base script knowledge scores above and beyond direct observations of sensitivity and early attachment status alone, suggesting that adolescents’ scripted attachment representations reflect multiple domains of parenting. Cognitive and demographic variables also significantly increased predicted variance in secure base script knowledge by 2% each. PMID:27032953

  6. Using Physical Models for Anomaly Detection in Control Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  7. Patient confidence regarding secondary lifestyle modification and knowledge of ‘heart attack’ symptoms following percutaneous revascularisation in Japan: a cross-sectional study

    PubMed Central

    Kitakata, Hiroki; Kohno, Takashi; Kohsaka, Shun; Fujino, Junko; Nakano, Naomi; Fukuoka, Ryoma; Yuasa, Shinsuke; Maekawa, Yuichiro; Fukuda, Keiichi

    2018-01-01

    Objective To assess patient perspectives on secondary lifestyle modification and knowledge of ‘heart attack’ after percutaneous coronary intervention (PCI) for coronary artery disease (CAD). Design Observational cross-sectional study. Setting A single university-based hospital centre in Japan. Participants In total, 236 consecutive patients with CAD who underwent PCI completed a questionnaire (age, 67.4±10.1 years; women, 14.8%; elective PCI, 75.4%). The survey questionnaire included questions related to confidence levels about (1) lifestyle modification at the time of discharge and (2) appropriate recognition of heart attack symptoms and reactions to these symptoms on a four-point Likert scale (1=not confident to 4=completely confident). Primary outcome measure The primary outcome assessed was the patients’ confidence level regarding lifestyle modification and the recognition of heart attack symptoms. Results Overall, patients had a high level of confidence (confident or completely confident,>75%) about smoking cessation, alcohol restriction and medication adherence. However, they had a relatively low level of confidence (<50%) about the maintenance of blood pressure control, healthy diet, body weight and routine exercise (≥3 times/week). After adjustment, male sex (OR 3.61, 95% CI 1.11 to 11.8) and lower educational level (OR 3.25; 95% CI 1.70 to 6.23) were identified as factors associated with lower confidence levels. In terms of confidence in the recognition of heart attack, almost all respondents answered ‘yes’ to the item ‘I should go to the hospital as soon as possible when I have a heart attack’; however, only 28% of the responders were confident in their ability to distinguish between heart attack symptoms and other conditions. Conclusions There were substantial disparities in the confidence levels associated with lifestyle modification and recognition/response to heart attack. These gaps need to be studied further and disseminated to improve cardiovascular care. PMID:29549203

  8. Development of a Finite State Machine for a Small Unmanned Aircraft System Using Experimental Design

    DTIC Science & Technology

    2015-03-26

    54  Appendix B: Storyboard ....................................................................................................56  Bibliography...Script.ChangeParam(’WP_RADIUS’,90) Script.ChangeParam(’WP_LOITER_RAD’,90) print ’End Script’ 56 Appendix B: Storyboard 57

  9. Design and Implementation of an Operations Module for the ARGOS paperless Ship System

    DTIC Science & Technology

    1989-06-01

    A. OPERATIONS STACK SCRIPTS SCRIPTS FOR STACK: operations * BACKGROUND #1: Operations * on openStack hide message box show menuBar pass openStack end... openStack ** CARD #1, BUTTON #1: Up ***** on mouseUp visual effect zoom out go to card id 10931 of stack argos end mouseUp ** CARD #1, BUTTON #2...STACK SCRIPTS SCRIPTS FOR STACK: Reports ** BACKGROUND #1: Operations * on openStack hie message box show menuBar pass openStack end openStack ** CARD #1

  10. Batch Proving and Proof Scripting in PVS

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.

    2007-01-01

    The batch execution modes of PVS are powerful, but highly technical, features of the system that are mostly accessible to expert users. This paper presents a PVS tool, called ProofLite, that extends the theorem prover interface with a batch proving utility and a proof scripting notation. ProofLite enables a semi-literate proving style where specification and proof scripts reside in the same file. The goal of ProofLite is to provide batch proving and proof scripting capabilities to regular, non-expert, users of PVS.

  11. ACME Priority Metrics (A-PRIME)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Katherine J; Zender, Charlie; Van Roekel, Luke

    A-PRIME, is a collection of scripts designed to provide Accelerated Climate Model for Energy (ACME) model developers and analysts with a variety of analysis of the model needed to determine if the model is producing the desired results, depending on the goals of the simulation. The software is csh scripts based at the top level to enable scientist to provide the input parameters. Within the scripts, the csh scripts calls code to perform the postprocessing of the raw data analysis and create plots for visual assessment.

  12. Genre scripts and appreciation of negative emotion in the reception of film.

    PubMed

    Tan, Ed S; Visch, Valentijn T

    2017-01-01

    The Distancing-Embracing model reserves a role for genre scripts in the hedonic valuation of negative emotion in art. Genre scripts, as defined in the target article, leave higher-level recipient intuitions out of scope. We argue that, in film genre scripts, lower-level stylistic features lend access to more complex conceptual knowledge, including pragmatic principles. The argument implies a consideration of the communicative dimension of aesthetic works, which could strengthen both factors of the Distancing-Embracing model.

  13. Effectiveness of the Smoking Cessation and Reduction in Pregnancy Treatment (SCRIPT) dissemination project: a science to prenatal care practice partnership.

    PubMed

    Windsor, Richard; Clark, Jeannie; Cleary, Sean; Davis, Amanda; Thorn, Stephanie; Abroms, Lorien; Wedeles, John

    2014-01-01

    This study evaluated the effectiveness of the Smoking Cessation and Reduction in Pregnancy Treatment (SCRIPT) Program selected by the West Virginia-Right From The Start Project for state-wide dissemination. A process evaluation documented the fidelity of SCRIPT delivery by Designated Care Coordinators (DCC), licensed nurses and social workers who provide home-based case management to Medicaid-eligible clients in all 55 counties. We implemented a quasi-experimental, non-randomized, matched Comparison (C) Group design. The SCRIPT Experimental E Group (N = 259) were all clients in 2009-2010 that wanted to quit, provided a screening carbon monoxide (CO), and received a SCRIPT home visit. The (C) Group was derived from all clients in 2006-2007 who had the same CO assessments as E Group clients and reported receiving cessation counseling. We stratified the baseline CO of E Group clients into 10 strata, and randomly selected the same number of (C) Group clients (N = 259) from each matched strata to evaluate the effectiveness of the SCRIPT Program. There were no significant baseline differences in the E and (C) Group. A Process Evaluation documented a significant increase in the fidelity of DCC delivery of SCRIPT Program procedures: from 63 % in 2006 to 74 % in 2010. Significant increases were documented in the E Group cessation rate (+9.3 %) and significant reduction rate (+4.5 %), a ≥50 % reduction from a baseline CO. Perinatal health case management staff can deliver the SCRIPT Program, and Medicaid-supported clients can change smoking behavior, even very late in pregnancy. When multiple biases were analyzed, we concluded the SCRIPT Dissemination Project was the most plausible reason for the significant changes in behavior.

  14. Automation of radiation treatment planning : Evaluation of head and neck cancer patient plans created by the Pinnacle3 scripting and Auto-Planning functions.

    PubMed

    Speer, Stefan; Klein, Andreas; Kober, Lukas; Weiss, Alexander; Yohannes, Indra; Bert, Christoph

    2017-08-01

    Intensity-modulated radiotherapy (IMRT) techniques are now standard practice. IMRT or volumetric-modulated arc therapy (VMAT) allow treatment of the tumor while simultaneously sparing organs at risk. Nevertheless, treatment plan quality still depends on the physicist's individual skills, experiences, and personal preferences. It would therefore be advantageous to automate the planning process. This possibility is offered by the Pinnacle 3 treatment planning system (Philips Healthcare, Hamburg, Germany) via its scripting language or Auto-Planning (AP) module. AP module results were compared to in-house scripts and manually optimized treatment plans for standard head and neck cancer plans. Multiple treatment parameters were scored to judge plan quality (100 points = optimum plan). Patients were initially planned manually by different physicists and re-planned using scripts or AP. Script-based head and neck plans achieved a mean of 67.0 points and were, on average, superior to manually created (59.1 points) and AP plans (62.3 points). Moreover, they are characterized by reproducibility and lower standard deviation of treatment parameters. Even less experienced staff are able to create at least a good starting point for further optimization in a short time. However, for particular plans, experienced planners perform even better than scripts or AP. Experienced-user input is needed when setting up scripts or AP templates for the first time. Moreover, some minor drawbacks exist, such as the increase of monitor units (+35.5% for scripted plans). On average, automatically created plans are superior to manually created treatment plans. For particular plans, experienced physicists were able to perform better than scripts or AP; thus, the benefit is greatest when time is short or staff inexperienced.

  15. Origins of Secure Base Script Knowledge and the Developmental Construction of Attachment Representations

    PubMed Central

    Waters, Theodore E. A.; Ruiz, Sarah K.; Roisman, Glenn I.

    2016-01-01

    Increasing evidence suggests that attachment representations take at least two forms—a secure base script and an autobiographical narrative of childhood caregiving experiences. This study presents data from the first 26 years of the Minnesota Longitudinal Study of Risk and Adaptation (N = 169), examining the developmental origins of secure base script knowledge in a high-risk sample, and testing alternative models of the developmental sequencing of the construction of attachment representations. Results demonstrated that secure base script knowledge was predicted by observations of maternal sensitivity across childhood and adolescence. Further, findings suggest that the construction of a secure base script supports the development of a coherent autobiographical representation of childhood attachment experiences with primary caregivers by early adulthood. PMID:27302650

  16. Rare male aggression directed toward females in a female-dominated society: Baiting behavior in the spotted hyena

    USGS Publications Warehouse

    Szykman, Micaela; Engh, Anne L.; Van Horn, Russell C.; Boydston, Erin E.; Scribner, Kim T.; Holekamp, Kay E.

    2003-01-01

    Spotted hyenas (Crocuta crocuta) are gregarious carnivores. The females are socially dominant to males, and adult males rarely direct aggression toward adult females. This study analyzed all cases in which adult immigrant males behaved aggressively toward adult females in a large population of free-living hyenas in Kenya, observed for 11 years. Our goals were to describe the conditions under which male attacks on females occur, and address possible adaptive functions. Most aggression directed by adult immigrant males against females occurred when coalitions of two or more males attacked a single adult female, who typically responded by defending herself and fighting back. Male aggression against females frequently occurred at sites of ungulate kills, but males never behaved aggressively toward females over food, and all male attacks on females were unprovoked. Although no mounting or other copulatory behaviors ever occurred during or immediately after an attack, the number of male attacks on females peaked around the time of conception. Daily rates at which males attacked females did not vary with female social rank. However, daily attack rates did vary significantly with female reproductive state, and the highest rates of male attack on females were observed during the two stages of the reproductive cycle during which females were most likely to conceive litters. The adaptive significance of male aggression against females in this species remains unknown, but a tight association between male attacks on females and a female's time of conception provides strong evidence of some role for male aggression in hyena sexual behavior. In particular, our data are consistent with hypotheses suggesting that male aggression toward females in this species either serves to inform females about male fitness or represents sexual harassment.

  17. REDItools: high-throughput RNA editing detection made easy.

    PubMed

    Picardi, Ernesto; Pesole, Graziano

    2013-07-15

    The reliable detection of RNA editing sites from massive sequencing data remains challenging and, although several methodologies have been proposed, no computational tools have been released to date. Here, we introduce REDItools a suite of python scripts to perform high-throughput investigation of RNA editing using next-generation sequencing data. REDItools are in python programming language and freely available at http://code.google.com/p/reditools/. ernesto.picardi@uniba.it or graziano.pesole@uniba.it Supplementary data are available at Bioinformatics online.

  18. An Expert System For Tuning Particle-Beam Accelerators

    NASA Astrophysics Data System (ADS)

    Lager, Darrel L.; Brand, Hal R.; Maurer, William J.; Searfus, Robert M.; Hernandez, Jose E.

    1989-03-01

    We have developed a proof-of-concept prototype of an expert system for tuning particle beam accelerators. It is designed to function as an intelligent assistant for an operator. In its present form it implements the strategies and reasoning followed by the operator for steering through the beam transport section of the Advanced Test Accelerator at Lawrence Livermore Laboratory's Site 300. The system is implemented in the language LISP using the Artificial Intelligence concepts of frames, daemons, and a representation we developed called a Monitored Decision Script.

  19. Initiated Protocol Telephony Feasibility for the US Navy, Embedded Proof-of-Concept

    DTIC Science & Technology

    2011-03-01

    2.1 Generating Certificates Using Open SSL 1. OpenSSL can be used to generate certificates. There are a number of helper scripts written in Perl that...help with the creation and maintenance of the certificate and keys. OpenSSL is available from a number of sites, i.e., slproweb.com. The default...installation is adequate although it may be useful to add the OpenSSL \\bin directory to the system environment variable PATH. Perl is also available

  20. Actual versus desired initiation patterns among a sample of college men: tapping disjunctures within traditional male sexual scripts.

    PubMed

    Dworkin, Shari L; O'Sullivan, Lucia

    2005-05-01

    Research on men's sexual scripts has tended to overlook that some men do not endorse traditional scripts or that one or both members of a couple might desire a departure from culturally dominant sexual scripts. This study used in-depth interviews with 32 college-aged men from a community college in New York City to examine disjunctures between current and desired sexual initiation patterns. Results show that although men currently practice male-dominated patterns of sexual initiation, many men desire egalitarian patterns of initiation. Men offered clear preference to be an object of desire to their female partners, deployed narratives of wanting to share the "labor" of sexual initiation, and expressed ideologies of sexual egalitarianism. We consider how shifting terrains of gender relations in contemporary U.S. culture may shape masculinities and sexual scripts. We also consider how an examination of disjunctures between current and desired practices might be useful to HIV researchers interested in interviewing across multiple levels of the sexual script.

Top