Sample records for cyber-shot dsc-t9 nikon

  1. Single-shot spiral imaging at 7 T.

    PubMed

    Engel, Maria; Kasper, Lars; Barmet, Christoph; Schmid, Thomas; Vionnet, Laetitia; Wilm, Bertram; Pruessmann, Klaas P

    2018-03-25

    The purpose of this work is to explore the feasibility and performance of single-shot spiral MRI at 7 T, using an expanded signal model for reconstruction. Gradient-echo brain imaging is performed on a 7 T system using high-resolution single-shot spiral readouts and half-shot spirals that perform dual-image acquisition after a single excitation. Image reconstruction is based on an expanded signal model including the encoding effects of coil sensitivity, static off-resonance, and magnetic field dynamics. The latter are recorded concurrently with image acquisition, using NMR field probes. The resulting image resolution is assessed by point spread function analysis. Single-shot spiral imaging is achieved at a nominal resolution of 0.8 mm, using spiral-out readouts of 53-ms duration. High depiction fidelity is achieved without conspicuous blurring or distortion. Effective resolutions are assessed as 0.8, 0.94, and 0.98 mm in CSF, gray matter and white matter, respectively. High image quality is also achieved with half-shot acquisition yielding image pairs at 1.5-mm resolution. Use of an expanded signal model enables single-shot spiral imaging at 7 T with unprecedented image quality. Single-shot and half-shot spiral readouts deploy the sensitivity benefit of high field for rapid high-resolution imaging, particularly for functional MRI and arterial spin labeling. © 2018 International Society for Magnetic Resonance in Medicine.

  2. Cyber-T web server: differential analysis of high-throughput data.

    PubMed

    Kayala, Matthew A; Baldi, Pierre

    2012-07-01

    The Bayesian regularization method for high-throughput differential analysis, described in Baldi and Long (A Bayesian framework for the analysis of microarray expression data: regularized t-test and statistical inferences of gene changes. Bioinformatics 2001: 17: 509-519) and implemented in the Cyber-T web server, is one of the most widely validated. Cyber-T implements a t-test using a Bayesian framework to compute a regularized variance of the measurements associated with each probe under each condition. This regularized estimate is derived by flexibly combining the empirical measurements with a prior, or background, derived from pooling measurements associated with probes in the same neighborhood. This approach flexibly addresses problems associated with low replication levels and technology biases, not only for DNA microarrays, but also for other technologies, such as protein arrays, quantitative mass spectrometry and next-generation sequencing (RNA-seq). Here we present an update to the Cyber-T web server, incorporating several useful new additions and improvements. Several preprocessing data normalization options including logarithmic and (Variance Stabilizing Normalization) VSN transforms are included. To augment two-sample t-tests, a one-way analysis of variance is implemented. Several methods for multiple tests correction, including standard frequentist methods and a probabilistic mixture model treatment, are available. Diagnostic plots allow visual assessment of the results. The web server provides comprehensive documentation and example data sets. The Cyber-T web server, with R source code and data sets, is publicly available at http://cybert.ics.uci.edu/.

  3. The association between cyber victimization and subsequent cyber aggression: the moderating effect of peer rejection.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-05-01

    Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber victimization at Time 1 (T1) and subsequent cyber aggression at Time 2 (T2; 6 months later) among 261 (150 girls) 6th, 7th, and 8th graders. Our findings indicated that both peer rejection and cyber victimization were related to T2 peer-nominated and self-reported cyber aggression, both relational and verbal, after controlling for gender and T1 cyber aggression. Furthermore, T1 cyber victimization was related more strongly to T2 peer-nominated and self-reported cyber aggression at higher levels of T1 peer rejection. These results extend previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context. In addition, our findings underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.

  4. Effect of milling on DSC thermogram of excipient adipic acid.

    PubMed

    Ng, Wai Kiong; Kwek, Jin Wang; Yuen, Aaron; Tan, Chin Lee; Tan, Reginald

    2010-03-01

    The purpose of this research was to investigate why and how mechanical milling results in an unexpected shift in differential scanning calorimetry (DSC) measured fusion enthalpy (Delta(fus)H) and melting point (T(m)) of adipic acid, a pharmaceutical excipient. Hyper differential scanning calorimetry (hyper-DSC) was used to characterize adipic acid before and after ball-milling. An experimental study was conducted to evaluate previous postulations such as electrostatic charging using the Faraday cage method, crystallinity loss using powder X-ray diffraction (PXRD), thermal annealing using DSC, impurities removal using thermal gravimetric analysis (TGA) and Karl Fischer titration. DSC thermograms showed that after milling, the values of Delta(fus)H and T(m) were increased by approximately 9% and 5 K, respectively. Previous suggestions of increased electrostatic attraction, change in particle size distribution, and thermal annealing during measurements did not explain the differences. Instead, theoretical analysis and experimental findings suggested that the residual solvent (water) plays a key role. Water entrapped as inclusions inside adipic acid during solution crystallization was partially evaporated by localized heating at the cleaved surfaces during milling. The correlation between the removal of water and melting properties measured was shown via drying and crystallization experiments. These findings show that milling can reduce residual solvent content and causes a shift in DSC results.

  5. Biodiesel: Characterization by DSC and P-DSC

    NASA Astrophysics Data System (ADS)

    Chiriac, Rodica; Toche, François; Brylinski, Christian

    Thermal analytical methods such as differential scanning calorimetry (DSC) have been successfully applied to neat petrodiesel and engine oils in the last 25 years. This chapter shows how DSC and P-DSC (pressurized DSC) techniques can be used to compare, characterize, and predict some properties of alternative non-petroleum fuels, such as cold flow behavior and oxidative stability. These two properties are extremely important with respect to the operability, transport, and long-term storage of biodiesel fuel. It is shown that the quantity of unsaturated fatty acids in the fuel composition has an important impact on both properties. In addition, it is shown that the impact of fuel additives on the oxidative stability or the cold flow behavior of biodiesel can be studied by means of DSC and P-DSC techniques. Thermomicroscopy can also be used to study the cold flow behavior of biodiesel, giving information on the size and the morphology of crystals formed at low temperature.

  6. Validation of a T1 and T2* leakage correction method based on multi-echo DSC-MRI using MION as a reference standard

    PubMed Central

    Stokes, Ashley M.; Semmineh, Natenael; Quarles, C. Chad

    2015-01-01

    Purpose A combined biophysical- and pharmacokinetic-based method is proposed to separate, quantify, and correct for both T1 and T2* leakage effects using dual-echo DSC acquisitions to provide more accurate hemodynamic measures, as validated by a reference intravascular contrast agent (CA). Methods Dual-echo DSC-MRI data were acquired in two rodent glioma models. The T1 leakage effects were removed and also quantified in order to subsequently correct for the remaining T2* leakage effects. Pharmacokinetic, biophysical, and combined biophysical and pharmacokinetic models were used to obtain corrected cerebral blood volume (CBV) and cerebral blood flow (CBF), and these were compared with CBV and CBF from an intravascular CA. Results T1-corrected CBV was significantly overestimated compared to MION CBV, while T1+T2*-correction yielded CBV values closer to the reference values. The pharmacokinetic and simplified biophysical methods showed similar results and underestimated CBV in tumors exhibiting strong T2* leakage effects. The combined method was effective for correcting T1 and T2* leakage effects across tumor types. Conclusions Correcting for both T1 and T2* leakage effects yielded more accurate measures of CBV. The combined correction method yields more reliable CBV measures than either correction method alone, but for certain brain tumor types (e.g., gliomas) the simplified biophysical method may provide a robust and computationally efficient alternative. PMID:26362714

  7. Awaiting Cyber 9/11

    DTIC Science & Technology

    2013-01-01

    tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the

  8. Shot-by-shot Spectrum Model for Rod-pinch, Pulsed Radiography Machines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, William Monford

    A simplified model of bremsstrahlung production is developed for determining the x-ray spectrum output of a rod-pinch radiography machine, on a shot-by-shot basis, using the measured voltage, V(t), and current, I(t). The motivation for this model is the need for an agile means of providing shot-by-shot spectrum prediction, from a laptop or desktop computer, for quantitative radiographic analysis. Simplifying assumptions are discussed, and the model is applied to the Cygnus rod-pinch machine. Output is compared to wedge transmission data for a series of radiographs from shots with identical target objects. Resulting model enables variation of parameters in real time, thusmore » allowing for rapid optimization of the model across many shots. “Goodness of fit” is compared with output from LSP Particle-In-Cell code, as well as the Monte Carlo Neutron Propagation with Xrays (“MCNPX”) model codes, and is shown to provide an excellent predictive representation of the spectral output of the Cygnus machine. In conclusion, improvements to the model, specifically for application to other geometries, are discussed.« less

  9. Shot-by-shot Spectrum Model for Rod-pinch, Pulsed Radiography Machines

    DOE PAGES

    Wood, William Monford

    2018-02-07

    A simplified model of bremsstrahlung production is developed for determining the x-ray spectrum output of a rod-pinch radiography machine, on a shot-by-shot basis, using the measured voltage, V(t), and current, I(t). The motivation for this model is the need for an agile means of providing shot-by-shot spectrum prediction, from a laptop or desktop computer, for quantitative radiographic analysis. Simplifying assumptions are discussed, and the model is applied to the Cygnus rod-pinch machine. Output is compared to wedge transmission data for a series of radiographs from shots with identical target objects. Resulting model enables variation of parameters in real time, thusmore » allowing for rapid optimization of the model across many shots. “Goodness of fit” is compared with output from LSP Particle-In-Cell code, as well as the Monte Carlo Neutron Propagation with Xrays (“MCNPX”) model codes, and is shown to provide an excellent predictive representation of the spectral output of the Cygnus machine. In conclusion, improvements to the model, specifically for application to other geometries, are discussed.« less

  10. Shot-by-shot spectrum model for rod-pinch, pulsed radiography machines

    NASA Astrophysics Data System (ADS)

    Wood, Wm M.

    2018-02-01

    A simplified model of bremsstrahlung production is developed for determining the x-ray spectrum output of a rod-pinch radiography machine, on a shot-by-shot basis, using the measured voltage, V(t), and current, I(t). The motivation for this model is the need for an agile means of providing shot-by-shot spectrum prediction, from a laptop or desktop computer, for quantitative radiographic analysis. Simplifying assumptions are discussed, and the model is applied to the Cygnus rod-pinch machine. Output is compared to wedge transmission data for a series of radiographs from shots with identical target objects. Resulting model enables variation of parameters in real time, thus allowing for rapid optimization of the model across many shots. "Goodness of fit" is compared with output from LSP Particle-In-Cell code, as well as the Monte Carlo Neutron Propagation with Xrays ("MCNPX") model codes, and is shown to provide an excellent predictive representation of the spectral output of the Cygnus machine. Improvements to the model, specifically for application to other geometries, are discussed.

  11. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  12. Clinical evaluation of single-shot and readout-segmented diffusion-weighted imaging in stroke patients at 3 T.

    PubMed

    Morelli, John; Porter, David; Ai, Fei; Gerdes, Clint; Saettele, Megan; Feiweier, Thorsten; Padua, Abraham; Dix, James; Marra, Michael; Rangaswamy, Rajesh; Runge, Val

    2013-04-01

    Diffusion-weighted imaging (DWI) magnetic resonance imaging (MRI) is most commonly performed utilizing a single-shot echo-planar imaging technique (ss-EPI). Susceptibility artifact and image blur are severe when this sequence is utilized at 3 T. To evaluate a readout-segmented approach to DWI MR in comparison with single-shot echo planar imaging for brain MRI. Eleven healthy volunteers and 14 patients with acute and early subacute infarctions underwent DWI MR examinations at 1.5 and 3T with ss-EPI and readout-segmented echo-planar (rs-EPI) DWI at equal nominal spatial resolutions. Signal-to-noise ratio (SNR) and contrast-to-noise ratio (CNR) calculations were made, and two blinded readers ranked the scans in terms of high signal intensity bulk susceptibility artifact, spatial distortions, image blur, overall preference, and motion artifact. SNR and CNR were greatest with rs-EPI (8.1 ± 0.2 SNR vs. 6.0 ± 0.2; P <10(-4) at 3T). Spatial distortions were greater with single-shot (0.23 ± 0.03 at 3T; P <0.001) than with rs-EPI (0.12 ± 0.02 at 3T). Combined with blur and artifact reduction, this resulted in a qualitative preference for the readout-segmented scans overall. Substantial image quality improvements are possible with readout-segmented vs. single-shot EPI - the current clinical standard for DWI - regardless of field strength (1.5 or 3 T). This results in improved image quality secondary to greater real spatial resolution and reduced artifacts from susceptibility in MR imaging of the brain.

  13. PROPELLER for motion-robust imaging of in vivo mouse abdomen at 9.4 T.

    PubMed

    Teh, Irvin; Golay, Xavier; Larkman, David J

    2010-11-01

    In vivo high-field MRI in the abdomen of small animals is technically challenging because of the small voxel sizes, short T(2) and physiological motion. In standard Cartesian sampling, respiratory and gastrointestinal motion can lead to ghosting artefacts. Although respiratory triggering and navigator echoes can either avoid or compensate for motion, they can lead to variable TRs, require invasive intubation and ventilation, or extend TEs. A self-navigated fast spin echo (FSE)-based periodically rotated overlapping parallel lines with enhanced reconstruction (PROPELLER) acquisition was implemented at 9.4 T to enable high-resolution in vivo MRI of mouse abdomen without the use of additional navigators or triggering. T(2)-weighted FSE-PROPELLER data were compared with single-shot FSE and multi-shot FSE data with and without triggering. Single-shot methods, although rapid and robust to motion, demonstrated strong blurring. Multi-shot FSE data showed better resolution, but suffered from marked blurring in the phase-encoding direction and motion in between shots, leading to ghosting artefacts. When respiratory triggering was used, motion artefacts were largely avoided. However, TRs and acquisition times were lengthened by up to approximately 20%. The PROPELLER data showed a 25% and 61% improvement in signal-to-noise ratio and contrast-to-noise ratio, respectively, compared with multi-shot FSE data, together with a 35% reduction in artefact power. A qualitative comparison between acquisition methods using diffusion-weighted imaging was performed. The results were similar, with the exception that respiratory triggering was unable to exclude major motion artefacts as a result of the sensitisation to motion by the diffusion gradients. The PROPELLER data were of consistently higher quality. Considerations specific to the use of PROPELLER at high field are discussed, including the selection of practical blade widths and the effects on contrast, resolution and artefacts.

  14. Radiation damage to amorphous carbon thin films irradiated by multiple 46.9 nm laser shots below the single-shot damage threshold

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Juha, L.; Hajkova, V.; Vorlicek, V.

    2009-05-01

    High-surface-quality amorphous carbon (a-C) optical coatings with a thickness of 45 nm, deposited by magnetron sputtering on a silicon substrate, were irradiated by the focused beam of capillary-discharge Ne-like Ar extreme ultraviolet laser (CDL=capillary-discharge laser; XUV=extreme ultraviolet, i.e., wavelengths below 100 nm). The laser wavelength and pulse duration were 46.9 nm and 1.7 ns, respectively. The laser beam was focused onto the sample surface by a spherical Sc/Si multilayer mirror with a total reflectivity of about 30%. The laser pulse energy was varied from 0.4 to 40 muJ on the sample surface. The irradiation was carried out at five fluencemore » levels between 0.1 and 10 J/cm{sup 2}, accumulating five different series of shots, i.e., 1, 5, 10, 20, and 40. The damage to the a-C thin layer was investigated by atomic force microscopy (AFM) and Nomarski differential interference contrast (DIC) optical microscopy. The dependence of the single-shot-damaged area on pulse energy makes it possible to determine a beam spot diameter in the focus. Its value was found to be equal to 23.3+-3.0 mum using AFM data, assuming the beam to have a Gaussian profile. Such a plot can also be used for a determination of single-shot damage threshold in a-C. A single-shot threshold value of 1.1 J/cm{sup 2} was found. Investigating the consequences of the multiple-shot exposure, it has been found that an accumulation of 10, 20, and 40 shots at a fluence of 0.5 J/cm{sup 2}, i.e., below the single-shot damage threshold, causes irreversible changes of thin a-C layers, which can be registered by both the AFM and the DIC microscopy. In the center of the damaged area, AFM shows a-C removal to a maximum depth of 0.3, 1.2, and 1.5 nm for 10-, 20- and 40-shot exposure, respectively. Raman microprobe analysis does not indicate any change in the structure of the remaining a-C material. The erosive behavior reported here contrasts with the material expansion observed earlier [L. Juha

  15. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  16. New Tools for Cyber Terrorism

    DTIC Science & Technology

    2010-12-01

    pharmaceutical formulas, and like data can reap huge profits for criminals” 8 . If cyber criminals are capable of these crimes imagine if Bin Laden could hire...and develops a framework to work with civilian agencies to combat cyber criminals and terrorists. The CNCI comprises of education, defensive...trillion dollars worth of intellectual property to data theft. It is quite obvious that if we don’t get a handle on cyber criminals it’s only a

  17. Cyber Intelligence: Challenges and Best Practices

    DTIC Science & Technology

    2015-01-15

    2015 2 . REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE Cyber Intelligence Challenges and Best Practices 5a. CONTRACT NUMBER 5b...ANSI Std Z39-18 2 Cyber Intel – Challenges and Best Practices January 2015 © 2015 Carnegie Mellon University Copyright 2015 Carnegie Mellon University...University Reporting timelines Gov’t Agency 1 Gov’t Agency 2 Gov’t Agency 3 Gov’t Agency 4 Urgent Normal Strategic 2 -4 Hours 1 Day 1 Month 1 Day 2

  18. Cyber Forensics Ontology for Cyber Criminal Investigation

    NASA Astrophysics Data System (ADS)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  19. High-resolution myocardial T1 mapping using single-shot inversion recovery fast low-angle shot MRI with radial undersampling and iterative reconstruction

    PubMed Central

    Joseph, Arun A; Kalentev, Oleksandr; Merboldt, Klaus-Dietmar; Voit, Dirk; Roeloffs, Volkert B; van Zalk, Maaike; Frahm, Jens

    2016-01-01

    Objective: To develop a novel method for rapid myocardial T1 mapping at high spatial resolution. Methods: The proposed strategy represents a single-shot inversion recovery experiment triggered to early diastole during a brief breath-hold. The measurement combines an adiabatic inversion pulse with a real-time readout by highly undersampled radial FLASH, iterative image reconstruction and T1 fitting with automatic deletion of systolic frames. The method was implemented on a 3-T MRI system using a graphics processing unit-equipped bypass computer for online application. Validations employed a T1 reference phantom including analyses at simulated heart rates from 40 to 100 beats per minute. In vivo applications involved myocardial T1 mapping in short-axis views of healthy young volunteers. Results: At 1-mm in-plane resolution and 6-mm section thickness, the inversion recovery measurement could be shortened to 3 s without compromising T1 quantitation. Phantom studies demonstrated T1 accuracy and high precision for values ranging from 300 to 1500 ms and up to a heart rate of 100 beats per minute. Similar results were obtained in vivo yielding septal T1 values of 1246 ± 24 ms (base), 1256 ± 33 ms (mid-ventricular) and 1288 ± 30 ms (apex), respectively (mean ± standard deviation, n = 6). Conclusion: Diastolic myocardial T1 mapping with use of single-shot inversion recovery FLASH offers high spatial resolution, T1 accuracy and precision, and practical robustness and speed. Advances in knowledge: The proposed method will be beneficial for clinical applications relying on native and post-contrast T1 quantitation. PMID:27759423

  20. Multiple echo multi-shot diffusion sequence.

    PubMed

    Chabert, Steren; Galindo, César; Tejos, Cristian; Uribe, Sergio A

    2014-04-01

    To measure both transversal relaxation time (T2 ) and diffusion coefficients within a single scan using a multi-shot approach. Both measurements have drawn interest in many applications, especially in skeletal muscle studies, which have short T2 values. Multiple echo single-shot schemes have been proposed to obtain those variables simultaneously within a single scan, resulting in a reduction of the scanning time. However, one problem with those approaches is the associated long echo read-out. Consequently, the minimum achievable echo time tends to be long, limiting the application of these sequences to tissues with relatively long T2 . To address this problem, we propose to extend the multi-echo sequences using a multi-shot approach, so that to allow shorter echo times. A multi-shot dual-echo EPI sequence with diffusion gradients and echo navigators was modified to include independent diffusion gradients in any of the two echoes. The multi-shot approach allows us to drastically reduce echo times. Results showed a good agreement for the T2 and mean diffusivity measurements with gold standard sequences in phantoms and in vivo data of calf muscles from healthy volunteers. A fast and accurate method is proposed to measure T2 and diffusion coefficients simultaneously, tested in vitro and in healthy volunteers. Copyright © 2013 Wiley Periodicals, Inc.

  1. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  2. Lead shot toxicity to passerines

    USGS Publications Warehouse

    Vyas, N.B.; Spann, J.W.; Heinz, G.H.

    2001-01-01

    This study evaluated the toxicity of a single size 7.5 lead shot to passerines. No mortalities or signs of plumbism were observed in dosed cowbirds (Molothrus ater) fed a commercial diet, but when given a more natural diet, three of 10 dosed birds died within 1 day. For all survivors from which shot were recovered, all but one excreted the shot within 24 h of dosing, whereas, the dead birds retained their shot. Shot erosion was significantly greater (P < 0.05) when weathered shot were ingested compared to new shot, and the greatest erosion was observed in those birds that died (2.2-9.7%). Blood lead concentrations of birds dosed with new shot were not significantly different (P=0.14) from those of birds exposed to weathered shot. Liver lead concentrations of birds that died ranged from 71 to 137 ppm, dry weight. Despite the short amount of time the shot was retained, songbirds may absorb sufficient lead to compromise their survival.

  3. [The forensic medical characteristic of the factors associated with a shot from the 9.0 mm pneumatic rifle and the inflicted injuries].

    PubMed

    Raĭzberg, S A; Makarov, I Iu; Lorents, A S

    2014-01-01

    The objective of the present work was to elucidate the structural characteristics of the 9.0 mm pneumatic rifle and three regular types of the bullets differing in the head shape fired from it. Morphological features of the injuries inflicted by such bullets are described in conjunction with the peculiarities of precipitation of the shot products in their projection as the prerequisites for their objective differentiation. Results: The study allowed to reveal the composition of the gunshot residues and to determine the maximum distance of their distribution. The specific features of experimental damage inflicted by the shots from the 9.0 mm pneumatic rifle to the coarse white calico fabric targets were shown to depend on the shot range. The objective signs of the so-called "short-range" shot from the 9.0 mm pneumatic rifle were described for the first time.

  4. D 2 and D-T Liquid-Layer Target Shots at the National Ignition Facility

    DOE PAGES

    Walters, Curtis; Alger, Ethan; Bhandarkar, Suhas; ...

    2018-01-19

    Experiments at the National Ignition Facility (NIF) using targets containing a deuterium-tritium (D-T) fuel layer have, until recently, required that a high-quality layer of solid D-T (herein referred to as an ice layer) be formed in the capsule. The development of a process to line the inner surface of a target capsule with a foam layer of a thickness that is typical of ice layers has resulted in the ability to field targets with liquid layers wetting the foam. Successful fielding of liquid-layer targets on NIF required not only a foam-lined capsule but also changes to the capsule filling processmore » and the manner with which the inventory is maintained in the capsule. Additionally, changes to target heater power and the temperature drops across target components were required in order to achieve the desired range of shot temperatures. Finally, these changes and the target’s performance during four target shots on NIF are discussed.« less

  5. D 2 and D-T Liquid-Layer Target Shots at the National Ignition Facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Walters, Curtis; Alger, Ethan; Bhandarkar, Suhas

    Experiments at the National Ignition Facility (NIF) using targets containing a deuterium-tritium (D-T) fuel layer have, until recently, required that a high-quality layer of solid D-T (herein referred to as an ice layer) be formed in the capsule. The development of a process to line the inner surface of a target capsule with a foam layer of a thickness that is typical of ice layers has resulted in the ability to field targets with liquid layers wetting the foam. Successful fielding of liquid-layer targets on NIF required not only a foam-lined capsule but also changes to the capsule filling processmore » and the manner with which the inventory is maintained in the capsule. Additionally, changes to target heater power and the temperature drops across target components were required in order to achieve the desired range of shot temperatures. Finally, these changes and the target’s performance during four target shots on NIF are discussed.« less

  6. Shot trajectory parameters in gold medal stationary shot-putters during world-class competition.

    PubMed

    Frossard, Laurent; Smeathers, James; O'Riordan, Alison; Goodman, Scott

    2007-10-01

    The parameters of the shot's trajectory were reported for male and female gold medalists (classes F52, F53, F54, and F55) who competed at the 2000 Paralympic Games and the 2002 International Paralympic Committee (IPC) World Championships. The specific objective was to determine the magnitude of differences in these parameters across classes and genders. The release velocity of the shot increased with the performance and the classification for both males (8.30 m/s - 9.96 m/s) and females (4.58 m/s - 8.50 m/s). The measured angle of the shot's trajectory at release also increased with the performance and the classification for both males (27.54 degrees - 32.47 degrees) and females (9.02 degrees - 34.52 degrees). The position of the shot from a fixed reference point at release revealed a similar trend for both males (2.01 m - 2.68 m) and females (1.16 m - 1.98 m), although it was weaker.

  7. Predicting overt and cyber stalking perpetration by male and female college students.

    PubMed

    Ménard, Kim S; Pincus, Aaron L

    2012-07-01

    In this study, self-report student surveys on early childhood maltreatment, attachment styles, alcohol expectancies, and narcissistic personality traits are examined to determine their influence on stalking behavior. Two subtypes of stalking were measured using Spitzberg and Cupach's (2008) Obsessive Relational Intrusion: cyber stalking (one scale) and overt stalking (comprised of all remaining scales). As t tests indicated that men and women differed significantly on several variables, OLS regression models were run separately for men (N = 807) and women (N = 934). Results indicated that childhood sexual maltreatment predicted both forms of stalking for men and women. For men, narcissistic vulnerability and its interaction with sexual abuse predicted stalking behavior (overt stalking R² = 16% and cyber stalking R² = 11%). For women, insecure attachment (for both types of stalking) and alcohol expectancies (for cyber stalking) predicted stalking behavior (overt stalking R² = 4% and cyber stalking R² = 9%). We discuss the methodological and policy implications of these findings.

  8. Analysis of activated air following high yield shots in the NIF

    DOE PAGES

    Khater, Hesham; Brereton, Sandra

    2015-07-24

    During the ignition experimental campaign, the National Ignition Facility (NIF) is expected to perform shots with varying fusion yield (up to 20 MJ or 7.1 x 10 18 neutrons per shot) and a maximum annual yield of 1200 MJ. A detailed MCNP model of the Target Bay (TB) and the two switchyards (SY) has been developed to estimate the post-shot radiation environment inside the facility. During D-T shots, a pulse of 14.1 MeV neutrons streaming outside the Target Chamber (TC) will activate the air present inside the TB and the argon gas inside the laser tubes. Smaller levels of activitymore » are also generated in the SY air and in the argon portion of the SY laser beam path. The activated TB air will be mixed with fresh air from the Operations Support Building (OSB) before release through the stack. Flow of activated air from the Target Bay is controlled by the heating, ventilating, and air conditioning (HVAC) system. 16N (T 1/2 = 7.13 s) dominates the radiation levels during the first minute following the shot. It is expected that 16N will decay away during the confinement time before releasing the TB air through the stack. The other major contributors are 13N (T 1/2 = 9.97 min) and 41Ar (T 1/2 = 1.83 h). In general a low dose rate of < 1 μSv/h is expected near the stack during the first few hours following a 20 MJ shot. Here, the amount of activated Target Bay air released through the stack is very small and does not pose significant hazard to personnel or the environment. In the mean time, due to a very small leakage rate out of the laser tubes, the activated argon gas decays within the tubes and any resulting release to the environment is insignificant.« less

  9. Analysis of activated air following high yield shots in the NIF

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khater, Hesham; Brereton, Sandra

    During the ignition experimental campaign, the National Ignition Facility (NIF) is expected to perform shots with varying fusion yield (up to 20 MJ or 7.1 x 10 18 neutrons per shot) and a maximum annual yield of 1200 MJ. A detailed MCNP model of the Target Bay (TB) and the two switchyards (SY) has been developed to estimate the post-shot radiation environment inside the facility. During D-T shots, a pulse of 14.1 MeV neutrons streaming outside the Target Chamber (TC) will activate the air present inside the TB and the argon gas inside the laser tubes. Smaller levels of activitymore » are also generated in the SY air and in the argon portion of the SY laser beam path. The activated TB air will be mixed with fresh air from the Operations Support Building (OSB) before release through the stack. Flow of activated air from the Target Bay is controlled by the heating, ventilating, and air conditioning (HVAC) system. 16N (T 1/2 = 7.13 s) dominates the radiation levels during the first minute following the shot. It is expected that 16N will decay away during the confinement time before releasing the TB air through the stack. The other major contributors are 13N (T 1/2 = 9.97 min) and 41Ar (T 1/2 = 1.83 h). In general a low dose rate of < 1 μSv/h is expected near the stack during the first few hours following a 20 MJ shot. Here, the amount of activated Target Bay air released through the stack is very small and does not pose significant hazard to personnel or the environment. In the mean time, due to a very small leakage rate out of the laser tubes, the activated argon gas decays within the tubes and any resulting release to the environment is insignificant.« less

  10. Indirect monitoring shot-to-shot shock waves strength reproducibility during pump–probe experiments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pikuz, T. A., E-mail: tatiana.pikuz@eie.eng.osaka-u.ac.jp; Photon Pioneers Center, Osaka University, Suita, Osaka 565-0871 Japan; Joint Institute for High Temperatures, Russian Academy of Sciences, Moscow 125412

    We present an indirect method of estimating the strength of a shock wave, allowing on line monitoring of its reproducibility in each laser shot. This method is based on a shot-to-shot measurement of the X-ray emission from the ablated plasma by a high resolution, spatially resolved focusing spectrometer. An optical pump laser with energy of 1.0 J and pulse duration of ∼660 ps was used to irradiate solid targets or foils with various thicknesses containing Oxygen, Aluminum, Iron, and Tantalum. The high sensitivity and resolving power of the X-ray spectrometer allowed spectra to be obtained on each laser shot and tomore » control fluctuations of the spectral intensity emitted by different plasmas with an accuracy of ∼2%, implying an accuracy in the derived electron plasma temperature of 5%–10% in pump–probe high energy density science experiments. At nano- and sub-nanosecond duration of laser pulse with relatively low laser intensities and ratio Z/A ∼ 0.5, the electron temperature follows T{sub e} ∼ I{sub las}{sup 2/3}. Thus, measurements of the electron plasma temperature allow indirect estimation of the laser flux on the target and control its shot-to-shot fluctuation. Knowing the laser flux intensity and its fluctuation gives us the possibility of monitoring shot-to-shot reproducibility of shock wave strength generation with high accuracy.« less

  11. Effect of laser shot peening on precipitation hardened aluminum alloy 6061-T6 using low energy laser

    NASA Astrophysics Data System (ADS)

    Sathyajith, S.; Kalainathan, S.

    2012-03-01

    Mechanical properties of engineering material can be improved by introducing compressive residual stress on the material surface and refinement of their microstructure. Variety of mechanical process such as shot peening, water jet peening, ultrasonic peening, laser shot peening were developed in the last decades on this contrast. Among these, lasers shot peening emerged as a novel industrial treatment to improve the crack resistance of turbine blades and the stress corrosion cracking (SCC) of austenic stainless steel in power plants. In this study we successfully performed laser shot peening on precipitation hardened aluminum alloy 6061-T6 with low energy (300 mJ, 1064 nm) Nd:YAG laser using different pulse densities of 22 pulses/mm 2 and 32 pulses/mm 2. Residual stress evaluation based on X-ray diffraction sin 2 ψ method indicates a maximum of 190% percentage increase on surface compressive stress. Depth profile of micro-hardness shows the impact of laser generated shock wave up to 1.2 mm from the surface. Apart from that, the crystalline size and micro-strain on the laser shot peened surfaces have been investigated and compared with the unpeened surface using X-ray diffraction in conjunction with line broadening analysis through the Williamson-Hall plot.

  12. CRIS Cyber Range Lexicon, Version 1.0

    DTIC Science & Technology

    2015-11-10

    Figure 4: Planes and Teams...Technology (S&T) experimentation , Developmental and Operational Test and Evaluation (DT&E, OT&E), cyber force training, and mission rehearsal. To...an Event in cyber space . A Range contains a set of assets and capabilities located at one or more sites. A Range has a single Range Manager. A

  13. Evaluation of Surface Roughness by Image Processing of a Shot-Peened, TIG-Welded Aluminum 6061-T6 Alloy: An Experimental Case Study

    PubMed Central

    Rawashdeh, Nathir A.

    2018-01-01

    Visual inspection through image processing of welding and shot-peened surfaces is necessary to overcome equipment limitations, avoid measurement errors, and accelerate processing to gain certain surface properties such as surface roughness. Therefore, it is important to design an algorithm to quantify surface properties, which enables us to overcome the aforementioned limitations. In this study, a proposed systematic algorithm is utilized to generate and compare the surface roughness of Tungsten Inert Gas (TIG) welded aluminum 6061-T6 alloy treated by two levels of shot-peening, high-intensity and low-intensity. This project is industrial in nature, and the proposed solution was originally requested by local industry to overcome equipment capabilities and limitations. In particular, surface roughness measurements are usually only possible on flat surfaces but not on other areas treated by shot-peening after welding, as in the heat-affected zone and weld beads. Therefore, those critical areas are outside of the measurement limitations. Using the proposed technique, the surface roughness measurements were possible to obtain for weld beads, high-intensity and low-intensity shot-peened surfaces. In addition, a 3D surface topography was generated and dimple size distributions were calculated for the three tested scenarios: control sample (TIG-welded only), high-intensity shot-peened, and low-intensity shot-peened TIG-welded Al6065-T6 samples. Finally, cross-sectional hardness profiles were measured for the three scenarios; in all scenarios, lower hardness measurements were obtained compared to the base metal alloy in the heat-affected zone and in the weld beads even after shot-peening treatments. PMID:29748520

  14. Evaluation of Surface Roughness by Image Processing of a Shot-Peened, TIG-Welded Aluminum 6061-T6 Alloy: An Experimental Case Study.

    PubMed

    Atieh, Anas M; Rawashdeh, Nathir A; AlHazaa, Abdulaziz N

    2018-05-10

    Visual inspection through image processing of welding and shot-peened surfaces is necessary to overcome equipment limitations, avoid measurement errors, and accelerate processing to gain certain surface properties such as surface roughness. Therefore, it is important to design an algorithm to quantify surface properties, which enables us to overcome the aforementioned limitations. In this study, a proposed systematic algorithm is utilized to generate and compare the surface roughness of Tungsten Inert Gas (TIG) welded aluminum 6061-T6 alloy treated by two levels of shot-peening, high-intensity and low-intensity. This project is industrial in nature, and the proposed solution was originally requested by local industry to overcome equipment capabilities and limitations. In particular, surface roughness measurements are usually only possible on flat surfaces but not on other areas treated by shot-peening after welding, as in the heat-affected zone and weld beads. Therefore, those critical areas are outside of the measurement limitations. Using the proposed technique, the surface roughness measurements were possible to obtain for weld beads, high-intensity and low-intensity shot-peened surfaces. In addition, a 3D surface topography was generated and dimple size distributions were calculated for the three tested scenarios: control sample (TIG-welded only), high-intensity shot-peened, and low-intensity shot-peened TIG-welded Al6065-T6 samples. Finally, cross-sectional hardness profiles were measured for the three scenarios; in all scenarios, lower hardness measurements were obtained compared to the base metal alloy in the heat-affected zone and in the weld beads even after shot-peening treatments.

  15. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  16. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  17. Measuring the glass transition temperature of EPDM roofing materials: Comparison of DMA, TMA, and DSC techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Paroli, R.M.; Penn, J.

    1994-09-01

    Two ethylene-propylene-diene monomer (EPDM) roofing membranes were aged at 100 C for 7 and 28 days. The T{sub g} of these membranes was then determined by dynamic mechanical analysis (DMA), thermomechanical analysis (TMA), and differential scanning calorimetry (DSC) and the results compared. It was found that: (1) T{sub g} data can be obtained easily using the DMA and TMA techniques. The DSC method requires greater care due to the broad step change in the baseline which is associated with heavily plasticized materials. (2) The closest correspondence between techniques was for TMA and DSC (half-height). The latter, within experimental error, yieldedmore » the same glass transition temperature before and after heat-aging. (3) The peak maxima associated with tan{delta} and E{double_prime} measurements should be cited with T{sub g} values as significant differences can exist. (4) The T{sub g}(E{double_prime}) values were closer to the T{sub g}(TMA) and T{sub g}(DSC) data than were the T{sub g}(tan{delta}) values. Data obtained at 1 Hz (or possibly less) should be used when making comparisons based on various techniques. An assessment of T{sub g} values indicated that EPDM 112 roofing membrane is more stable than the EPDM 111 membrane. The T{sub g} for EPDM 112 did not change significantly with heat-aging for 28 days at 130 C.« less

  18. Cyber-Terrorism and Cyber-Crime: There Is a Difference

    DTIC Science & Technology

    The terms cyber -terrorism and cyber -crime have many varying definitions depending on who is defining them. For example, individuals with expertise in...considerations and, when investigating a cyber -attack, procedural considerations. By examining the strengths and weaknesses of several definitions offered by...national security, law enforcement, industry, law, and scholars, this research constructs a list of parameters to consider when formulating definitions for cyber -terrorism and cyber -crime.

  19. Babies and shots

    MedlinePlus

    ... MMR - shots; Pneumococcal - shots; Polio - shots; IPV - shots; Rotavirus - shots; Tdap - shots ... conjugate vaccine Pneumococcal polysaccharide vaccine Polio immunization (vaccine) Rotavirus vaccine Tdap vaccine

  20. ZAPP shot summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Loisel, Guillaume Pascal

    This was the second Z Astrophysical Plasma Properties (ZAPP) fundamental science shot series of 2015. ZAPP experiments measure fundamental properties of atoms in plasmas to solve the following important astrophysical puzzles: Why can’t we accurately model the opacity of Fe at the convection zone boundary in the Sun? How accurate are the photoionization models used to interpret data from xray satellite observations? and Why doesn’t spectral fitting provide the correct properties for White Dwarfs?

  1. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less

  2. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  3. Calibration of the Nikon 200 for Close Range Photogrammetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheriff, Lassana; /City Coll., N.Y. /SLAC

    2010-08-25

    The overall objective of this project is to study the stability and reproducibility of the calibration parameters of the Nikon D200 camera with a Nikkor 20 mm lens for close-range photogrammetric surveys. The well known 'central perspective projection' model is used to determine the camera parameters for interior orientation. The Brown model extends it with the introduction of radial distortion and other less critical variables. The calibration process requires a dense network of targets to be photographed at different angles. For faster processing, reflective coded targets are chosen. Two scenarios have been used to check the reproducibility of the parameters.more » The first one is using a flat 2D wall with 141 coded targets and 12 custom targets that were previously measured with a laser tracker. The second one is a 3D Unistrut structure with a combination of coded targets and 3D reflective spheres. The study has shown that this setup is only stable during a short period of time. In conclusion, this camera is acceptable when calibrated before each use. Future work should include actual field tests and possible mechanical improvements, such as securing the lens to the camera body.« less

  4. DSC of human hair: a tool for claim support or incorrect data analysis?

    PubMed

    Popescu, C; Gummer, C

    2016-10-01

    Differential scanning calorimetry (DSC) data are increasingly used to substantiate product claims of hair repair. Decreasing peak temperatures may indicate structural changes and chemical damage. Increasing the DSC, wet peak temperature is, therefore, often considered as proof of hair repair. A detailed understanding of the technique and hair structure indicates that this may not be a sound approach. Surveying the rich literature on the use of dynamic thermal analysis (DTA) and differential scanning calorimetry (DSC) for the analyses of human hair and the effect of cosmetic treatments, we underline some of the problems of hair structure and data interpretation. To overcome some of the difficulties of data interpretation, we advise that DSC acquired data should be supported by other techniques when used for claim substantiation. In this way, one can provide meaningful interpretation of the hair science and robust data for product claims support. © 2016 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  5. Longitudinal associations between cyber-bullying perpetration and victimization and problem behavior and mental health problems in young Australians.

    PubMed

    Hemphill, Sheryl A; Kotevski, Aneta; Heerde, Jessica A

    2015-02-01

    To investigate associations between Grade 9 and 10 cyber-bullying perpetration and victimization and Grade 11 problem behavior and mental health problems after controlling for risk factors for these outcomes in the analyses. The sample comprised 927 students from Victoria, Australia who completed a modified version of the self-report Communities That Care Youth Survey in Grades 9-11 to report on risk factors, traditional and cyber-bullying perpetration and victimization, problem behavior, and mental health. Complete data on over 650 participants were analyzed. Five per cent of Grade 9 and 10 students reported cyber-bullying perpetration only, 6-8% reported victimization only, and 8-9% both cyber-bullied others and were cyber-bullied. Results showed that cyber-bullying others in Grade 10 was associated with theft in Grade 11, cyber-victimization in Grade 10 was linked with Grade 11 depressive symptoms, and Grade 10 cyber-bullying perpetration and victimization combined predicted Grade 11 school suspension and binge drinking. Prevention approaches that target traditional and cyber-bullying, and established risk factors are necessary. Such multi-faceted programs may also reduce problem behavior and mental health problems.

  6. International note: awareness and context of cyber-harassment among secondary school students in Oyo state, Nigeria.

    PubMed

    Olumide, Adesola O; Adams, Patricia; Amodu, Olukemi K

    2015-02-01

    We determined the awareness and context of cyber-harassment among secondary school students (653 survey respondents and 18 in-depth interviewees) in Oyo state, Nigeria. Respondents' mean age was 14.2 ± 2.2 years and 53.9% were aware of cyber-harassment occurring in their school or among their friends. Cyber-harassment was often perpetrated via phone calls (62.5%), text messaging (36.9%), chat rooms (28.7%), through pictures or video clips sent via mobile phones (11.9%), emails (6.8%) or websites (5.9%). Cyber-harassment behaviours mentioned were the use of abusive words (25.4%), saying mean things or making fun of the victim (13.9%), solicitations for relationships (7.9%) or sex (6.8%) and spreading rumours about the victim (6.8%). In-depth interviewees recounted experiences of cyber-harassment suffered by their friends. Many were relationship-related, sexual solicitations and threats and corroborated quantitative findings. Respondents are aware of cyber-harassment occurring among students in the study area. Comprehensive interventions to address the problem need to be instituted. Copyright © 2014 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  7. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  8. A theoretical framework to model DSC-MRI data acquired in the presence of contrast agent extravasation

    NASA Astrophysics Data System (ADS)

    Quarles, C. C.; Gochberg, D. F.; Gore, J. C.; Yankeelov, T. E.

    2009-10-01

    Dynamic susceptibility contrast (DSC) MRI methods rely on compartmentalization of the contrast agent such that a susceptibility gradient can be induced between the contrast-containing compartment and adjacent spaces, such as between intravascular and extravascular spaces. When there is a disruption of the blood-brain barrier, as is frequently the case with brain tumors, a contrast agent leaks out of the vasculature, resulting in additional T1, T2 and T*2 relaxation effects in the extravascular space, thereby affecting the signal intensity time course and reducing the reliability of the computed hemodynamic parameters. In this study, a theoretical model describing these dynamic intra- and extravascular T1, T2 and T*2 relaxation interactions is proposed. The applicability of using the proposed model to investigate the influence of relevant MRI pulse sequences (e.g. echo time, flip angle), and physical (e.g. susceptibility calibration factors, pre-contrast relaxation rates) and physiological parameters (e.g. permeability, blood flow, compartmental volume fractions) on DSC-MRI signal time curves is demonstrated. Such a model could yield important insights into the biophysical basis of contrast-agent-extravasastion-induced effects on measured DSC-MRI signals and provide a means to investigate pulse sequence optimization and appropriate data analysis methods for the extraction of physiologically relevant imaging metrics.

  9. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  10. Cyber Insurance - Managing Cyber Risk

    DTIC Science & Technology

    2015-04-01

    license under the clause at DFARS 252.227-7013 (a)(16) [Jun 2013]. Cyber Insurance – Managing Cyber Risk Data breaches involving...significant personal information losses and financial impact are becoming increasingly common. Whether the data breach has financial implications for...hundreds of millions of dollars depending on the type and size of the breach. Most states have some type of data breach law requiring notification

  11. CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife

    NASA Astrophysics Data System (ADS)

    Kearney, Vasant; Cheung, Joey P.; McGuinness, Christopher; Solberg, Timothy D.

    2017-07-01

    The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.

  12. CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife.

    PubMed

    Kearney, Vasant; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D

    2017-06-26

    The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.

  13. Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  14. Cyber Analogies

    DTIC Science & Technology

    2014-02-28

    distribution is unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This anthology of cyber analogies will resonate with readers whose duties call for them...THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This anthology of cyber analogies will resonate with readers...fresh insights. THE CASE FOR ANALOGIES All of us on the cyber analogies team hope that this anthol- ogy will resonate with readers whose duties call

  15. Designing Cyber Exercises

    DTIC Science & Technology

    2014-10-01

    maneuver • Traditional “ Brick and Mortar ” training models – Difficult to train regularly due to logistics/budget restrictions – Doesn’t scale...complexity, scenario, location , and resources available • Scalable 4-cell planning construct – Exercise Control (White Cell) – Threat Emulation (Red...business impact) • Collaborative effort  Trusted Agents ( SMEs ) – Threats – Cyber defense capabilities – Policies and procedures – Project and/or

  16. The Effects of Laser Peening and Shot Peening on Mechanical Properties in Friction Stir Welded 7075-T7351 Aluminum

    NASA Technical Reports Server (NTRS)

    Hatamleh, Omar

    2006-01-01

    Peening techniques like laser peening and shot peening were used to modify the surface of friction stir welded 7075-T7351 Aluminum Alloy specimens. The tensile coupons were machined such as the loading was applied in a direction perpendicular to the weld direction. The peening effects on the global and local mechanical properties through the different regions of the weld were characterized and assessed. The surface hardness levels resulting from various peening techniques were also investigated for both sides of the welds. Shot peening resulted in an increase to surface hardness levels, but no improvement was noticed on the mechanical properties. In contrast, mechanical properties were improved by laser peening when compared to the unpeened material.

  17. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  18. Adolescent predictors of young adult cyber-bullying perpetration and victimization among Australian youth

    PubMed Central

    Hemphill, Sheryl A.; Heerde, Jessica A.

    2014-01-01

    Purpose The purpose of the current paper was to examine the adolescent risk and protective factors (at the individual, peer group, and family level) for young adult cyber-bullying perpetration and victimization. Methods Data from 2006 (Grade 9) to 2010 (young adulthood) were analyzed from a community sample of 927 Victorian students originally recruited as a state-wide representative sample in Grade 5 (age 10–11 years) in 2002 and followed up to age 18–19 years in 2010 (N = 809). Participants completed a self-report survey on adolescent risk and protective factors and traditional and cyber-bullying perpetration and victimization, and young adult cyber-bullying perpetration and victimization. Results As young adults, 5.1% self-reported cyber-bullying perpetration only, 5.0% cyber-bullying victimization only, and 9.5% reported both cyber-bullying perpetration and victimization. In fully adjusted logistic regression analyses, the adolescent predictors of cyber-bullying perpetration only were traditional bullying perpetration, traditional bullying perpetration and victimization, and poor family management. For young adulthood cyber-bullying victimization only, the adolescent predictor was emotion control. The adolescent predictors for young adult cyber-bullying perpetration and victimization were traditional bullying perpetration and cyber-bullying perpetration and victimization. Conclusions Based on the results of this study, possible targets for prevention and early intervention are reducing adolescent involvement in (traditional or cyber-) bullying through the development of social skills and conflict resolution skills. In addition, another important prevention target is to support families with adolescents to ensure they set clear rules and monitor adolescent’s behavior. Universal programs that assist adolescents to develop skills in emotion control are warranted. PMID:24939014

  19. NATO’s Options for Defensive Cyber Against Non-State Actors

    DTIC Science & Technology

    2013-04-01

    services to cyber criminals and hacker patriots.”33 The FSB had maintained an unsavory relationship with hackers since the early 1990s; 9 Oleg...responsibility under international law to stop the DDOS being facilitated by botnet controllers located within its geographic borders, and prosecute the cyber ... criminals involved. “Rule 5” of the Tallinn Manual addresses the cyber responsibility of a nation-state: “A State shall not knowingly allow the

  20. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  1. SU-F-T-538: CyberKnife with MLC for Treatment of Large Volume Tumors: A Feasibility Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bichay, T; Mayville, A

    2016-06-15

    Purpose: CyberKnife is a well-documented modality for SRS and SBRT treatments. Typical tumors are small and 1–5 fractions are usually used. We determined the feasibility of using CyberKnife, with an InCise multileaf collimator option, for larger tumors undergoing standard dose and fractionation. The intent was to understand the limitation of using this modality for other external beam radiation treatments. Methods: Five tumors from different anatomical sites with volumes from 127.8 cc to 1,320.5 cc were contoured and planned on a Multiplan V5.1 workstation. The target average diameter ranged from 7 cm to 13 cm. The dose fractionation was 1.8–2.0 Gy/fractionmore » and 25–45 fractions for total doses of 45–81 Gy. The sites planned were: pancreas, head and neck, prostate, anal, and esophagus. The plans were optimized to meet conventional dose constraints based on various RTOG protocols for conventional fractionation. Results: The Multiplan treatment planning system successfully generated clinically acceptable plans for all sites studied. The resulting dose distributions achieved reasonable target coverage, all greater than 95%, and satisfactory normal tissue sparing. Treatment times ranged from 9 minutes to 38 minutes, the longest being a head and neck plan with dual targets receiving different doses and with multiple adjacent critical structures. Conclusion: CyberKnife, with the InCise multileaf collimation option, can achieve acceptable dose distributions in large volume tumors treated with conventional dose and fractionation. Although treatment times are greater than conventional accelerator time; target coverage and dose to critical structures can be kept within a clinically acceptable range. While time limitations exist, when necessary CyberKnife can provide an alternative to traditional treatment modalities for large volume tumors.« less

  2. CYBER-205 Devectorizer

    NASA Technical Reports Server (NTRS)

    Lakeotes, Christopher D.

    1990-01-01

    DEVECT (CYBER-205 Devectorizer) is CYBER-205 FORTRAN source-language-preprocessor computer program reducing vector statements to standard FORTRAN. In addition, DEVECT has many other standard and optional features simplifying conversion of vector-processor programs for CYBER 200 to other computers. Written in FORTRAN IV.

  3. The Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce

    DTIC Science & Technology

    2016-06-01

    Breakdown of the 17D community as of 31 March 2014. (Reproduced from 17D Officer Assignment Team, Cyberspace Operations “Spread the Word” briefing, 9– 11 ...surety 3D0X4 Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport 3D1X3 Radio frequency transport 3D1X4 Spectrum operations 3D1X5 Radar...Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport systems 3D1X3 Radio frequency transmissionsystems FORCE DEVELOPMENT │ 123 Table 8

  4. Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kelic, Andjelka; Campbell, Philip L

    The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.

  5. Cyber-Informed Engineering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  6. Cyber crimes.

    PubMed

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.

  7. Flu shots and the characteristics of unvaccinated elderly Medicare beneficiaries.

    PubMed

    Lochner, Kimberly A; Wynne, Marc

    2011-12-21

    Data from the Medicare Current Beneficiary Survey, 2009. • Overall, 73% of Medicare beneficiaries aged 65 years and older reported receiving a flu shot for the 2008 flu season, but vaccination rates varied by socio-demographic characteristics. Flu vaccination was lowest for beneficiaries aged 65-74 years old, who were non-Hispanic Blacks and Hispanics, were not married, had less than a high school education, or who were eligible for Medicaid (i.e., dual eligibles). • Healthcare utilization and personal health behavior were also related to vaccination rates, with current smokers and those with no hospitalizations or physician visits being less likely to be vaccinated. • Among those beneficiaries who reported receiving a flu shot, 59% received it in a physician's office or clinic, with the next most common setting being in the community (21%); e.g., grocery store, shopping mall, library, or church. • Among those beneficiaries who did not receive a flu shot, the most common reasons were beliefs that the shot could cause side effects or disease (20%), that they didn't think the shot could prevent the flu (17%), or that the shot wasn't needed (16%). Less than 1% reported that they didn't get the flu shot because of cost. Elderly persons (aged 65 years and older) are at increased risk of complications from influenza, with the majority of influenza-related hospitalizations and deaths occurring among the elderly (Fiore et al., 2010). Most physicians recommend their elderly patients get a flu shot each year, and many hospitals inquire about elderly patient's immunization status upon admission, providing a vaccination if requested. The importance of getting a flu shot is underscored by the Department of Health and Human Services' Healthy People initiative, which has set a vaccination goal of 90% for the Nation's elderly by the year 2020 (Department of Health and Human Services [DHHS], 2011). Although all costs related to flu shots are covered by Medicare, requiring

  8. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    PubMed

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  9. Self-Development for Cyber Warriors

    DTIC Science & Technology

    2011-11-10

    Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.

  10. Get Important Shots

    MedlinePlus

    ... checkup. Make a plan with your doctor or nurse to get the shots you need. You may also be able to get shots at your local pharmacy. Use this vaccine clinic locator to find out where you can get important shots. Get a seasonal flu shot every year. Remember, everyone age 6 months ...

  11. CRIS Cyber Range Lexicon Version 1.0

    DTIC Science & Technology

    2015-10-30

    Zachary Weber (MIT Lincoln Laboratory) Mr. Mike Wee (Cyber Test & Evaluation (T&E) Support Cell, TRMC/ Northrop Grumman ) Dr. David “Fuzzy” Wells (USPACOM) Mr. Bennett Wilson (NAVSEA GOV – CDSA, Damneck) ...11 Figure 4: Planes and Teams...the CRIS WG include, but are not limited to, Science & Technology (S&T) experimentation , Developmental and Operational Test and Evaluation (DT&E, OT

  12. Effect of Shot Peening in Different Shot Distance and Shot Angle on Surface Morphology, Surface Roughness and Surface Hardness of 316L Biomaterial

    NASA Astrophysics Data System (ADS)

    Umbu Kondi Maliwemu, Erich; Malau, Viktor; Iswanto, Priyo Tri

    2018-01-01

    Shot peening is a mechanical surface treatment with a beneficial effect to generate compressive residual stress caused by plastic deformation on the surface of material. This plastic deformation can improve the surface characteristics of metallic materials, such as modification of surface morphology, surface roughness, and surface hardness. The objective of this study is to investigate the effect of shot peening in different shot distance and shot angle on surface morphology, surface roughness, and surface hardness of 316L biomaterial. Shot distance was varied at 6, 8, 10, and 12 cm and shot angle at 30, 60, and 90°, working pressure at 7 kg/cm2, shot duration for 20 minutes, and using steel balls S-170 with diameter of 0.6 mm. The results present that the shot distance and shot angle of shot peening give the significant effect to improve the surface morphology, surface roughness, and surface hardness of 316 L biomaterial. Shot peening can increase the surface roughness by the increasing of shot distance and by the decreasing of shot angle. The nearest shot distance (6 cm) and the largest shot angle (90°) give the best results on the grain refinement with the surface roughness of 1.04 μm and surface hardness of 534 kg/mm2.

  13. Time-Centric Models For Designing Embedded Cyber-physical Systems

    DTIC Science & Technology

    2009-10-09

    Time -centric Models For Designing Embedded Cyber- physical Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou Electrical... Time -centric Models For Designing Embedded Cyber-physical Systems ∗ John C. Eidson , Edward A. Lee, Slobodan Matic, Sanjit A. Seshia, Jia Zou...implementations, such a uniform notion of time cannot be precisely realized. Time triggered networks [10] and time synchronization [9] can be used to

  14. 50 CFR 20.134 - Approval of nontoxic shot types and shot coatings.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... erosion and absorption of one shot or coated shot in a 24-hour period. Define the nature of the toxic...) with one U.S. No. 4 pellet of lead shot. Dose each bird in one group of 8 males and 8 females with 8 U... males and 8 females with one U.S. No. 4 pellet of the candidate shot type or shot with the proposed...

  15. Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar

    Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less

  16. Shot Noise in a Quantum Dot with the Finite Coulomb Interaction

    NASA Astrophysics Data System (ADS)

    Cao, Xian-Sheng

    2011-09-01

    We study the shot noise in a quantum dot which coupled to metallic leads using the equation of motion of nonequilibrium Green's function technique at Kondo temperature T K . We compute the out of equilibrium density of states, the current and the shot noise. We find that the value of shot noise in the finite coulomb interaction case is smaller than one at Kondo temperature T K when variation of ɛ d values of the QD energy in the absence of the external magnetic field. We also find that the values of S(0)/ V are almost insusceptible to U when eV d under 2, while the values of S(0)/ V appear slightly branch off when the value of eV d approach to 6.

  17. Quantifying and measuring cyber resiliency

    NASA Astrophysics Data System (ADS)

    Cybenko, George

    2016-05-01

    Cyber resliency has become an increasingly attractive research and operational concept in cyber security. While several metrics have been proposed for quantifying cyber resiliency, a considerable gap remains between those metrics and operationally measurable and meaningful concepts that can be empirically determined in a scientific manner. This paper describes a concrete notion of cyber resiliency that can be tailored to meet specific needs of organizations that seek to introduce resiliency into their assessment of their cyber security posture.

  18. [Cyber-bullying in adolescents: associated psychosocial problems and comparison with school bullying].

    PubMed

    Kubiszewski, V; Fontaine, R; Huré, K; Rusch, E

    2013-04-01

    The aim of this study was to determine the prevalence of adolescents engaged in cyber-bullying and then to identify whether students involved in cyber- and school bullying present the same characteristics of internalizing problems (insomnia, perceived social disintegration, psychological distress) and externalizing problems (general aggressiveness, antisocial behavior). Semi-structured interviews were conducted with 738 adolescents from a high-school and a middle-school (mean age=14.8 ± 2.7). The Electronic Bullying Questionnaire and the Olweus Bully/Victim Questionnaire were used to identify profiles of cyber-bullying (cyber-victim, cyber-bully, cyber-bully/victim and cyber-neutral) and school bullying (victim, bully, bully/victim and neutral). Internalizing problems were investigated using the Athens Insomnia Scale, a Perceived Social Disintegration Scale and a Psychological Distress Scale. Externalizing problems were assessed using a General Aggressiveness Scale and an Antisocial Behavior Scale. Almost one student in four was involved in cyber-bullying (16.4% as cyber-victim, 4.9% as cyber-bully and 5.6% as cyber-bully/victim); 14% of our sample was engaged in school bullying as a victim, 7.2% as a bully and 2.8% as a bully/victim. The majority of adolescents involved in cyber-bullying were not involved in school bullying. With regard to the problems associated with school bullying, internalizing problems were more prevalent in victims and bully/victims, whereas externalizing problems were more common in bullies and bully/victims. A similar pattern was found in cyber-bullying where internalizing problems were characteristic of cyber-victims and cyber-bully/victims. Insomnia was elevated in the cyber-bully group which is specific to cyberbullying. General aggressiveness and antisocial behavior were more prevalent in cyber-bullies and cyber-bully/victims. Looking at the differences between types of bullying, victims of "school only" and "school and cyber

  19. Examining Cyber Command Structures

    DTIC Science & Technology

    2015-03-01

    domains, cyber, command and control, USCYBERCOM, combatant command, cyber force PAGES 65 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20...USCYBERCOM, argue for the creation of a stand-alone cyber force.11 They claim that the military’s tradition-oriented and inelastic nature make the

  20. Cyber Workforce Retention

    DTIC Science & Technology

    2016-10-01

    movement to focus on cybersecurity in the private sector. The company has shared intelligence and resources on cyber threats, even going as far as...personnel and 1NX intelligence personnel as well as 14N intelligence officers and the 17D/S cyber operations officers who lead and manage Air Force...threat of cyber incidents, the burgeon- ing cost of doing business due to cybersecurity infiltrations, and corporate America’s / senior executives

  1. Birth Control Shot

    MedlinePlus

    ... Safe Videos for Educators Search English Español Birth Control Shot KidsHealth / For Teens / Birth Control Shot What's in this article? What Is It? ... La inyección anticonceptiva What Is It? The birth control shot is a long-acting form of progesterone, ...

  2. Cyber Power

    DTIC Science & Technology

    2010-05-01

    71 As we saw above, cyber criminals are also a significant current burden on the economy. Looking further ahead, as other states develop their...signed by 27 countries. But at- titudes may change over time if costs exceed benefits. For example, “Russian cyber - criminals no longer follow hands-off

  3. Dual echelon femtosecond single-shot spectroscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shin, Taeho; Wolfson, Johanna W.; Teitelbaum, Samuel W.

    We have developed a femtosecond single-shot spectroscopic technique to measure irreversible changes in condensed phase materials in real time. Crossed echelons generate a two-dimensional array of time-delayed pulses with one femtosecond probe pulse. This yields 9 ps of time-resolved data from a single laser shot, filling a gap in currently employed measurement methods. We can now monitor ultrafast irreversible dynamics in solid-state materials or other samples that cannot be flowed or replenished between laser shots, circumventing limitations of conventional pump-probe methods due to sample damage or product buildup. Despite the absence of signal-averaging in the single-shot measurement, an acceptable signal-to-noisemore » level has been achieved via background and reference calibration procedures. Pump-induced changes in relative reflectivity as small as 0.2%−0.5% are demonstrated in semimetals, with both electronic and coherent phonon dynamics revealed by the data. The optical arrangement and the space-to-time conversion and calibration procedures necessary to achieve this level of operation are described. Sources of noise and approaches for dealing with them are discussed.« less

  4. Basketball Shot Types and Shot Success in Different Levels of Competitive Basketball

    PubMed Central

    2015-01-01

    The purpose of our research was to investigate the relative frequencies of different types of basketball shots (above head, hook shot, layup, dunk, tip-in), some details about their technical execution (one-legged, two-legged, drive, cut, …), and shot success in different levels of basketball competitions. We analysed video footage and categorized 5024 basketball shots from 40 basketball games and 5 different levels of competitive basketball (National Basketball Association (NBA), Euroleague, Slovenian 1st Division, and two Youth basketball competitions). Statistical analysis with hierarchical multinomial logistic regression models reveals that there are substantial differences between competitions. However, most differences decrease or disappear entirely after we adjust for differences in situations that arise in different competitions (shot location, player type, and attacks in transition). Differences after adjustment are mostly between the Senior and Youth competitions: more shots executed jumping or standing on one leg, more uncategorised shot types, and more dribbling or cutting to the basket in the Youth competitions, which can all be attributed to lesser technical and physical ability of developing basketball players. The two discernible differences within the Senior competitions are that, in the NBA, dunks are more frequent and hook shots are less frequent compared to European basketball, which can be attributed to better athleticism of NBA players. The effect situational variables have on shot types and shot success are found to be very similar for all competitions. PMID:26038836

  5. Basketball shot types and shot success in different levels of competitive basketball.

    PubMed

    Erčulj, Frane; Štrumbelj, Erik

    2015-01-01

    The purpose of our research was to investigate the relative frequencies of different types of basketball shots (above head, hook shot, layup, dunk, tip-in), some details about their technical execution (one-legged, two-legged, drive, cut, …), and shot success in different levels of basketball competitions. We analysed video footage and categorized 5024 basketball shots from 40 basketball games and 5 different levels of competitive basketball (National Basketball Association (NBA), Euroleague, Slovenian 1st Division, and two Youth basketball competitions). Statistical analysis with hierarchical multinomial logistic regression models reveals that there are substantial differences between competitions. However, most differences decrease or disappear entirely after we adjust for differences in situations that arise in different competitions (shot location, player type, and attacks in transition). Differences after adjustment are mostly between the Senior and Youth competitions: more shots executed jumping or standing on one leg, more uncategorised shot types, and more dribbling or cutting to the basket in the Youth competitions, which can all be attributed to lesser technical and physical ability of developing basketball players. The two discernible differences within the Senior competitions are that, in the NBA, dunks are more frequent and hook shots are less frequent compared to European basketball, which can be attributed to better athleticism of NBA players. The effect situational variables have on shot types and shot success are found to be very similar for all competitions.

  6. Impact of Alleged Russian Cyber Attacks

    DTIC Science & Technology

    2009-05-01

    security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33  X.  The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the

  7. The Cyber War: Maintaining and Controlling the Key Cyber Terrain of the Cyberspace Domain

    DTIC Science & Technology

    2016-06-26

    solution strategy to assess options that will enable the commander to realize the Air Force’s cyber mission. Recommendations will be made that will...will present a solution to assist the JFC in achieving cyberspace dominance. Background In the modern world of advanced technology, control of...the solutions are: 1) timely identification of key cyber terrain, 2) accurate mapping of the cyber terrain, 3) defense of key cyber terrain, and 4

  8. Vaccine shot-limiting: Estimating the prevalence, indicators, and impact on vaccination status - Michigan, 2012.

    PubMed

    Weinberg, Meghan; Dietz, Stephanie; Potter, Rachel; Swanson, Robert; Miller, Corinne; McFadden, Jevon

    2017-02-15

    Concerns regarding vaccine safety and pain have prompted certain parents to limit the number of shots their child receives per visit. We estimated the prevalence of shot-limited children in Michigan, described their characteristics, assessed whether shot-limited children were up-to-date on recommended vaccinations, and investigated possible intervention points for vaccination education. We analyzed vaccination registry and birth record data of children born in Michigan during 2012 who had ⩾2 vaccination visits, with ⩾1 visits after age 5months. Shot-limited was defined as receiving ⩽2 shots at all visits through age 24months. Nonlimited children received >2 shots at ⩾1 visits. Up-to-date vaccination was based on receipt of a seven-vaccine series and was determined at ages 24months and 35months. Risk ratios (RR) were calculated using risk regression. Of 101,443 children, a total of 2,967 (3%) children were shot-limited. Mothers of shot-limited children were more likely to be white (RR: 1.2; 95% confidence interval [CI]: 1.2-1.2), college graduate (RR: 1.9; 95% CI: 1.9-2.0), and married (RR: 1.5; 95% CI: 1.5-1.5). Compared with nonlimited children, shot-limited children were more likely to be born in a nonhospital setting (RR: 11.7; 95% CI: 9.4-14.6) and have a midwife attendant (RR: 1.9; 95% CI: 1.7-2.1). Shot-limited children were less likely to be up-to-date on recommended vaccinations (RR: 0.2; 95% CI: 0.2-0.3); this association was stronger for those with a midwife birth attendant (RR: 0.1; 95% CI: 0.1-0.2) rather than a medical doctor (RR: 0.3; 95% CI: 0.2-0.3). Shot-limited children are less likely to be up-to-date on vaccinations, possibly leading to increased risk for vaccine-preventable diseases. This association was stronger for those with a midwife birth attendant. This analysis should prompt targeted education, such as to midwives, concerning risks associated with shot-limiting behavior. Published by Elsevier Ltd.

  9. Correlation of Tumor Immunohistochemistry with Dynamic Contrast-Enhanced and DSC-MRI Parameters in Patients with Gliomas.

    PubMed

    Nguyen, T B; Cron, G O; Bezzina, K; Perdrizet, K; Torres, C H; Chakraborty, S; Woulfe, J; Jansen, G H; Thornhill, R E; Zanette, B; Cameron, I G

    2016-12-01

    Tumor CBV is a prognostic and predictive marker for patients with gliomas. Tumor CBV can be measured noninvasively with different MR imaging techniques; however, it is not clear which of these techniques most closely reflects histologically-measured tumor CBV. Our aim was to investigate the correlations between dynamic contrast-enhanced and DSC-MR imaging parameters and immunohistochemistry in patients with gliomas. Forty-three patients with a new diagnosis of glioma underwent a preoperative MR imaging examination with dynamic contrast-enhanced and DSC sequences. Unnormalized and normalized cerebral blood volume was obtained from DSC MR imaging. Two sets of plasma volume and volume transfer constant maps were obtained from dynamic contrast-enhanced MR imaging. Plasma volume obtained from the phase-derived vascular input function and bookend T1 mapping (Vp_Φ) and volume transfer constant obtained from phase-derived vascular input function and bookend T1 mapping (K trans _Φ) were determined. Plasma volume obtained from magnitude-derived vascular input function (Vp_SI) and volume transfer constant obtained from magnitude-derived vascular input function (K trans _SI) were acquired, without T1 mapping. Using CD34 staining, we measured microvessel density and microvessel area within 3 representative areas of the resected tumor specimen. The Mann-Whitney U test was used to test for differences according to grade and degree of enhancement. The Spearman correlation was performed to determine the relationship between dynamic contrast-enhanced and DSC parameters and histopathologic measurements. Microvessel area, microvessel density, dynamic contrast-enhanced, and DSC-MR imaging parameters varied according to the grade and degree of enhancement (P < .05). A strong correlation was found between microvessel area and Vp_Φ and between microvessel area and unnormalized blood volume (r s ≥ 0.61). A moderate correlation was found between microvessel area and normalized blood

  10. Timing of cyber conflict

    PubMed Central

    Axelrod, Robert; Iliev, Rumen

    2014-01-01

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752

  11. Timing of cyber conflict.

    PubMed

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  12. "Making Kind Cool": Parents' Suggestions for Preventing Cyber Bullying and Fostering Cyber Kindness

    ERIC Educational Resources Information Center

    Cassidy, Wanda; Brown, Karen; Jackson, Margaret

    2012-01-01

    Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…

  13. Cyber PCE Compendium: Cyber 300 Professional Continuing Education. Volume 1 Issue 2, Winter 2013.

    DTIC Science & Technology

    2013-01-01

    2003, a Naval Communications element decided to interrupt extremely high frequency (EHF) satellite service for routine maintenance during the same...defense programs.12 RECOMMENDATION 1. As a nation we should concentrate our efforts into the successful launching of a cyber- equivalent to " Apollo 11 ...mindset.” 11 4. The former communications and information community didn’t have a strong requirement for intelligence nor a close relationship with

  14. Metaphors for cyber security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  15. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    DTIC Science & Technology

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  16. Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

    DTIC Science & Technology

    Future U.S. Army cyber operations will need to be conducted jointly and at all echelons and must include both defensive and offensive components.1...The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision...statement: The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while

  17. A Responsive Cyber Risk Ecosystem

    DTIC Science & Technology

    2017-01-19

    UNCLASSIFIED - Distribution A: Approved for public release; distribution unlimited AIR FORCE CYBERWORX REPORT 16-003: A RESPONSIVE CYBER RISK...right problem to solve and find meaningful solutions by exploring a wide range of possible answers to the design problem. For the Responsive Cyber ...Risk Dashboard Design Project, CyberWorx brought together a design team of 25 participants from UASFA and Industry to explore how cyber risk to AF

  18. Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamentalmore » need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general

  19. Comparative toxicity of lead shot in black ducks and mallards

    USGS Publications Warehouse

    Rattner, B.A.; Fleming, W.J.

    1988-01-01

    An extreme sensitivity of pen-reared black ducks (BDs) to lead shot was observed incidental to development of an enzyme assay (Pain & Rattner, 1988). Intubation of pen-reared BDs with one no. 4 lead shot resulted in 60% mortality in 6 days. It was concluded that BDs were more sensitive to lead shot than expected, or that lead toxicity may be exacerbated by stressful conditions (elevated temperature, confinement in small pens). We reexamined lead shot toxicity in BDs and mallards (MLs). In winter 1986 (Ta=1.7-14.6? C), pen-reared and wild BDs, and game-farm and wild MLs were sham-dosed or given one no. 4 shot. After 14 days, dosed birds were redosed with two or four additional shot. Since the original observation of enhanced. shot toxicity to BDs occurred during summer, the study was also repeated in summer 1987 (Ta=I7:6-30.9?C), with pen-reared BDs and game-farm MLs. Mortality, overt intoxication, weight change, aminolevulinic acid dehydratase activity, and protoporphyrin concentration were used to compare sensitivity among groups. Sensitivity to lead shot was similar between BDs and MLs. However, the wild ducks appeared more vulnerable than their domesticated counterparts, and signs of intoxication were more pronounced in winter than in summer.

  20. New trends in the cyber and street market of recreational drugs? The case of 2C-T-7 ('Blue Mystic').

    PubMed

    Schifano, Fabrizio; Deluca, Paolo; Agosti, Lisa; Martinotti, Giovanni; Corkery, John M; Alex, Baldacchino; Caterina, Bonan; Heikki, Bothas; Raffaella, Brigada; Anna, Comacchio; Lucia, Di Furia; Dorte, Duarte Rui Eastwood; Magi, Farré; Susana, Ferreira; Irene, Flores; Claude, Guionnet; Lisbet, Harder; Lene, Stokholm Jensen; Mauro, Leoni; Christopher, Littlejohn; Aino, Majava; Teuvo, Peltoniemi; Milena, Pizza; Salman, Rawaf; Damien, Robert; Angela, Rossi Maria; Francesco, Rovetto; Norbert, Scherbaum; Holger, Siemann; Josep, Tarrago; Marta, Torrens; Francesco, Zambello

    2005-11-01

    2C-T-7 ('Blue Mystic'), an illicit compound which shows similarities with MDMA and other designer drugs, has been only occasionally identified in the EU, but discussion on the Internet between experimenters has recently grown significantly. We aimed at collecting together in a review the available information on 2C-T-7, both at the cyber and at the street market level. 2C-T-7 was first synthesized in 1986; its desired effects include both a sense of empathy and of well-being. Hallucinations, nausea, anxiety, panic attacks and paranoid ideation are anecdotally reported. According to the different European sources here approached, the availability of 2C-T-7 at street level seems to be currently very low, although one death related to a mono-intoxication with 2C-T-7 has been documented in the USA. With respect to information on 2C-T-7 available online, due to both redundancy and relevance issues the initial identified sample of 360 was reduced to 118 websites. In 14 (11.9%) websites, the detailed description of the 2C-T-7 synthesis was given. Harm Reduction websites appeared significantly earlier in the search engines results' list than Anti drugs (p 0.006) websites. Five (4.2%) websites apparently offered 2C-T-7 for sale. The large body of knowledge available online seems to contrast with small numbers of seizures at street level; an exhaustive web mapping of drug-related issues may be of interest for the clinician. Projects aimed at designing more 'attractive' prevention websites should be planned and future studies should better assess the characteristics of those consumers who take advantage of the online information of hallucinogenic compounds.

  1. Collider shot setup for Run 2 observations and suggestions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annala, J.; Joshel, B.

    1996-01-31

    This note is intended to provoke discussion on Collider Run II shot setup. We hope this is a start of activities that will converge on a functional description of what is needed for shot setups in Collider Run II. We will draw on observations of the present shot setup to raise questions and make suggestions for the next Collider run. It is assumed that the reader has some familiarity with the Collider operational issues. Shot setup is defined to be the time between the end of a store and the time the Main Control Room declares colliding beams. This ismore » the time between Tevatron clock events SCE and SCB. This definition does not consider the time experiments use to turn on their detectors. This analysis was suggested by David Finley. The operational scenarios for Run II will require higher levels of reliability and speed for shot setup. See Appendix I and II. For example, we estimate that a loss of 3 pb{sup {minus}1}/week (with 8 hour stores) will occur if shot setups take 90 minutes instead of 30 minutes. In other words: If you do 12 shots for one week and accept an added delay of one minute in each shot, you will loose more than 60 nb{sup {minus}1} for that week alone (based on a normal shot setup of 30 minutes). These demands should lead us to be much more pedantic about all the factors that affect shot setups. Shot setup will be viewed as a distinct process that is composed of several inter- dependent `components`: procedures, hardware, controls, and sociology. These components don`t directly align with the different Accelerator Division departments, but are topical groupings of the needed accelerator functions. Defining these components, and categorizing our suggestions within them, are part of the goal of this document. Of course, some suggestions span several of these components.« less

  2. 47 CFR 80.359 - Frequencies for digital selective calling (DSC).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Frequencies for digital selective calling (DSC... for digital selective calling (DSC). (a) General purpose calling. The following table describes the calling frequencies for use by authorized ship and coast stations for general purpose DSC. There are three...

  3. Predictors of Traditional and Cyber-Bullying Victimization: A Longitudinal Study of Australian Secondary School Students.

    PubMed

    Hemphill, Sheryl A; Tollit, Michelle; Kotevski, Aneta; Heerde, Jessica A

    2015-09-01

    The purpose of the present article is to compare the individual, peer, family, and school risk and protective factors for both traditional and cyber-bullying victimization. This article draws on data from 673 students from Victoria, Australia, to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber-bullying victimization in Grade 9 (aged 14-15 years). Participants completed a modified version of the Communities That Care youth survey. There were few similarities and important differences in the predictors of traditional and cyber-bullying victimization. For Grade 9 cyber-bullying victimization, in the fully adjusted model, having been a victim of traditional bullying in Grade 7 and emotional control in Grade 7 were predictors. For Grade 9 traditional bullying victimization, predictors were Grade 7 traditional bullying victimization, association with antisocial peers, and family conflict, with family attachment and emotional control marginally statistically significant. The use of evidence-based bullying prevention programs is supported to reduce experiences of both traditional and cyber-bullying victimization, as is the implementation of programs to assist students to regulate their emotions effectively. In addition, traditional bullying victimization may be reduced by addressing association with antisocial friends, family conflict, and bonding to families. © The Author(s) 2014.

  4. Cyber Deterrence and Stability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goychayev, Rustam; Carr, Geoffrey A.; Weise, Rachel A.

    Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, thismore » paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.« less

  5. Bidirectional Contrast agent leakage correction of dynamic susceptibility contrast (DSC)-MRI improves cerebral blood volume estimation and survival prediction in recurrent glioblastoma treated with bevacizumab.

    PubMed

    Leu, Kevin; Boxerman, Jerrold L; Lai, Albert; Nghiemphu, Phioanh L; Pope, Whitney B; Cloughesy, Timothy F; Ellingson, Benjamin M

    2016-11-01

    To evaluate a leakage correction algorithm for T 1 and T2* artifacts arising from contrast agent extravasation in dynamic susceptibility contrast magnetic resonance imaging (DSC-MRI) that accounts for bidirectional contrast agent flux and compare relative cerebral blood volume (CBV) estimates and overall survival (OS) stratification from this model to those made with the unidirectional and uncorrected models in patients with recurrent glioblastoma (GBM). We determined median rCBV within contrast-enhancing tumor before and after bevacizumab treatment in patients (75 scans on 1.5T, 19 scans on 3.0T) with recurrent GBM without leakage correction and with application of the unidirectional and bidirectional leakage correction algorithms to determine whether rCBV stratifies OS. Decreased post-bevacizumab rCBV from baseline using the bidirectional leakage correction algorithm significantly correlated with longer OS (Cox, P = 0.01), whereas rCBV change using the unidirectional model (P = 0.43) or the uncorrected rCBV values (P = 0.28) did not. Estimates of rCBV computed with the two leakage correction algorithms differed on average by 14.9%. Accounting for T 1 and T2* leakage contamination in DSC-MRI using a two-compartment, bidirectional rather than unidirectional exchange model might improve post-bevacizumab survival stratification in patients with recurrent GBM. J. Magn. Reson. Imaging 2016;44:1229-1237. © 2016 International Society for Magnetic Resonance in Medicine.

  6. Penetrating BB shot head wound in an asymptomatic 9-year-old girl: the ultimate teaching moment.

    PubMed

    Johnson, N A

    1997-01-01

    Air rifle BB injuries represent a common type of childhood accident. The purpose of this case report is to encourage all providers of pediatric care to include nonpowder firearm safety education with standard well-child anticipatory guidance. A case report is described and experience with similar injuries is discussed from cases found in a literature review using the key words "air rifle," "patient education," "pediatric," "ballistics," and "trauma." A 9-year-old girl came to the emergency department after having been accidentally shot in the head by her 7-year-old brother with a toy air rifle. The BB shot entered through the left cheek and traversed up into the soft tissue above the mandible, just medial to the internal carotid artery, and posterior to the facial nerve. Other than local pain, she was entirely asymptomatic. The cheek was repaired without complication. Conservative therapy was recommended. She and her family were given anticipatory guidance, and her course thereafter was uneventful. Firearm education is not a standard part of every well-child encounter. Injuries by all types of firearms are increasing at epidemic rates. Questioning about the accessibility of both powder- and non-powder-based weapons (ie, air rifle) and providing routine safety education should become the standard of care at all well-child encounters.

  7. Vaccine shot-limiting: Estimating the prevalence, indicators, and impact on vaccination status — Michigan, 2012

    PubMed Central

    Weinberg, Meghan; Dietz, Stephanie; Potter, Rachel; Swanson, Robert; Miller, Corinne; McFadden, Jevon

    2017-01-01

    Background Concerns regarding vaccine safety and pain have prompted certain parents to limit the number of shots their child receives per visit. We estimated the prevalence of shot-limited children in Michigan, described their characteristics, assessed whether shot-limited children were up-to-date on recommended vaccinations, and investigated possible intervention points for vaccination education. Methods We analyzed vaccination registry and birth record data of children born in Michigan during 2012 who had ⩾2 vaccination visits, with ⩾1 visits after age 5 months. Shot-limited was defined as receiving ≤2 shots at all visits through age 24 months. Nonlimited children received >2 shots at ⩾1 visits. Up-to-date vaccination was based on receipt of a seven-vaccine series and was determined at ages 24 months and 35 months. Risk ratios (RR) were calculated using risk regression. Results Of 101,443 children, a total of 2,967 (3%) children were shot-limited. Mothers of shot-limited children were more likely to be white (RR: 1.2; 95% confidence interval [CI]: 1.2–1.2), college graduate (RR: 1.9; 95% CI: 1.9–2.0), and married (RR: 1.5; 95% CI: 1.5–1.5). Compared with nonlimited children, shot-limited children were more likely to be born in a nonhospital setting (RR: 11.7; 95% CI: 9.4–14.6) and have a midwife attendant (RR: 1.9; 95% CI: 1.7–2.1). Shot-limited children were less likely to be up-to-date on recommended vaccinations (RR: 0.2; 95% CI: 0.2–0.3); this association was stronger for those with a midwife birth attendant (RR: 0.1; 95% CI: 0.1–0.2) rather than a medical doctor (RR: 0.3; 95% CI: 0.2–0.3). Conclusions Shot-limited children are less likely to be up-to-date on vaccinations, possibly leading to increased risk for vaccine-preventable diseases. This association was stronger for those with a midwife birth attendant. This analysis should prompt targeted education, such as to midwives, concerning risks associated with shot-limiting behavior

  8. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  9. Spiral MRI on a 9.4T Vertical-bore Superconducting Magnet Using Unshielded and Self-shielded Gradient Coils.

    PubMed

    Kodama, Nao; Setoi, Ayana; Kose, Katsumi

    2018-04-10

    Spiral MRI sequences were developed for a 9.4T vertical standard bore (54 mm) superconducting magnet using unshielded and self-shielded gradient coils. Clear spiral images with 64-shot scan were obtained with the self-shielded gradient coil, but severe shading artifacts were observed for the spiral-scan images acquired with the unshielded gradient coil. This shading artifact was successfully corrected with a phase-correction technique using reference scans that we developed based on eddy current field measurements. We therefore concluded that spiral imaging sequences can be installed even for unshielded gradient coils if phase corrections are performed using the reference scans.

  10. Optimization of DSC MRI Echo Times for CBV Measurements Using Error Analysis in a Pilot Study of High-Grade Gliomas.

    PubMed

    Bell, L C; Does, M D; Stokes, A M; Baxter, L C; Schmainda, K M; Dueck, A C; Quarles, C C

    2017-09-01

    The optimal TE must be calculated to minimize the variance in CBV measurements made with DSC MR imaging. Simulations can be used to determine the influence of the TE on CBV, but they may not adequately recapitulate the in vivo heterogeneity of precontrast T2*, contrast agent kinetics, and the biophysical basis of contrast agent-induced T2* changes. The purpose of this study was to combine quantitative multiecho DSC MRI T2* time curves with error analysis in order to compute the optimal TE for a traditional single-echo acquisition. Eleven subjects with high-grade gliomas were scanned at 3T with a dual-echo DSC MR imaging sequence to quantify contrast agent-induced T2* changes in this retrospective study. Optimized TEs were calculated with propagation of error analysis for high-grade glial tumors, normal-appearing white matter, and arterial input function estimation. The optimal TE is a weighted average of the T2* values that occur as a contrast agent bolus transverses a voxel. The mean optimal TEs were 30.0 ± 7.4 ms for high-grade glial tumors, 36.3 ± 4.6 ms for normal-appearing white matter, and 11.8 ± 1.4 ms for arterial input function estimation (repeated-measures ANOVA, P < .001). Greater heterogeneity was observed in the optimal TE values for high-grade gliomas, and mean values of all 3 ROIs were statistically significant. The optimal TE for the arterial input function estimation is much shorter; this finding implies that quantitative DSC MR imaging acquisitions would benefit from multiecho acquisitions. In the case of a single-echo acquisition, the optimal TE prescribed should be 30-35 ms (without a preload) and 20-30 ms (with a standard full-dose preload). © 2017 by American Journal of Neuroradiology.

  11. Operation Sun Beam, Shot Small Boy. Project Officers report. Project 1. 9. Crater measurements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rooke, A.D.; Davis, L.K.; Strange, J.N.

    1985-09-01

    The objectives of Project 1.9 were to obtain the dimensions of the apparent and true craters formed by the Small Boy event and to measure the permanent earth deformation occurring beyond the true crater boundary. Measurements were made of the apparent crater by aerial stereophotography and ground survey and of the true crater and subsurface zones of residual deformation by the excavation and mapping of an array of vertical, colored sand columns which were placed along one crater diameter prior to the shot. The results of the crater exploration are discussed, particularly the permanent compression of the medium beneath themore » true crater which was responsible for the major portion of the apparent and true crater volumes. Apparent and true crater dimensions are compared with those of previous cratering events.« less

  12. Shot-to-shot reproducibility of a self-magnetically insulated ion diode.

    PubMed

    Pushkarev, A I; Isakova, Yu I; Khailov, I P

    2012-07-01

    In this paper we present the analysis of shot to shot reproducibility of the ion beam which is formed by a self-magnetically insulated ion diode with an explosive emission graphite cathode. The experiments were carried out with the TEMP-4M accelerator operating in double-pulse mode: the first pulse is of negative polarity (300-500 ns, 100-150 kV), and this is followed by a second pulse of positive polarity (150 ns, 250-300 kV). The ion current density was 10-70 A/cm(2) depending on the diode geometry. The beam was composed from carbon ions (80%-85%) and protons. It was found that shot to shot variation in the ion current density was about 35%-40%, whilst the diode voltage and current were comparatively stable with the variation limited to no more than 10%. It was shown that focusing of the ion beam can improve the stability of the ion current generation and reduces the variation to 18%-20%. In order to find out the reason for the shot-to-shot variation in ion current density we examined the statistical correlation between the current density of the accelerated beam and other measured characteristics of the diode, such as the accelerating voltage, total current, and first pulse duration. The correlation between the ion current density measured simultaneously at different positions within the cross-section of the beam was also investigated. It was shown that the shot-to-shot variation in ion current density is mainly attributed to the variation in the density of electrons diffusing from the drift region into the A-K gap.

  13. Effects of Laser Peening, and Shot Peening, on Friction Stir Welding

    NASA Technical Reports Server (NTRS)

    Hatamleh, Omar; Hackel, Lloyd; Rankin, Jon; Truong, Chanh; Walter, Matt

    2006-01-01

    A viewgraph presentation describing the effects of laser peening and shot peening on friction stir welding is shown. The topics include: 1) Background; 2) Friction Stir Welding (FSW); 3) Microstructure; 4) Laser & Shot Peening; 5) Residual Stresses; 6) Tensile Behavior; 7) Fatigue Life & Surface Roughness; 8) Crack Growth; and 9) Benefits.

  14. Establishing a Cyber Warrior Force

    DTIC Science & Technology

    2004-09-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically

  15. Cyber dating abuse among teens using school-based health centers.

    PubMed

    Dick, Rebecca N; McCauley, Heather L; Jones, Kelley A; Tancredi, Daniel J; Goldstein, Sandi; Blackburn, Samantha; Monasterio, Erica; James, Lisa; Silverman, Jay G; Miller, Elizabeth

    2014-12-01

    To estimate the prevalence of cyber dating abuse among youth aged 14 to 19 years seeking care at school-based health centers and associations with other forms of adolescent relationship abuse (ARA), sexual violence, and reproductive and sexual health indicators. A cross-sectional survey was conducted during the 2012-2013 school year (participant n = 1008). Associations between cyber dating abuse and study outcomes were assessed via logistic regression models for clustered survey data. Past 3-month cyber dating abuse was reported by 41.4% of this clinic-based sample. More female than male participants reported cyber dating abuse victimization (44.6% vs 31.0%). Compared with no exposure, low- ("a few times") and high-frequency ("once or twice a month" or more) cyber dating abuse were significantly associated with physical or sexual ARA (low: adjusted odds ratio [aOR] 2.8, 95% confidence interval [CI] 1.8-4.4; high: aOR 5.4, 95% CI 4.0-7.5) and nonpartner sexual assault (low: aOR 2.7, 95% CI 1.3-5.5; high: aOR 4.1, 95% CI 2.8-5.9). Analysis with female participants found an association between cyber dating abuse exposure and contraceptive nonuse (low: aOR 1.8, 95% CI 1.2-2.7; high: aOR 4.1, 95% CI 2.0-8.4) and reproductive coercion (low: aOR 3.0, 95% CI 1.4-6.2; high: aOR 5.7, 95% CI 2.8-11.6). Cyber dating abuse is common and associated with ARA and sexual assault in an adolescent clinic-based sample. The associations of cyber dating abuse with sexual behavior and pregnancy risk behaviors suggest a need to integrate ARA education and harm reduction counseling into sexual health assessments in clinical settings. Copyright © 2014 by the American Academy of Pediatrics.

  16. Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning

    ERIC Educational Resources Information Center

    Ge, Zi-Gang

    2012-01-01

    This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…

  17. Some of Indonesian Cyber Law Problems

    NASA Astrophysics Data System (ADS)

    Machmuddin, D. D.; Pratama, B.

    2017-01-01

    Cyber regulation is very important to control human interaction within the Internet network in cyber space. On the surface, innovation development in science and technology facilitates human activity. But on the inside, innovation was controlled by new business model. In cyber business activities mingle with individual protection. By this condition, the law should keep the balance of the activities. Cyber law problems, were not particular country concern, but its global concern. This is a good opportunity for developing country to catch up with developed country. Beside this opportunity for talented people in law and technology is become necessity. This paper tries to describe cyber law in Indonesia. As a product of a developing country there are some of weakness that can be explained. Terminology and territory of cyber space is become interesting to discuss, because this two problems can give a broad view on cyber law in Indonesia.

  18. Finding the gap: An empirical study of the most effective shots in elite goalball.

    PubMed

    Link, Daniel; Weber, Christoph

    2018-01-01

    This research identifies which shots types in goalball are most likely to lead to a goal and herby provides background information for improving training and competition. Therefore, we observed 117 elite level matches including 20,541 shots played in the regular situation (3 vs. 3) using notational analysis. We characterized the shots by using their target sector (A-E), technique (traditional, rotation), trajectory (flat, bounce), angle (straight, diagonal and outcome (goal, violation, out, blocked). In our data, a χ2-test showed a significantly higher goal rate for men (3.9%) compared to women (3.0%). For men, we found a significantly higher goal rate in the intersection sectors between players C (5.6%), D (4.9%), and in the outer sector A. In sector A, goal rate was higher only for straight shots (6.6%). Technique and trajectory did not affect goal rate for men, but flat shots showed a higher violation rate (3.2%) compared to bounce shouts (2.0%). In women's goalball, goal rate was higher only on sector D (4.4%). Bounce-rotation shots were the most successful (5.5%). We conclude that men should focus on shots to sectors C and D (called pocket) and straight shots to sector A, as long as there are no other tactical considerations. Women should shoot primarily towards the pocket. It might also be worth playing more bounce-rotation shots and practicing them in training.

  19. Finding the gap: An empirical study of the most effective shots in elite goalball

    PubMed Central

    Weber, Christoph

    2018-01-01

    This research identifies which shots types in goalball are most likely to lead to a goal and herby provides background information for improving training and competition. Therefore, we observed 117 elite level matches including 20,541 shots played in the regular situation (3 vs. 3) using notational analysis. We characterized the shots by using their target sector (A-E), technique (traditional, rotation), trajectory (flat, bounce), angle (straight, diagonal and outcome (goal, violation, out, blocked). In our data, a χ2-test showed a significantly higher goal rate for men (3.9%) compared to women (3.0%). For men, we found a significantly higher goal rate in the intersection sectors between players C (5.6%), D (4.9%), and in the outer sector A. In sector A, goal rate was higher only for straight shots (6.6%). Technique and trajectory did not affect goal rate for men, but flat shots showed a higher violation rate (3.2%) compared to bounce shouts (2.0%). In women's goalball, goal rate was higher only on sector D (4.4%). Bounce-rotation shots were the most successful (5.5%). We conclude that men should focus on shots to sectors C and D (called pocket) and straight shots to sector A, as long as there are no other tactical considerations. Women should shoot primarily towards the pocket. It might also be worth playing more bounce-rotation shots and practicing them in training. PMID:29698479

  20. Multi-shot PROPELLER for high-field preclinical MRI

    PubMed Central

    Pandit, Prachi; Qi, Yi; Story, Jennifer; King, Kevin F.; Johnson, G. Allan

    2012-01-01

    With the development of numerous mouse models of cancer, there is a tremendous need for an appropriate imaging technique to study the disease evolution. High-field T2-weighted imaging using PROPELLER MRI meets this need. The 2-shot PROPELLER technique presented here, provides (a) high spatial resolution, (b) high contrast resolution, and (c) rapid and non-invasive imaging, which enables high-throughput, longitudinal studies in free-breathing mice. Unique data collection and reconstruction makes this method robust against motion artifacts. The 2-shot modification introduced here, retains more high-frequency information and provides higher SNR than conventional single-shot PROPELLER, making this sequence feasible at high-fields, where signal loss is rapid. Results are shown in a liver metastases model to demonstrate the utility of this technique in one of the more challenging regions of the mouse, which is the abdomen. PMID:20572138

  1. Coming Soon: More Cyber Careers?

    Science.gov Websites

    exploring the possibility of creating a cyber career field for Army civilians," Lt. Gen. Edward C Programs and Posture," April 14. Establishing a cyber career management field for civilians may be working to implement a cyber career management field for enlisted personnel that will encompass accessions

  2. Mapping developmental precursors of cyber-aggression: trajectories of risk predict perpetration and victimization.

    PubMed

    Modecki, Kathryn L; Barber, Bonnie L; Vernon, Lynette; Vernon, Lynnette

    2013-05-01

    Technologically mediated contexts are social arenas in which adolescents can be both perpetrators and victims of aggression. Yet, there remains little understanding of the developmental etiology of cyber aggression, itself, as experienced by either perpetrators or victims. The current study examines 3-year latent within-person trajectories of known correlates of cyber-aggression: problem behavior, (low) self-esteem, and depressed mood, in a large and diverse sample of youth (N = 1,364; 54.6% female; 12-14 years old at T1). Findings demonstrate that developmental increases in problem behavior across grades 8-10 predict both cyber-perpetration and victimization in grade 11. Developmental decreases in self-esteem also predicted both grade 11 perpetration and victimization. Finally, early depressed mood predicted both perpetration and victimization later on, regardless of developmental change in depressed mood in the interim. Our results reveal a clear link between risky developmental trajectories across the early high school years and later cyber-aggression and imply that mitigating trajectories of risk early on may lead to decreases in cyber-aggression at a later date.

  3. Preoperative detection of malignant liver tumors: Comparison of 3D-T2-weighted sequences with T2-weighted turbo spin-echo and single shot T2 at 1.5 T.

    PubMed

    Barat, Maxime; Soyer, Philippe; Dautry, Raphael; Pocard, Marc; Lo-Dico, Rea; Najah, Haythem; Eveno, Clarisse; Cassinotto, Christophe; Dohan, Anthony

    2018-03-01

    To assess the performances of three-dimensional (3D)-T2-weighted sequences compared to standard T2-weighted turbo spin echo (T2-TSE), T2-half-Fourier acquisition single-shot turbo spin-echo (T2-HASTE), diffusion weighted imaging (DWI) and 3D-T1-weighted VIBE sequences in the preoperative detection of malignant liver tumors. From 2012 to 2015, all patients of our institution undergoing magnetic resonance imaging (MRI) examination for suspected malignant liver tumors were prospectively included. Patients had contrast-enhanced 3D-T1-weighted, DWI, 3D-T2-SPACE, T2-HASTE and T2-TSE sequences. Imaging findings were compared with those obtained at follow-up, surgery and histopathological analysis. Sensitivities for the detection of malignant liver tumors were compared for each sequence using McNemar test. A subgroup analysis was conducted for HCCs. Image artifacts were analyzed and compared using Wilcoxon paired signed rank-test. Thirty-three patients were included: 13 patients had 40 hepatocellular carcinomas (HCC) and 20 had 54 liver metastases. 3D-T2-weighted sequences had a higher sensitivity than T2-weighted TSE sequences for the detection of malignant liver tumors (79.8% versus 68.1%; P < 0.001). The difference did not reach significance for HCC. T1-weighted VIBE and DWI had a higher sensitivity than T2-weighted sequences. 3D-T2-weighted-SPACE sequences showed significantly less artifacts than T2-weitghted TSE. 3D-T2-weighted sequences show very promising performances for the detection of liver malignant tumors compared to T2-weighted TSE sequences. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Cyber Power in the 21st Century

    DTIC Science & Technology

    2008-12-01

    Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in

  5. Indirect monitoring shot-to-shot shock waves strength reproducibility during pump-probe experiments

    NASA Astrophysics Data System (ADS)

    Pikuz, T. A.; Faenov, A. Ya.; Ozaki, N.; Hartley, N. J.; Albertazzi, B.; Matsuoka, T.; Takahashi, K.; Habara, H.; Tange, Y.; Matsuyama, S.; Yamauchi, K.; Ochante, R.; Sueda, K.; Sakata, O.; Sekine, T.; Sato, T.; Umeda, Y.; Inubushi, Y.; Yabuuchi, T.; Togashi, T.; Katayama, T.; Yabashi, M.; Harmand, M.; Morard, G.; Koenig, M.; Zhakhovsky, V.; Inogamov, N.; Safronova, A. S.; Stafford, A.; Skobelev, I. Yu.; Pikuz, S. A.; Okuchi, T.; Seto, Y.; Tanaka, K. A.; Ishikawa, T.; Kodama, R.

    2016-07-01

    We present an indirect method of estimating the strength of a shock wave, allowing on line monitoring of its reproducibility in each laser shot. This method is based on a shot-to-shot measurement of the X-ray emission from the ablated plasma by a high resolution, spatially resolved focusing spectrometer. An optical pump laser with energy of 1.0 J and pulse duration of ˜660 ps was used to irradiate solid targets or foils with various thicknesses containing Oxygen, Aluminum, Iron, and Tantalum. The high sensitivity and resolving power of the X-ray spectrometer allowed spectra to be obtained on each laser shot and to control fluctuations of the spectral intensity emitted by different plasmas with an accuracy of ˜2%, implying an accuracy in the derived electron plasma temperature of 5%-10% in pump-probe high energy density science experiments. At nano- and sub-nanosecond duration of laser pulse with relatively low laser intensities and ratio Z/A ˜ 0.5, the electron temperature follows Te ˜ Ilas2/3. Thus, measurements of the electron plasma temperature allow indirect estimation of the laser flux on the target and control its shot-to-shot fluctuation. Knowing the laser flux intensity and its fluctuation gives us the possibility of monitoring shot-to-shot reproducibility of shock wave strength generation with high accuracy.

  6. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  7. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  8. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    DTIC Science & Technology

    2015-05-01

    personas. Only then can cyber strategists exercise the required amount of cultural relativism needed to influence complex, and sometimes disturbing...that runs counter to their professional ethic ? When cyber tribes employ atrocity to create cultural barriers, how will planners remain focused on...as a cyber actor’s motivation? Meeting these challenges requires new levels of cultural relativism —the understanding of a “culture or a cultural

  9. A Study on the Defensive Stance and Position of Handball Goalkeepers: Facing a Forward Jump Shot Made from 9 Meters.

    PubMed

    Yang, Jong Hyun; Lee, Young Suk

    2016-10-01

    The purpose of this study was to find the defensive stance and calculate an optimal defense position for goalkeepers while blocking forward jump shots made from a distance of 9 m. Nine men's handball matches were recorded and 78 video clips were selected for analysis. These are the top class goalkeepers, which included players from the national team and reserve team of Korea. The goalkeeper's actual defensive position was significantly different from instructional suggestions; the width of both feet of the goalkeeper was approximately 2.5 times the width of the shoulders, and the hands were at waist height. The goalkeeper's actual defense position was about 1.10 (± 0.3) m from the goal line and also significantly different than instructional material (0.75 m). The optimal defense position, which was calculated from the goalkeeper's actual movement, was 1.44 m from the goal line, because the ratio of goalkeeper's defensive area in relation to the total area to be defended is highest at this point. In summary, we recommended that handball goalkeepers move forward, about a half step (0.34 m), when defending a forward jump shot made from 9 m, and instructional material should be modified according to the findings from this study.

  10. Human Capital Development - Resilient Cyber Physical Systems

    DTIC Science & Technology

    2017-09-29

    Human Capital Development – Resilient Cyber Physical Systems Technical Report SERC-2017-TR-113 September 29, 2017 Principal Investigator...4.2.2 Cyber Attack Taxonomy for Cyber Physical Systems .............................................................................. 43 4.2.3...Cyber- physical System Attack Taxonomy ................................................................................................ 44 4.2.4

  11. Offensive Cyber Capability: Can it Reduce Cyberterrorism

    DTIC Science & Technology

    2010-12-02

    33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science

  12. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  13. Using persuasive messages to encourage hunters to support regulation of lead shot

    USGS Publications Warehouse

    Schroeder, Susan A.; Fulton, David C.; Penning, William; Doncarlos, Kathy

    2012-01-01

    Lead shot from hunting adds the toxic metal to environments worldwide. The United States banned lead shot for hunting waterfowl in 1991 and 26 states have lead shot restrictions beyond those mandated for waterfowl hunting. The Minnesota Department of Natural Resources (MDNR) was interested in studying hunter attitudes about expanded restrictions on the use of lead shot for hunting small game to understand what communication strategies might increase public support for potential restrictions on lead shot. We mailed messages about lead shot, including 1,200 control messages and 400 of each of 9 treatment messages, and surveys to 4,800 resident small game hunters. We compared attitudes and intentions related to a possible ban among control and treatment groups. Compared to the control message, all treatment messages elicited more positive attitudes and intentions to support a ban. A basic factual message, messages with references to Ducks Unlimited, and a first-person narrative message generated the strongest support for a ban. Results also demonstrated a substantial relationship between the use of lead shot and response to persuasive messages supporting a ban.

  14. Design and long-term monitoring of DSC/CIGS tandem solar module

    NASA Astrophysics Data System (ADS)

    Vildanova, M. F.; Nikolskaia, A. B.; Kozlov, S. S.; Shevaleevskiy, O. I.

    2015-11-01

    This paper describes the design and development of tandem dye-sensitized/Cu(In, Ga)Se (DSC/CIGS) PV modules. The tandem PV module comprised of the top DSC module and a bottom commercial 0,8 m2 CIGS module. The top DSC module was made of 10 DSC mini-modules with the field size of 20 × 20 cm2 each. Tandem DSC/CIGS PV modules were used for providing the long-term monitoring of energy yield and electrical parameters in comparison with standalone CIGS modules under outdoor conditions. The outdoor test facility, containing solar modules of both types and a measurement unit, was located on the roof of the Institute of Biochemical Physics in Moscow. The data obtained during monitoring within the 2014 year period has shown the advantages of the designed tandem DSC/CIGS PV-modules over the conventional CIGS modules, especially for cloudy weather and low-intensity irradiation conditions.

  15. Shot-to-shot reproducibility of a self-magnetically insulated ion diode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pushkarev, A. I.; Isakova, Yu. I.; Khailov, I. P.

    In this paper we present the analysis of shot to shot reproducibility of the ion beam which is formed by a self-magnetically insulated ion diode with an explosive emission graphite cathode. The experiments were carried out with the TEMP-4M accelerator operating in double-pulse mode: the first pulse is of negative polarity (300-500 ns, 100-150 kV), and this is followed by a second pulse of positive polarity (150 ns, 250-300 kV). The ion current density was 10-70 A/cm{sup 2} depending on the diode geometry. The beam was composed from carbon ions (80%-85%) and protons. It was found that shot to shotmore » variation in the ion current density was about 35%-40%, whilst the diode voltage and current were comparatively stable with the variation limited to no more than 10%. It was shown that focusing of the ion beam can improve the stability of the ion current generation and reduces the variation to 18%-20%. In order to find out the reason for the shot-to-shot variation in ion current density we examined the statistical correlation between the current density of the accelerated beam and other measured characteristics of the diode, such as the accelerating voltage, total current, and first pulse duration. The correlation between the ion current density measured simultaneously at different positions within the cross-section of the beam was also investigated. It was shown that the shot-to-shot variation in ion current density is mainly attributed to the variation in the density of electrons diffusing from the drift region into the A-K gap.« less

  16. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  17. Spiral MRI on a 9.4T Vertical-bore Superconducting Magnet Using Unshielded and Self-shielded Gradient Coils

    PubMed Central

    Kodama, Nao; Setoi, Ayana; Kose, Katsumi

    2018-01-01

    Spiral MRI sequences were developed for a 9.4T vertical standard bore (54 mm) superconducting magnet using unshielded and self-shielded gradient coils. Clear spiral images with 64-shot scan were obtained with the self-shielded gradient coil, but severe shading artifacts were observed for the spiral-scan images acquired with the unshielded gradient coil. This shading artifact was successfully corrected with a phase-correction technique using reference scans that we developed based on eddy current field measurements. We therefore concluded that spiral imaging sequences can be installed even for unshielded gradient coils if phase corrections are performed using the reference scans. PMID:28367906

  18. Short Shot Tower for Silicon

    NASA Technical Reports Server (NTRS)

    Bates, H. E.; Hill, D. M.; Jewett, D. N.

    1983-01-01

    Drop length necessary to convert molten silicon to shot reduced by proposed new process. Conversion of silicon from powder or chunks to shot often simplifies processing. Shot is more easily handled in most processing equipment. Drops of liquid silicon fall through protective cloud of argon, then through rapidly cooling bath of methanol, where they quickly turn into solid shot.

  19. DRDC Support to Exercise Cyber Storm III

    DTIC Science & Technology

    2011-10-01

    d’intervention fédéraux portant sur les incidents cybernétiques sont encore relativement peu élaborés et insuffisamment développés et un examen des plans examinés...9 2.7 CSIII Ethics Protocol...30 Annex C .. Exercise Cyber Storm III Ethics

  20. Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations

    NASA Technical Reports Server (NTRS)

    Melson, N. D.; Keller, J. D.

    1983-01-01

    Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.

  1. Fluorescence correlation spectroscopy, Raster image correlation spectroscopy and Number & Brightness on a commercial confocal laser scanning microscope with analog detectors (Nikon C1)

    PubMed Central

    Moens, Pierre D.J.; Gratton, Enrico; Salvemini, Iyrri L.

    2010-01-01

    Fluorescence correlation spectroscopy (FCS) was developed in 1972 by Magde, Elson and Webb (Magde et al., 1972). Photon counting detectors and avalanche photodiodes have become standards in FCS to the point that there is a widespread belief that these detectors are essential to perform FCS experiments, despite the fact that FCS was developed using analog detectors. Spatial and temporal intensity fluctuation correlations using analog detection on a commercial Olympus Fluoview 300 microscope has been reported by Brown et al. (2008). However, each analog instrument has its own idiosyncrasies that need to be understood before using the instrument for FCS. In this work we explore the capabilities of the Nikon C1, a low cost confocal microscope, to obtain single point FCS, Raster-scan Image Correlation Spectroscopy (RICS) and Number & Brightness data both in solution and incorporated into the membrane of Giant Unilamellar Vesicles (GUVs). We show that it is possible to obtain dynamic information about fluorescent molecules from single point FCS, RICS and Number & Brightness using the Nikon C1. We highlighted the fact that care should be taken in selecting the acquisition parameters in order to avoid possible artifacts due to the detector noise. However, due to relatively large errors in determining the distribution of digital levels for a given microscope setting, the system is probably only adequate for determining relative brightness within the same image. PMID:20734406

  2. Cyber-Herding and Cyber Activism: Countering Qutbists on the Internet

    DTIC Science & Technology

    2007-12-01

    13 f. Phase 6, Concentrate Web Sites ..........14 g. Phase 7, Develop Darknet ................16 B. CYBER ACTIVISM...continues in Phase 3 with the introduction of web sites owned by the cyber herding program and later on with the introduction of Darknets . The...own doppelganger.) Create several content-rich Darknet environments—a private virtual network where users connect only to people they trust8—that

  3. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  4. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness

  5. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  6. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  7. Special Operations And Cyber Warfare

    DTIC Science & Technology

    2016-12-01

    with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School

  8. Cyber Operations: The New Balance

    DTIC Science & Technology

    2009-01-01

    compelling evidence to suggest that enlight - enment, rather than retrenchment, is the path for cyber New Balance. The economic calamity of the Great...www.guardian.co.uk/ technology /2008/ oct/02/interviews.internet>. 16 Langevin, 11. 17 James Lewis, “Cyber Security Recommen- dations for the Next...Administration,” testimony before House Subcommittee on Emerging Threats, Cyber Security, and Science and Technology , Washington, DC, September 16

  9. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  10. Superpoissonian shot noise in organic magnetic tunnel junctions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cascales, Juan Pedro; Martinez, Isidoro; Aliev, Farkhad G., E-mail: farkhad.aliev@uam.es

    Organic molecules have recently revolutionized ways to create new spintronic devices. Despite intense studies, the statistics of tunneling electrons through organic barriers remains unclear. Here, we investigate conductance and shot noise in magnetic tunnel junctions with 3,4,9,10-perylene-teracarboxylic dianhydride (PTCDA) barriers a few nm thick. For junctions in the electron tunneling regime, with magnetoresistance ratios between 10% and 40%, we observe superpoissonian shot noise. The Fano factor exceeds in 1.5–2 times the maximum values reported for magnetic tunnel junctions with inorganic barriers, indicating spin dependent bunching in tunneling. We explain our main findings in terms of a model which includes tunnelingmore » through a two level (or multilevel) system, originated from interfacial bonds of the PTCDA molecules. Our results suggest that interfaces play an important role in the control of shot noise when electrons tunnel through organic barriers.« less

  11. Longitudinal predictors of cyber and traditional bullying perpetration in Australian secondary school students

    PubMed Central

    Hemphill, Sheryl A.; Kotevski, Aneta; Tollit, Michelle; Smith, Rachel; Herrenkohl, Todd I.; Toumbourou, John W.; Catalano, Richard F.

    2013-01-01

    Purpose Cyber bullying perpetration (using communication technology to engage in bullying) is a recent phenomenon that has generated much concern. There are few prospective longitudinal studies of cyber bullying. The current paper examines the individual, peer, family and school risk factors for both cyber and traditional bullying (the latter is bullying that does not utilize technology) in adolescents. Methods This paper draws on a rich data set from the International Youth Development Study, a longitudinal study of students in Victoria, Australia and Washington State, United States, which began in 2002. In this paper, data from almost 700 Victorian students recruited in Grade 5 is analyzed to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber bullying perpetration in Grade 9 (aged 14-15 years). Results Fifteen per cent of students engaged in cyber bullying, 21% in traditional bullying and 7% in both. There are similarities and important differences in the predictors of cyber and traditional bullying. In the fully adjusted model, only prior engagement in relational aggression (a covert form of bullying such as spreading rumors about another student) predicted cyber bullying perpetration. For traditional bullying, previous relational aggression was also predictive, as was having been a victim and perpetrator of traditional bullying, family conflict, and academic failure. Conclusions The use of evidence-based bullying prevention programs is supported to reduce experiences of all forms of bullying perpetration(cyber, traditional, and relational aggression). In addition, for traditional bullying perpetration, addressing family conflict and student academic support are also important. PMID:22727078

  12. Building An Adaptive Cyber Strategy

    DTIC Science & Technology

    2016-06-01

    forces. The primary mission of the military in any domain, including cyber , should be readiness to exert force if needed during crisis . AU/ACSC/SMITH...of crisis . The military must be able to AU/ACSC/SMITH, FI/AY16 manipulate the cyber environment, but should avoid direct use of force against...operations focus on maintaining a manageable threat level. Cyberspace is a continually evolving domain, and nations throughout the world can join in cyber

  13. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  14. Cyber Operations and Cyber Terrorism

    DTIC Science & Technology

    2005-08-15

    available from http://www.geocities.com/ Area51 /Shadowlands/6583/project395.html; Internet; accessed 14 April 2004. DCSINT Handbook 1.02, Cyber...www.geocities.com/ Area51 /Shadowlands/6583/project395.html; Internet; Accessed 14 April 2004. Raufer, Xavier. “New World Disorder, New

  15. Ignoring a Revolution in Military Affairs: The Need to Create a Separate Branch of the Armed Forces for Cyber Warfare

    DTIC Science & Technology

    2017-06-09

    those with talent in the computer sciences. Upon graduation from high school, computer -proficient teenagers are selected for an elite cyber force and...Arguably, the Massachusetts Institute of Technology (M.I.T.) is the premiere institution for computer science. M.I.T. graduates make, on average, $83,455...study specific to computer science and provide certification in programs like ethical hacking, cyber security, and programing. As with the other

  16. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  17. High-Fidelity Single-Shot Singlet-Triplet Readout of Precision-Placed Donors in Silicon.

    PubMed

    Broome, M A; Watson, T F; Keith, D; Gorman, S K; House, M G; Keizer, J G; Hile, S J; Baker, W; Simmons, M Y

    2017-07-28

    In this work we perform direct single-shot readout of the singlet-triplet states in exchange coupled electrons confined to precision-placed donor atoms in silicon. Our method takes advantage of the large energy splitting given by the Pauli-spin blockaded (2,0) triplet states, from which we can achieve a single-shot readout fidelity of 98.4±0.2%. We measure the triplet-minus relaxation time to be of the order 3 s at 2.5 T and observe its predicted decrease as a function of magnetic field, reaching 0.5 s at 1 T.

  18. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  19. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  20. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  1. Georgia’s Cyber Left Hook

    DTIC Science & Technology

    2009-01-01

    Relations for the Joint Task Force- Global Network Operations (JTF-GNO/ J5 ). He assists in development of cyber policy and strategy for operations and...History (Manchester, U.K: Manchester Univ. Press, 2000), 1. 10. See The Steamship Appam, 243 U.S. 124 (1917). 11. Jeffrey T. G. Kelsey, “ Hacking into...Arrest for Computer Hacking ,” news release, 1 October 2007, http://www.cybercrime.gov/kingIndict.pdf. 39. Grant Gross, “FBI: Several Nations Eyeing U.S

  2. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closelymore » related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.« less

  3. Cyber Victimization and Internalizing Difficulties: The Mediating Roles of Coping Self-Efficacy and Emotion Dysregulation.

    PubMed

    Trompeter, Nora; Bussey, Kay; Fitzpatrick, Sally

    2018-07-01

    Cyber victimization has consistently been associated with internalizing difficulties in adolescents. However, the underlying psychological mechanisms linking this relationship have not been adequately examined. The present study aimed to investigate the mediational roles of coping self-efficacy and emotion dysregulation in the relationships between cyber victimization with depression and social anxiety. Participants were 459 students (199 girls) from independent middle-class schools in grades 8 (M age  = 13 years 9 months) and 10 (M age  = 15 years 7 months). They completed a self-report questionnaire about cyberbullying participation, internalizing symptoms, coping self-efficacy, and emotion dysregulation. Structural equation modeling revealed that most domains of coping self-efficacy and emotion dysregulation partially mediated the relationship between cyber victimization and depression, and fully mediated the relationship between cyber victimization and social anxiety. The results highlight the importance of targeting these mediating factors in intervention programs to reduce the negative impact of cyber victimization on adolescents.

  4. Cyber Friendly Fire: Research Challenges for Security Informatics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less

  5. 100-kHz shot-to-shot broadband data acquisition for high-repetition-rate pump-probe spectroscopy.

    PubMed

    Kanal, Florian; Keiber, Sabine; Eck, Reiner; Brixner, Tobias

    2014-07-14

    Shot-to-shot broadband detection is common in ultrafast pump-probe spectroscopy. Taking advantage of the intensity correlation of subsequent laser pulses improves the signal-to-noise ratio. Finite data readout times of CCD chips in the employed spectrometer and the maximum available speed of mechanical pump-beam choppers typically limit this approach to lasers with repetition rates of a few kHz. For high-repetition (≥ 100 kHz) systems, one typically averages over a larger number of laser shots leading to inferior signal-to-noise ratios or longer measurement times. Here we demonstrate broadband shot-to-shot detection in transient absorption spectroscopy with a 100-kHz femtosecond laser system. This is made possible using a home-built high-speed chopper with external laser synchronization and a fast CCD line camera. Shot-to-shot detection can reduce the data acquisition time by two orders of magnitude compared to few-kHz lasers while keeping the same signal-to-noise ratio.

  6. Semantic Shot Classification in Sports Video

    NASA Astrophysics Data System (ADS)

    Duan, Ling-Yu; Xu, Min; Tian, Qi

    2003-01-01

    In this paper, we present a unified framework for semantic shot classification in sports videos. Unlike previous approaches, which focus on clustering by aggregating shots with similar low-level features, the proposed scheme makes use of domain knowledge of a specific sport to perform a top-down video shot classification, including identification of video shot classes for each sport, and supervised learning and classification of the given sports video with low-level and middle-level features extracted from the sports video. It is observed that for each sport we can predefine a small number of semantic shot classes, about 5~10, which covers 90~95% of sports broadcasting video. With the supervised learning method, we can map the low-level features to middle-level semantic video shot attributes such as dominant object motion (a player), camera motion patterns, and court shape, etc. On the basis of the appropriate fusion of those middle-level shot classes, we classify video shots into the predefined video shot classes, each of which has a clear semantic meaning. The proposed method has been tested over 4 types of sports videos: tennis, basketball, volleyball and soccer. Good classification accuracy of 85~95% has been achieved. With correctly classified sports video shots, further structural and temporal analysis, such as event detection, video skimming, table of content, etc, will be greatly facilitated.

  7. 78 FR 65573 - Migratory Bird Hunting; Application for Approval of Copper-Clad Iron Shot and Fluoropolymer Shot...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... supported approval of the shot and the coatings, and one contained no useful information. Therefore, as... Hunting; Application for Approval of Copper-Clad Iron Shot and Fluoropolymer Shot Coatings as Nontoxic for... environmental assessments. SUMMARY: We, the U.S. Fish and Wildlife Service, approve copper-clad iron shot and...

  8. Operationalizing Army Cyber

    DTIC Science & Technology

    2013-03-01

    killed just under 3,000 people and cost the U.S. economy somewhere between three and five trillion dollars. The Japanese attacked with a state... economy , and military readiness. The challenge is to design an Army Cyber force that can support the United States Cyber Command (USCYBERCOM) national...still keeps the intelligence and signal functions separate in most units today from battalion to echelon above Corps ( EAC ). There are many past reasons

  9. Pages - U.S. Fleet Cyber Command

    Science.gov Websites

    Links Expand Links : U.S. Fleet Cyber Command Help (new window) Site Help Page Content Website 2nd Banner.jpg Since its establishment on Jan. 29, 2010, U.S. Fleet Cyber Command (FCC)/U.S. TENTH Fleet (C10F civilians organized into 26 active commands, 40 Cyber Mission Force units, and 27 reserve commands around

  10. Dynamic half Fourier acquisition, single shot turbo spin-echo magnetic resonance imaging for evaluating the female pelvis.

    PubMed

    Gousse, A E; Barbaric, Z L; Safir, M H; Madjar, S; Marumoto, A K; Raz, S

    2000-11-01

    We assessed the merit of dynamic half Fourier acquisition, single shot turbo spin-echo sequence T2-weighted magnetic resonance imaging (MRI) for evaluating pelvic organ prolapse and all other female pelvic pathology by prospectively correlating clinical with imaging findings. From September 1997 to April 1998, 100 consecutive women 23 to 88 years old with (65) and without (35) pelvic organ prolapse underwent half Fourier acquisition, single shot turbo spin-echo sequence dynamic pelvic T2-weighted MRI at our institution using a 1.5 Tesla magnet with phased array coils. Mid sagittal and parasagittal views with the patient supine, relaxed and straining were obtained using no pre-examination preparation or instrumentation. We evaluated the anterior vaginal wall, bladder, urethra, posterior vaginal wall, rectum, pelvic floor musculature, perineum, uterus, vaginal cuff, ovaries, ureters and intraperitoneal organs for all pathological conditions, including pelvic prolapse. Patients underwent a prospective physical examination performed by a female urologist, and an experienced radiologist blinded to pre-imaging clinical findings interpreted all studies. Physical examination, MRI and intraoperative findings were statistically correlated. Total image acquisition time was 2.5 minutes, room time 10 minutes and cost American $540. Half Fourier acquisition, single shot turbo spin-echo T2-weighted MRI revealed pathological entities other than pelvic prolapse in 55 cases, including uterine fibroids in 11, ovarian cysts in 9, bilateral ureteronephrosis in 3, nabothian cyst in 7, Bartholin's gland cyst in 4, urethral diverticulum in 3, polytetrafluoroethylene graft abscess in 3, bladder diverticulum in 2, sacral spinal abnormalities in 2, bladder tumor in 1, sigmoid diverticulosis in 1 and other in 9. Intraoperative findings were considered the gold standard against which physical examination and MRI were compared. Using these criteria the sensitivity, specificity and positive

  11. 77 FR 59158 - Migratory Bird Hunting; Application for Approval of Copper-Clad Iron Shot and Fluoropolymer Shot...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ... June 20, 2012 (77 FR 36980), and one for the fluoropolymer shot coatings on July 6, 2012 (77 FR 39983... Bird Hunting; Application for Approval of Copper-Clad Iron Shot and Fluoropolymer Shot Coatings as... approve copper-clad iron shot and fluoropolymer coatings for hunting waterfowl and coots. We published a...

  12. SU-F-T-554: Dark Current Effect On CyberKnife Beam Dosimetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kim, H; Chang, A

    Purpose: All RF linear accelerators produce dark current to varying degrees when an accelerating voltage and RF input is applied in the absence of electron gun injection. This study is to evaluate how dark current from the linear accelerator of CyberKnife affect the dose in the reference dosimetry. Methods: The G4 CyberKnife system with 6MV photon beam was used in this study. Using the ion chamber and the diode detector, the dose was measured in water with varying time delay between acquiring charges and staring beam-on after applying high-voltage into the linear accelerator. The dose was measured after the timemore » delay with over the range of 0 to 120 seconds in the accelerating high-voltage mode without beam-on, applying 0, 10, 50, 100, and 200 MUs. For the measurements, the collimator of 60 mm was used and the detectors were placed at the depths of 10 cm with the source-to-surface distance of 80 cm. Results: The dark current was constant over time regardless of MU. The dose due to the dark current increased over time linearly with the R-squared value of 0.9983 up to 4.4 cGy for the time 120 seconds. In the dose rate setting of 720 MU/min, the relative dose when applying the accelerating voltage without beam-on was increased over time up to 0.6% but it was less than the leakage radiation resulted from the accelerated head. As the reference dosimetry condition, when 100 MU was delivered after 10 seconds time delay, the relative dose increased by 0.7% but 6.7% for the low MU (10 MU). Conclusion: In the dosimetry using CyberKnife system, the constant dark current affected to the dose. Although the time delay in the accelerating high-voltage mode without beam-on is within 10 seconds, the dose less than 100 cGy can be overestimated more than 1%.« less

  13. 50 CFR 20.134 - Nontoxic shot.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... relevant data, predicting the toxic effect in waterfowl of complete erosion and absorption of one shot or... pellet of lead shot. Dose one group (8 males and 8 females) with eight size No. 4 pellets of steel shot...) and provide commercial breeder mash. Dosing of the 3 groups with one pellet of No. 4 lead shot...

  14. 50 CFR 20.134 - Nontoxic shot.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... relevant data, predicting the toxic effect in waterfowl of complete erosion and absorption of one shot or... pellet of lead shot. Dose one group (8 males and 8 females) with eight size No. 4 pellets of steel shot...) and provide commercial breeder mash. Dosing of the 3 groups with one pellet of No. 4 lead shot...

  15. 50 CFR 20.134 - Nontoxic shot.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... relevant data, predicting the toxic effect in waterfowl of complete erosion and absorption of one shot or... pellet of lead shot. Dose one group (8 males and 8 females) with eight size No. 4 pellets of steel shot...) and provide commercial breeder mash. Dosing of the 3 groups with one pellet of No. 4 lead shot...

  16. 50 CFR 20.134 - Nontoxic shot.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... relevant data, predicting the toxic effect in waterfowl of complete erosion and absorption of one shot or... pellet of lead shot. Dose one group (8 males and 8 females) with eight size No. 4 pellets of steel shot...) and provide commercial breeder mash. Dosing of the 3 groups with one pellet of No. 4 lead shot...

  17. ARMY CYBER STRUCTURE ALIGNMENT

    DTIC Science & Technology

    2016-02-16

    Director of Navy Staff Vice Admiral J. M. Bird , Missions, Functions, and Tasks of Commander, U.S. Fleet Cyber Command and Commander, U.S. Tenth Fleet...www.doncio.navy.mil/ContentView.aspx?ID=649. Director of Navy Staff Vice Admiral J. M. Bird , Missions, Functions, and Tasks of Commander, U.S. Fleet Cyber

  18. Addressing Human Factors Gaps in Cyber Defense

    DTIC Science & Technology

    2016-09-23

    Factors Gaps in Cyber Defense 5a. CONTRACT NUMBER FA8650-14-D-6501-0009 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Alex... Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...currently available work often focuses solely on technological aspects of cyber , acknowledging the human in passing, if at all. In recent years, the

  19. Combining Diffusion Tensor Metrics and DSC Perfusion Imaging: Can It Improve the Diagnostic Accuracy in Differentiating Tumefactive Demyelination from High-Grade Glioma?

    PubMed

    Hiremath, S B; Muraleedharan, A; Kumar, S; Nagesh, C; Kesavadas, C; Abraham, M; Kapilamoorthy, T R; Thomas, B

    2017-04-01

    Tumefactive demyelinating lesions with atypical features can mimic high-grade gliomas on conventional imaging sequences. The aim of this study was to assess the role of conventional imaging, DTI metrics ( p:q tensor decomposition), and DSC perfusion in differentiating tumefactive demyelinating lesions and high-grade gliomas. Fourteen patients with tumefactive demyelinating lesions and 21 patients with high-grade gliomas underwent brain MR imaging with conventional, DTI, and DSC perfusion imaging. Imaging sequences were assessed for differentiation of the lesions. DTI metrics in the enhancing areas and perilesional hyperintensity were obtained by ROI analysis, and the relative CBV values in enhancing areas were calculated on DSC perfusion imaging. Conventional imaging sequences had a sensitivity of 80.9% and specificity of 57.1% in differentiating high-grade gliomas ( P = .049) from tumefactive demyelinating lesions. DTI metrics ( p : q tensor decomposition) and DSC perfusion demonstrated a statistically significant difference in the mean values of ADC, the isotropic component of the diffusion tensor, the anisotropic component of the diffusion tensor, the total magnitude of the diffusion tensor, and rCBV among enhancing portions in tumefactive demyelinating lesions and high-grade gliomas ( P ≤ .02), with the highest specificity for ADC, the anisotropic component of the diffusion tensor, and relative CBV (92.9%). Mean fractional anisotropy values showed no significant statistical difference between tumefactive demyelinating lesions and high-grade gliomas. The combination of DTI and DSC parameters improved the diagnostic accuracy (area under the curve = 0.901). Addition of a heterogeneous enhancement pattern to DTI and DSC parameters improved it further (area under the curve = 0.966). The sensitivity increased from 71.4% to 85.7% after the addition of the enhancement pattern. DTI and DSC perfusion add profoundly to conventional imaging in differentiating tumefactive

  20. A cyber-event correlation framework and metrics

    NASA Astrophysics Data System (ADS)

    Kang, Myong H.; Mayfield, Terry

    2003-08-01

    In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated metrics, can be used to guide assessment of our existing cyber-defense capabilities, and to help evaluate the state of cyber-event correlation research and where we must focus our future cyber-event correlation research. The framework, based on the cyber-event gathering activities and analysis functions, consists of five operational steps, each of which provides a richer set of contextual information to support greater situational understanding. The first three steps are categorically depicted as increasingly richer and broader-scoped contexts achieved through correlation activity, while in the final two steps, these richer contexts are achieved through analytical activities (situation assessment, and threat analysis & prediction). Category 1 Correlation focuses on the detection of suspicious activities and the correlation of events from a single cyber-event source. Category 2 Correlation clusters the same or similar events from multiple detectors that are located at close proximity and prioritizes them. Finally, the events from different time periods and event sources at different location/regions are correlated at Category 3 to recognize the relationship among different events. This is the category that focuses on the detection of large-scale and coordinated attacks. The situation assessment step (Category 4) focuses on the assessment of cyber asset damage and the analysis of the impact on missions. The threat analysis and prediction step (Category 5) analyzes attacks based on attack traces and predicts the next steps. Metrics that can distinguish correlation and cyber-situation assessment tools for each category are also proposed.

  1. Space and Cyber: Shared Challenges, Shared Opportunities

    DTIC Science & Technology

    2011-11-15

    adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue

  2. Shot Group Statistics for Small Arms Applications

    DTIC Science & Technology

    2017-06-01

    standard deviation. Analysis is presented as applied to one , n-round shot group and then is extended to treat multiple, n-round shot groups. A...dispersion measure for multiple, n-round shot groups can be constructed by selecting one of the dispersion measures listed above, measuring the dispersion of...as applied to one , n-round shot group and then is extended to treat multiple, n-round shot groups. A dispersion measure for multiple, n- round shot

  3. Protecting Networks Via Automated Defense of Cyber Systems

    DTIC Science & Technology

    2016-09-01

    autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our

  4. 47 CFR 80.359 - Frequencies for digital selective calling (DSC).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Frequencies for digital selective calling (DSC... for digital selective calling (DSC). (a) General purpose calling. The following table describes the... Digital Selective-Calling Equipment in the Maritime Mobile Service,” with Annexes 1 through 5, 2004, and...

  5. High-Fidelity Single-Shot Toffoli Gate via Quantum Control.

    PubMed

    Zahedinejad, Ehsan; Ghosh, Joydip; Sanders, Barry C

    2015-05-22

    A single-shot Toffoli, or controlled-controlled-not, gate is desirable for classical and quantum information processing. The Toffoli gate alone is universal for reversible computing and, accompanied by the Hadamard gate, forms a universal gate set for quantum computing. The Toffoli gate is also a key ingredient for (nontopological) quantum error correction. Currently Toffoli gates are achieved by decomposing into sequentially implemented single- and two-qubit gates, which require much longer times and yields lower overall fidelities compared to a single-shot implementation. We develop a quantum-control procedure to construct a single-shot Toffoli gate for three nearest-neighbor-coupled superconducting transmon systems such that the fidelity is 99.9% and is as fast as an entangling two-qubit gate under the same realistic conditions. The gate is achieved by a nongreedy quantum control procedure using our enhanced version of the differential evolution algorithm.

  6. Shot-noise evidence of fractional quasiparticle creation in a local fractional quantum Hall state.

    PubMed

    Hashisaka, Masayuki; Ota, Tomoaki; Muraki, Koji; Fujisawa, Toshimasa

    2015-02-06

    We experimentally identify fractional quasiparticle creation in a tunneling process through a local fractional quantum Hall (FQH) state. The local FQH state is prepared in a low-density region near a quantum point contact in an integer quantum Hall (IQH) system. Shot-noise measurements reveal a clear transition from elementary-charge tunneling at low bias to fractional-charge tunneling at high bias. The fractional shot noise is proportional to T(1)(1-T(1)) over a wide range of T(1), where T(1) is the transmission probability of the IQH edge channel. This binomial distribution indicates that fractional quasiparticles emerge from the IQH state to be transmitted through the local FQH state. The study of this tunneling process enables us to elucidate the dynamics of Laughlin quasiparticles in FQH systems.

  7. Confronting the Pedagogical Challenge of Cyber Safety

    ERIC Educational Resources Information Center

    Hanewald, Ria

    2008-01-01

    Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence…

  8. Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)

    DTIC Science & Technology

    2012-05-04

    relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to

  9. Cyber Incidents Involving Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information

  10. The shot noise thermometer

    NASA Astrophysics Data System (ADS)

    Spietz, Lafe Frederick

    This thesis describes the development and testing of the shot noise thermometer, or SNT, a new kind of noise thermometer based on the combined thermal and shot noise of a tunnel junction in the non-superconducting state. In the shot noise thermometer, the noise power from a tunnel junction is measured as a function of the DC voltage across the junction, and the temperature is determined from the voltage dependence of the noise. This voltage dependence follows directly from the Fermi statistics of electrons in a metal, and is independent of the gain or noise temperature of the microwave amplifiers and detector used to measure the noise. Since the shot noise thermometer requires no calibration from an external temperature standard, it is a primary thermometer. In this thesis I demonstrate the operation of the shot noise thermometer over four orders of magnitude in temperature, from the base temperature of a dilution refrigerator to room temperature. Because of its wide range and the fact that it requires no outside calibration (it is a primary thermometer), the SNT is useful as a thermometer for general use in dilution refrigerators. In addition, the shot noise thermometer has sufficient accuracy to be useful as a potential temperature standard. This thesis discusses both of these applications as well as basic physics questions about the operation of the SNT and prospects for future development of the SNT technology.

  11. Gamification for Measuring Cyber Security Situational Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporatesmore » augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.« less

  12. Cyber Security and Resilient Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and

  13. Dynamic susceptibility contrast-enhanced perfusion MR imaging at 1.5 T predicts final infarct size in a rat stroke model.

    PubMed

    Chen, Feng; Suzuki, Yasuhiro; Nagai, Nobuo; Peeters, Ronald; Marchal, Guy; Ni, Yicheng

    2005-01-30

    The purpose of the present animal experiment was to determine whether source images from dynamic susceptibility contrast-enhanced perfusion weighted imaging (DSC-PWI) at a 1.5T MR scanner, performed early after photochemically induced thrombosis (PIT) of cerebral middle artery (MCA), is feasible to predict final cerebral infarct size in a rat stroke model. Fifteen rats were subjected to PIT of proximal MCA. T2 weighted imaging (T2WI), diffusion-weighted imaging (DWI), and contrast-enhanced PWI were obtained at 1 h and 24 h after MCA occlusion. The relative lesion size (RLS) was defined as lesion volume/brain volume x 100% and measured for MR images, and compared with the final RLS on the gold standard triphenyl tetrazolium chloride (TTC) staining at 24 h. One hour after MCA occlusion, the RLS with DSC-PWI was 24.9 +/- 6.3%, which was significantly larger than 17.6 +/- 4.8% with DWI (P < 0.01). At 24 h, the final RLS on TTC was 24.3 +/- 4.8%, which was comparable to 25.1 +/- 3.5%, 24.6 +/- 3.6% and 27.9 +/- 6.8% with T2WI, DWI and DSC-PWI respectively (P > 0.05). The fact that at 1 h after MCA occlusion only the displayed perfusion deficit was similar to the final infarct size on TTC (P > 0.05) suggests that early source images from DSC-PWI at 1.5T MR scanner is feasible to noninvasively predict the final infarct size in rat models of stroke.

  14. 7 CFR 1710.114 - TIER, DSC, OTIER and ODSC requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 11 2011-01-01 2011-01-01 false TIER, DSC, OTIER and ODSC requirements. 1710.114... AND GUARANTEES Loan Purposes and Basic Policies § 1710.114 TIER, DSC, OTIER and ODSC requirements. (a) General. Requirements for coverage ratios are set forth in the borrower's mortgage, loan contract, or...

  15. Use and Perceptions of Caffeinated Energy Drinks and Energy Shots in Canada.

    PubMed

    Wiggers, Danielle; Reid, Jessica L; White, Christine M; Hammond, David

    2017-12-01

    In Canada, energy drinks and energy shots are currently classified and regulated differently (food and drugs versus natural health products, respectively), on the assumption that they are used and perceived differently. The current study examined potential differences in use and perceptions of energy drinks and shots. An online survey was conducted in 2015 using a national commercial online panel of youth and young adults aged 12-24 years (n=2,040 retained for analysis in 2016). Participants were randomized to view an image of an energy shot or drink, and were asked about 14 potential reasons for using the product. Past consumption of each product was also assessed. Chi-square and t-tests were conducted to examine differences in use and perceptions between products. Overall, 15.6% of respondents reported using both energy shots and drinks. Of all respondents, <1% had tried only energy shots, whereas 58.0% had tried only energy drinks. For each product, the most commonly reported reasons for use were "to stay awake" and "to increase concentration or alertness." Out of 14 potential reasons for use, respondents were significantly more likely to endorse seven of the reasons for energy drinks rather than shots; however, the magnitude of these differences was modest and the ordering of the reasons for use of each product was comparable. Despite differences in prevalence of ever-use of energy shots and drinks, consumption patterns and perceived reasons for using the products are similar. The findings provide little support for regulating energy shots differently than energy drinks. Copyright © 2017 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  16. The Problem of Shot Selection in Basketball

    PubMed Central

    Skinner, Brian

    2012-01-01

    In basketball, every time the offense produces a shot opportunity the player with the ball must decide whether the shot is worth taking. In this article, I explore the question of when a team should shoot and when they should pass up the shot by considering a simple theoretical model of the shot selection process, in which the quality of shot opportunities generated by the offense is assumed to fall randomly within a uniform distribution. Within this model I derive an answer to the question “how likely must the shot be to go in before the player should take it?” and I show that this lower cutoff for shot quality depends crucially on the number of shot opportunities remaining (say, before the shot clock expires), with larger demanding that only higher-quality shots should be taken. The function is also derived in the presence of a finite turnover rate and used to predict the shooting rate of an optimal-shooting team as a function of time. The theoretical prediction for the optimal shooting rate is compared to data from the National Basketball Association (NBA). The comparison highlights some limitations of the theoretical model, while also suggesting that NBA teams may be overly reluctant to shoot the ball early in the shot clock. PMID:22295109

  17. The problem of shot selection in basketball.

    PubMed

    Skinner, Brian

    2012-01-01

    In basketball, every time the offense produces a shot opportunity the player with the ball must decide whether the shot is worth taking. In this article, I explore the question of when a team should shoot and when they should pass up the shot by considering a simple theoretical model of the shot selection process, in which the quality of shot opportunities generated by the offense is assumed to fall randomly within a uniform distribution. Within this model I derive an answer to the question "how likely must the shot be to go in before the player should take it?" and I show that this lower cutoff for shot quality f depends crucially on the number n of shot opportunities remaining (say, before the shot clock expires), with larger n demanding that only higher-quality shots should be taken. The function f(n) is also derived in the presence of a finite turnover rate and used to predict the shooting rate of an optimal-shooting team as a function of time. The theoretical prediction for the optimal shooting rate is compared to data from the National Basketball Association (NBA). The comparison highlights some limitations of the theoretical model, while also suggesting that NBA teams may be overly reluctant to shoot the ball early in the shot clock.

  18. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  19. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...

  20. Septin9 is involved in T-cell development and CD8+ T-cell homeostasis.

    PubMed

    Lassen, Louise Berkhoudt; Füchtbauer, Annette; Schmitz, Alexander; Sørensen, Annette Balle; Pedersen, Finn Skou; Füchtbauer, Ernst-Martin

    2013-06-01

    SEPTIN9 (SEPT9) is a filament-forming protein involved in numerous cellular processes. We have used a conditional knock out allele of Sept9 to specifically delete Sept9 in T-cells. As shown by fluorescence-activated cell sorting, loss of Sept9 at an early thymocyte stage in the thymus results in increased numbers of double-negative cells indicating that SEPT9 is involved in the transition from the double-negative stage during T-cell development. Accordingly, the relative numbers of mature T-cells in the periphery are decreased in mice with a T-cell-specific deletion of Sept9. Proliferation of Sept9-deleted CD8(+) T-cells from the spleen is decreased upon stimulation in culture. The altered T-cell homeostasis caused by the loss of Sept9 results in an increase of CD8(+) central memory T-cells.

  1. Index of cyber integrity

    NASA Astrophysics Data System (ADS)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  2. Cyber Victimization and Perceived Stress: Linkages to Late Adolescents' Cyber Aggression and Psychological Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The present study examined multiple sources of strain, particular cyber victimization, and perceived stress from parents, peers, and academics, in relation to late adolescents' (ages 16-18; N = 423) cyber aggression, anxiety, and depression, each assessed 1 year later (Time 2). Three-way interactions revealed that the relationship between Time 1…

  3. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  4. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  5. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  6. Discussing Cyber Ethics with Students Is Critical

    ERIC Educational Resources Information Center

    Kruger, Robert

    2003-01-01

    As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…

  7. Cyber Children: What Parents Need to Know

    ERIC Educational Resources Information Center

    Roberts, Kevin J.

    2010-01-01

    Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…

  8. Long-Wavelength 640 x 486 GaAs/AlGaAs Quantum Well Infrared Photodetector Snap-Shot Camera

    NASA Technical Reports Server (NTRS)

    Gunapala, Sarath D.; Bandara, Sumith V.; Liu, John K.; Hong, Winn; Sundaram, Mani; Maker, Paul D.; Muller, Richard E.; Shott, Craig A.; Carralejo, Ronald

    1998-01-01

    A 9-micrometer cutoff 640 x 486 snap-shot quantum well infrared photodetector (QWIP) camera has been demonstrated. The performance of this QWIP camera is reported including indoor and outdoor imaging. The noise equivalent differential temperature (NE.deltaT) of 36 mK has been achieved at 300 K background with f/2 optics. This is in good agreement with expected focal plane array sensitivity due to the practical limitations on charge handling capacity of the multiplexer, read noise, bias voltage, and operating temperature.

  9. The Physics of Shot Towers

    ERIC Educational Resources Information Center

    Lipscombe, Trevor C.; Mungan, Carl E.

    2012-01-01

    In the late 18th and throughout the 19th century, lead shot for muskets was prepared by use of a shot tower. Molten lead was poured from the top of a tower and, during its fall, the drops became spherical under the action of surface tension. In this article, we ask and answer the question: "How does the size of the lead shot depend on the height…

  10. Towards a Research Agenda for Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less

  11. Single-shot T2 mapping using overlapping-echo detachment planar imaging and a deep convolutional neural network.

    PubMed

    Cai, Congbo; Wang, Chao; Zeng, Yiqing; Cai, Shuhui; Liang, Dong; Wu, Yawen; Chen, Zhong; Ding, Xinghao; Zhong, Jianhui

    2018-04-24

    An end-to-end deep convolutional neural network (CNN) based on deep residual network (ResNet) was proposed to efficiently reconstruct reliable T 2 mapping from single-shot overlapping-echo detachment (OLED) planar imaging. The training dataset was obtained from simulations that were carried out on SPROM (Simulation with PRoduct Operator Matrix) software developed by our group. The relationship between the original OLED image containing two echo signals and the corresponding T 2 mapping was learned by ResNet training. After the ResNet was trained, it was applied to reconstruct the T 2 mapping from simulation and in vivo human brain data. Although the ResNet was trained entirely on simulated data, the trained network was generalized well to real human brain data. The results from simulation and in vivo human brain experiments show that the proposed method significantly outperforms the echo-detachment-based method. Reliable T 2 mapping with higher accuracy is achieved within 30 ms after the network has been trained, while the echo-detachment-based OLED reconstruction method took approximately 2 min. The proposed method will facilitate real-time dynamic and quantitative MR imaging via OLED sequence, and deep convolutional neural network has the potential to reconstruct maps from complex MRI sequences efficiently. © 2018 International Society for Magnetic Resonance in Medicine.

  12. BRI: Cyber Trust and Suspicion

    DTIC Science & Technology

    2017-06-06

    Basis for Trust and Suspicion: Manipulating Insider Threat In Cyber Intelligence & Operations: For 2013, the concepts of Predictability...1 THRUST 1 – A SOCIAL, CULTURAL, AND EMOTIONAL BASIS FOR TRUST AND SUSPICION: MANIPULATING INSIDER THREAT IN CYBER INTELLIGENCE ...APPROACH ......................................... 59 3.1 Cybersecurity with humans in the loop

  13. Cyber-Physical System Security of Smart Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less

  14. The psychological effects of cyber terrorism

    PubMed Central

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962

  15. CYBER THREAT AWARENESS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-02-16

    Writing on the future of cyber warfare, Col William Poirier and Maj James Lotspeich posit that eventually advances in the Air Force’s cyber...Defending the Walls,” 3. 7 Col William J. Poirier and Maj James Lotspeich, “Air Force Cyber Warfare - Now and the Future,” Air and Space Power Journal 27...and Associated Terms, 8 November 2010. http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf. Poirier , Col William J., and Lotspeich, Maj James. “Air

  16. The psychological effects of cyber terrorism.

    PubMed

    Gross, Michael L; Canetti, Daphna; Vashdi, Dana R

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  17. Realizing Scientific Methods for Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber securitymore » science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.« less

  18. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  19. Cyber Bullying and Academic Performance

    ERIC Educational Resources Information Center

    Faryadi, Qais

    2011-01-01

    This research investigates the emotional and physiological effects of cyber bullying on the university students. The primary objective of this investigation is to identify the victims of cyber bullying and critically analyze their emotional state and frame of mind in order to provide them with a workable and feasible intervention in fighting cyber…

  20. A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure

    PubMed Central

    Fontaine, Michael D.

    2013-01-01

    Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI), by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS) data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing. PMID:23766690

  1. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  2. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  3. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  4. A Cyber-ITS framework for massive traffic data analysis using cyber infrastructure.

    PubMed

    Xia, Yingjie; Hu, Jia; Fontaine, Michael D

    2013-01-01

    Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI), by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS) data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing.

  5. Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism

    DTIC Science & Technology

    2017-03-03

    Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism Hamed Okhravi and Howard Shrobe Overview: The static...nature of computer systems makes them vulnerable to cyber attacks. Consider a situation where an attacker wants to compromise a remote system running... cyber resilience that attempts to rebalance the cyber landscape is known as cyber moving target (MT) (or just moving target) techniques. Moving target

  6. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  7. Health implications of cyber-terrorism.

    PubMed

    Clem, A; Galwankar, Sagar; Buck, George

    2003-01-01

    The world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.

  8. Multispectral Image Compression Based on DSC Combined with CCSDS-IDC

    PubMed Central

    Li, Jin; Xing, Fei; Sun, Ting; You, Zheng

    2014-01-01

    Remote sensing multispectral image compression encoder requires low complexity, high robust, and high performance because it usually works on the satellite where the resources, such as power, memory, and processing capacity, are limited. For multispectral images, the compression algorithms based on 3D transform (like 3D DWT, 3D DCT) are too complex to be implemented in space mission. In this paper, we proposed a compression algorithm based on distributed source coding (DSC) combined with image data compression (IDC) approach recommended by CCSDS for multispectral images, which has low complexity, high robust, and high performance. First, each band is sparsely represented by DWT to obtain wavelet coefficients. Then, the wavelet coefficients are encoded by bit plane encoder (BPE). Finally, the BPE is merged to the DSC strategy of Slepian-Wolf (SW) based on QC-LDPC by deep coupling way to remove the residual redundancy between the adjacent bands. A series of multispectral images is used to test our algorithm. Experimental results show that the proposed DSC combined with the CCSDS-IDC (DSC-CCSDS)-based algorithm has better compression performance than the traditional compression approaches. PMID:25110741

  9. Multispectral image compression based on DSC combined with CCSDS-IDC.

    PubMed

    Li, Jin; Xing, Fei; Sun, Ting; You, Zheng

    2014-01-01

    Remote sensing multispectral image compression encoder requires low complexity, high robust, and high performance because it usually works on the satellite where the resources, such as power, memory, and processing capacity, are limited. For multispectral images, the compression algorithms based on 3D transform (like 3D DWT, 3D DCT) are too complex to be implemented in space mission. In this paper, we proposed a compression algorithm based on distributed source coding (DSC) combined with image data compression (IDC) approach recommended by CCSDS for multispectral images, which has low complexity, high robust, and high performance. First, each band is sparsely represented by DWT to obtain wavelet coefficients. Then, the wavelet coefficients are encoded by bit plane encoder (BPE). Finally, the BPE is merged to the DSC strategy of Slepian-Wolf (SW) based on QC-LDPC by deep coupling way to remove the residual redundancy between the adjacent bands. A series of multispectral images is used to test our algorithm. Experimental results show that the proposed DSC combined with the CCSDS-IDC (DSC-CCSDS)-based algorithm has better compression performance than the traditional compression approaches.

  10. The Penn State ``Cyber Wind Facility''

    NASA Astrophysics Data System (ADS)

    Brasseur, James; Vijayakumar, Ganesh; Lavely, Adam; Nandi, Tarak; Jayaraman, Balaji; Jha, Pankaj; Dunbar, Alex; Motta-Mena, Javier; Haupt, Sue; Craven, Brent; Campbell, Robert; Schmitz, Sven; Paterson, Eric

    2012-11-01

    We describe development and results from a first generation Penn State ``Cyber Wind Facility'' (CWF). The aim of the CWF program is to develop and validate a computational ``facility'' that, in the most powerful HPC environments, will be basis for the design and implementation of cyber ``experiments'' at a level of complexity, fidelity and resolution to be treated similarly to field experiments on wind turbines operating in true atmospheric environments. We see cyber experiments as complimentary to field experiments in the sense that, whereas field data can record over ranges of events not representable in the cyber environment, with sufficient resolution, numerical accuracy, and HPC power, it is theoretically possible to collect cyber data from more true, albeit canonical, atmospheric environments can produce data from extraordinary numbers of sensors impossible to obtain in the field. I will describe our first generation CWF, from which we have quantified and analyzed useful details of the interactions between atmospheric turbulence and wind turbine loadings for an infinitely stiff commercial-scale turbine rotor in a canonical convective daytime atmospheric boundary layer over horizontally homogeneous rough flat terrain. Supported by the DOE Offshore Initiative and the National Science Foundation.

  11. Billion shot flashlamp for spaceborne lasers

    NASA Technical Reports Server (NTRS)

    Richter, Linda; Schuda, Felix; Degnan, John

    1990-01-01

    A billion-shot flashlamp developed under a NASA contract for spaceborne laser missions is presented. Lifetime-limiting mechanisms are identified and addressed. Two energy loadings of 15 and 44 Joules were selected for the initial accelerated life testing. A fluorescence-efficiency test station was used for measuring the useful-light output degradation of the lamps. The design characteristics meeting NASA specifications are outlined. Attention is focused on the physical properties of tungsten-matrix cathodes, the chemistry of dispenser cathodes, and anode degradation. It is reported that out of the total 83 lamps tested in the program, 4 lamps reached a billion shots and one lamp is beyond 1.7 billion shots, while at 44 Joules, 4 lamps went beyond 100 million shots and one lamp reached 500 million shots.

  12. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    PubMed

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  13. Improved diagnosis of common bile duct stone with single-shot balanced turbo field-echo sequence in MRCP.

    PubMed

    Noda, Yoshifumi; Goshima, Satoshi; Kojima, Toshihisa; Kawaguchi, Shimpei; Kawada, Hiroshi; Kawai, Nobuyuki; Koyasu, Hiromi; Matsuo, Masayuki; Bae, Kyongtae T

    2017-04-01

    To evaluate the value of adding single-shot balanced turbo field-echo (b-TFE) sequence to conventional magnetic resonance cholangiopancreatography (MRCP) for the detection of common bile duct (CBD) stone. One hundred thirty-seven consecutive patients with suspected CBD stone underwent MRCP including single-shot b-TFE sequence. Twenty-five patients were confirmed with CBD stone by endoscopic retrograde cholangiopancreatography or ultrasonography. Two radiologists reviewed two image protocols: protocol A (conventional MRCP protocol: unenhanced T1-, T2-, and respiratory-triggered three-dimensional fat-suppressed single-shot turbo spin-echo MRCP sequence) and protocol B (protocol A plus single-shot b-TFE sequence). The sensitivity, specificity, positive (PPV) and negative predictive value (NPV), and area under the receiver-operating-characteristic (ROC) curve (AUC) for the detection of CBD stone were compared. The sensitivity (72%) and NPV (94%) were the same between the two protocols. However, protocol B was greater in the specificity (99%) and PPV (94%) than protocol A (92% and 67%, respectively) (P = 0.0078 and 0.031, respectively). The AUC was significantly greater for protocol B (0.93) than for protocol A (0.86) (P = 0.026). Inclusion of single-shot b-TFE sequence to conventional MRCP significantly improved the specificity and PPV for the detection of CBD stone.

  14. The Cyber Defense Review. Volume 1, Number 1, Spring 2016

    DTIC Science & Technology

    2016-04-20

    in the Land and Cyber Domains Lieutenant General Edward C. Cardon The U.S. Navy’s Evolving Cyber/ Cybersecurity Story Rear Admiral Nancy Norton...Olav Lysne Cyber Situational Awareness Maj. Gen. Earl D. Matthews, USAF, Ret Dr. Harold J. Arata III Mr. Brian L. Hale Is There a Cybersecurity ...Kallberg The Decision to Attack: Military and Intelligence Cyber Decision-Making by Dr. Aaron F. Brantly The Cyber Defense Review

  15. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  16. Cyber Security Applications: Freeware & Shareware

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  17. Remodeling Air Force Cyber Command and Control

    DTIC Science & Technology

    2017-10-10

    AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL COURSE DESIGN PROJECT CONDUCTED 5 Jan – 5 May 17 Produced...For the Air Force Cyber Command and Control (C2) Design Project, CyberWorx brought together 25 cadets from the United States Air Force Academy...warfighting based upon the findings of the design teams. Participants The design course was attended by a diverse group of civilians from industry

  18. The U.S. Needs International Cyber Treaties

    DTIC Science & Technology

    2010-03-01

    formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international

  19. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a

  20. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a

  1. The Associations Between Substance Use, Sexual Behaviors, Bullying, Deviant Behaviors, Health, and Cyber Dating Abuse Perpetration.

    PubMed

    Van Ouytsel, Joris; Torres, Elizabeth; Choi, Hye Jeong; Ponnet, Koen; Walrave, Michel; Temple, Jeff R

    2017-04-01

    Dating violence is an important public health concern and is considered to be a form of school violence. While digital technologies have enabled perpetrators of dating violence to target their victims online (cyber dating abuse), little is known about how this form of perpetration relates to specific adolescent risk behaviors. This brief research report focuses on the associations between substance use, sexual behaviors, deviant behaviors, self-reported health, and cyber dating abuse perpetration. Participants included 705 ethnically diverse adolescents ( n = 408; 57.9% female) in Southeast Texas. Having had sexual intercourse or using alcohol or drugs before having sex was significantly linked with cyber dating abuse perpetration, as was poor physical health, and substance use. Consistent with limited research, we found a link between cyber dating abuse and engagement in bullying behaviors. The discussion section includes suggestions for school nurse practice and further research.

  2. The killing efficiency of soft iron shot

    USGS Publications Warehouse

    Andrews, R.; Longcore, J.R.

    1969-01-01

    A cooperative research effort between the ammunition industry and the Bureau of Sport Fisheries and Wildlife is aimed at finding a suitable non-toxic substitute for lead shot. A contract study by an independent research organization evaluated ways of coating or detoxifying lead shot or replacing it with another metal. As a result of that study, the only promising candidate is soft iron. Previous tests of hard iron shot had suggested that its killing effectiveness was poor at longer ranges due to the lower density. In addition, its hardness caused excessive damage to shotgun barrels. A unique, automated shooting facility was constructed at the Patuxent Wildlife Research Center to test the killing effectiveness of soft iron shot under controlled conditions. Tethered game-farm mallards were transported across a shooting point in a manner simulating free flight. A microswitch triggered a mounted shotgun so that each shot was 'perfect.' A soft iron shot, in Number 4 size, was produced by the ammunition industry and loaded in 12-gauge shells to give optimum ballistic performance. Commercial loads of lead shot in both Number 4 and Number 6 size were used for comparison. A total of 2,010 ducks were shot at ranges of 30 to 65 yards and at broadside and head-on angles in a statistically designed procedure. The following data were recorded for each duck: time until death, broken wing or leg bones, and number of embedded shot. Those ducks not killed outright were held for 10 days. From these data, ducks were categorized as 'probably bagged,' 'probably lost cripples,' or survivors. The test revealed that the killing effectiveness of this soft iron shot was superior to its anticipated performance and close to that obtained with commercial lead loads containing an equal number of pellets. Bagging a duck, in terms of rapid death or broken wing, was primarily dependent on the probability of a shot striking that vital area, and therefore a function of range. There was no indication

  3. Acute Effect of Upper and Lower Body Postactivation Exercises on Shot Put Performance.

    PubMed

    Kontou, Eleni I; Berberidou, Fani T; Pilianidis, Theophilos C; Mantzouranis, Nikolaos I; Methenitis, Spyridon K

    2018-04-01

    Kontou, EI, Berberidou, FT, Pilianidis, TC, Mantzouranis, NI, and Methenitis, SK. Acute effect of upper and lower body postactivation exercises on shot put performance. J Strength Cond Res 32(4): 970-982, 2018-The purpose of this study was to investigate the effect of different types of upper and lower' extremities exercises on acute increase of shot put performance, in moderate experienced throwers. Eight (n = 8) males and 9 (n = 9) female throwers participated in this study. Their bench press and squat maximum strength were measured while their shot put performance from power position was evaluated before and after 4 interventions: (a) plyometric push-ups (Plyo), (b) 6 s isometric push-ups (Iso), (c) 3 countermovement jumps (CMJs) and (d) 10 reps. of skipping (Skip). Interventions were performed in counterbalanced order with a 48-hour interval. Significant increase (p < 0.05) of shot put performances was observed after Plyo, Iso, and CMJ (range: 2.30 ± 1.82%-5.72 ± 4.32%). In addition, Iso induced the highest increase while Skip did not induce any improvement of throwing performance. The highest increases were recorded in men's performance after CMJ (5.72 ± 4.32%) while in women's performance after Iso (3.59 ± 2.7%). Javelin and discus throwers increase higher their performance after CMJs while shot putters after Iso. Significant correlations were found between training experience, maximum/relative strength, shot put performance and increase of throwing performance (%) after the interventions (r: 0.519-0.991, p < 0.05). Percentage increase of performance between Iso and Plyo have negative correlations (r: -0.569, p < 0.05) in contrast of those between Skip and CMJ (r: 0.710, p < 0.05). These results suggest that upper or lower body postactivation interventions may acutely increase the throwing performance. However, experience and strength are significant determinant of this increase.

  4. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    ERIC Educational Resources Information Center

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  5. Optimization of the prescription isodose line for Gamma Knife radiosurgery using the shot within shot technique.

    PubMed

    Johnson, Perry B; Monterroso, Maria I; Yang, Fei; Mellon, Eric

    2017-11-25

    This work explores how the choice of prescription isodose line (IDL) affects the dose gradient, target coverage, and treatment time for Gamma Knife radiosurgery when a smaller shot is encompassed within a larger shot at the same stereotactic coordinates (shot within shot technique). Beam profiles for the 4, 8, and 16 mm collimator settings were extracted from the treatment planning system and characterized using Gaussian fits. The characterized data were used to create over 10,000 shot within shot configurations by systematically changing collimator weighting and choice of prescription IDL. Each configuration was quantified in terms of the dose gradient, target coverage, and beam-on time. By analyzing these configurations, it was found that there are regions of overlap in target size where a higher prescription IDL provides equivalent dose fall-off to a plan prescribed at the 50% IDL. Furthermore, the data indicate that treatment times within these regions can be reduced by up to 40%. An optimization strategy was devised to realize these gains. The strategy was tested for seven patients treated for 1-4 brain metastases (20 lesions total). For a single collimator setting, the gradient in the axial plane was steepest when prescribed to the 56-63% (4 mm), 62-70% (8 mm), and 77-84% (16 mm) IDL, respectively. Through utilization of the optimization technique, beam-on time was reduced by more than 15% in 16/20 lesions. The volume of normal brain receiving 12 Gy or above also decreased in many cases, and in only one instance increased by more than 0.5 cm 3 . This work demonstrates that IDL optimization using the shot within shot technique can reduce treatment times without degrading treatment plan quality.

  6. Predictors of willingness to use cyber counseling for college students with disabilities.

    PubMed

    Lan, Chu-Mei

    2016-04-01

    Cyber counseling is a new method for assisting people in coping with distress. People in Taiwan are more familiar with face-to-face counseling than with cyber counseling. Using computers is the most popular activity among college students with disabilities. Cyber counseling is effective for lessening client disturbance. Therefore, cyber counseling is an alternative to face-to-face counseling. This study measured the willingness of college students with disabilities to use cyber counseling to meet their mental health needs. In addition, the predictors of the willingness to use cyber counseling were explored. The subjects were college students with disabilities who were recruited from universities in Southern Taiwan through the Internet and in college counseling centers. A total of 214 structured questionnaires were collected and subsequently analyzed using SPSS Version 18.0 through stepwise regression for discovering the crucial predictors of the willingness of college students to use cyber counseling. The crucial predictors of the willingness of college students to use cyber counseling were cyber-counseling needs, the need for cyber-counseling methods (the need to use various cyber-counseling methods), a help-seeking attitude in cyber counseling, a hearing disorder, cyber counseling need for academic achievement, and grade level. The explained proportion of variance was 65.4%. The willingness of college students with disabilities to use cyber counseling was explained according to cyber-counseling needs, cyber-counseling attitudes, disease type, and grades. Based on the results, this study offers specific suggestions and future directions for research on cyber counseling for college students with disabilities. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Cyber Security: A Road Map for Turkey

    DTIC Science & Technology

    2012-03-19

    Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on

  8. Rumination mediates the association between cyber-victimization and depressive symptoms.

    PubMed

    Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne

    2014-06-01

    The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.

  9. [One-shot therapy and transcatheter arterial embolization (TAE) therapy of unresectable hepatocellular carcinoma].

    PubMed

    Tanikawa, K; Hirai, K; Kawazoe, Y; Yamashita, K; Kumagai, M; Abe, M

    1985-10-01

    407 cases of unresectable hepatocellular carcinoma (HCC) occurring from 1970 to March 1985, including 107 cases receiving conservative therapy, 176 cases receiving one-shot therapy and 124 cases receiving transcatheter arterial embolization (TAE) therapy, were studied and the efficacy of chemotherapy was compared with that of TAE therapy. The results were as follows; One-year survival rate was 2.8% with a median survival time of 1.3 months in conservative therapy. In the 176 cases of one-shot therapy, one-year survival rate was 21.0%, two-year 6.8% and three-year 2.3% and the median survival time was 4.8% months. In 120 cases of one-shot therapy which were compatible with criteria for one-shot injection of anticancer drugs via the hepatic artery for HCC, one-year survival rate was 30%. However the rate was 1.8% in 56 cases which were not compatible with the criteria. In 37 cases in which Mitomycin C (MMC) and Adriamycin (ADR) were administered alternately, one-year survival rate was 41.7%, two-year 16.1% and three-year 4.3%. The highest survival rate was obtained by TAE therapy. One-year survival rate was 66.9%, two-year 33.8% and three-year 28.9%. Decrease of AFP after therapy was noted in 42.4% of cases given one-shot therapy and in 95.2% of cases given TEA therapy. The results suggest that alternate administration of anticancer agents produces good chemotherapeutic effects and that the best life-prolongation is obtained by TAE therapy.

  10. Surface roughness formation during shot peen forming

    NASA Astrophysics Data System (ADS)

    Koltsov, V. P.; Vinh, Le Tri; Starodubtseva, D. A.

    2018-03-01

    Shot peen forming (SPF) is used for forming panels and skins, and for hardening. As a rule, shot peen forming is performed after milling. Surface roughness is a complex structure, a combination of an original microrelief and shot peen forming indentations of different depths and chaotic distribution along the surface. As far as shot peen forming is a random process, surface roughness resulted from milling and shot peen forming is random too. During roughness monitoring, it is difficult to determine the basic surface area which would ensure accurate results. It can be assumed that the basic area depends on the random roughness which is characterized by the degree of shot peen forming coverage. The analysis of depth and shot peen forming indentations distribution along the surface made it possible to identify the shift of an original center profile plane and create a mathematical model for the arithmetic mean deviation of the profile. Experimental testing proved model validity and determined an inversely proportional dependency of the basic area on the degree of coverage.

  11. Cyber bullying prevention: intervention in Taiwan.

    PubMed

    Lee, Ming-Shinn; Zi-Pei, Wu; Svanström, Leif; Dalal, Koustuv

    2013-01-01

    This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes) of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student's knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student's knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted.

  12. Cyber Bullying Prevention: Intervention in Taiwan

    PubMed Central

    Lee, Ming-Shinn; Zi-Pei, Wu; Svanström, Leif; Dalal, Koustuv

    2013-01-01

    Background This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. Methodology/Findings The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes) of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student’s knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student’s knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. Conclusions/Significance The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted. PMID:23724018

  13. The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents.

    PubMed

    Temple, Jeff R; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L; Peskin, Melissa Fleschler; Elmquist, JoAnna

    2016-02-01

    While research has explored adolescents' use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58 % female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration 1 year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts.

  14. The Temporal Association between Traditional and Cyber Dating Abuse among Adolescents

    PubMed Central

    Temple, Jeff R.; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L.; Peskin, Melissa Fleschler; Elmquist, JoAnna

    2015-01-01

    While research has explored adolescents’ use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58% female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration one year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts. PMID:26525389

  15. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  16. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...

  17. Spherical Images for Cultural Heritage: Survey and Documentation with the Nikon KM360

    NASA Astrophysics Data System (ADS)

    Gottardi, C.; Guerra, F.

    2018-05-01

    The work presented here focuses on the analysis of the potential of spherical images acquired with specific cameras for documentation and three-dimensional reconstruction of Cultural Heritage. Nowadays, thanks to the introduction of cameras able to generate panoramic images automatically, without the requirement of a stitching software to join together different photos, spherical images allow the documentation of spaces in an extremely fast and efficient way. In this particular case, the Nikon Key Mission 360 spherical camera was tested on the Tolentini's cloister, which used to be part of the convent of the close church and now location of the Iuav University of Venice. The aim of the research is based on testing the acquisition of spherical images with the KM360 and comparing the obtained photogrammetric models with data acquired from a laser scanning survey in order to test the metric accuracy and the level of detail achievable with this particular camera. This work is part of a wider research project that the Photogrammetry Laboratory of the Iuav University of Venice has been dealing with in the last few months; the final aim of this research project will be not only the comparison between 3D models obtained from spherical images and laser scanning survey's techniques, but also the examination of their reliability and accuracy with respect to the previous methods of generating spherical panoramas. At the end of the research work, we would like to obtain an operational procedure for spherical cameras applied to metric survey and documentation of Cultural Heritage.

  18. High-dynamic-range cross-correlator for shot-to-shot measurement of temporal contrast

    NASA Astrophysics Data System (ADS)

    Kon, Akira; Nishiuchi, Mamiko; Kiriyama, Hiromitsu; Ogura, Koichi; Mori, Michiaki; Sakaki, Hironao; Kando, Masaki; Kondo, Kiminori

    2017-01-01

    The temporal contrast of an ultrahigh-intensity laser is a crucial parameter for laser plasma experiments. We have developed a multichannel cross-correlator (MCCC) for single-shot measurements of the temporal contrast in a high-power laser system. The MCCC is based on third-order cross-correlation, and has four channels and independent optical delay lines. We have experimentally demonstrated that the MCCC system achieves a high dynamic range of ˜1012 and a large temporal window of ˜1 ns. Moreover, we were able to measure the shot-to-shot fluctuations of a short-prepulse intensity at -26 ps and long-pulse (amplified spontaneous emission, ASE) intensities at -30, -450, and -950 ps before the arrival of the main pulse at the interaction point.

  19. Considerations in high resolution skeletal muscle DTI using single-shot EPI with stimulated echo preparation and SENSE

    PubMed Central

    Karampinos, Dimitrios C.; Banerjee, Suchandrima; King, Kevin F.; Link, Thomas M.; Majumdar, Sharmila

    2011-01-01

    Previous studies have shown that skeletal muscle diffusion tensor imaging (DTI) can non-invasively probe changes in the muscle fiber architecture and microstructure in diseased and damaged muscles. However, DTI fiber reconstruction in small muscles and in muscle regions close to aponeuroses and tendons remains challenging because of partial volume effects. Increasing the spatial resolution of skeletal muscle single-shot diffusion weighted (DW)-EPI can be hindered by the inherently low SNR of muscle DW-EPI due to the short muscle T2 and the high sensitivity of single-shot EPI to off-resonance effects and T2* blurring. In the present work, eddy-current compensated diffusion-weighted stimulated echo preparation is combined with sensitivity encoding (SENSE) to maintain good SNR properties and reduce the sensitivity to distortions and T2* blurring in high resolution skeletal muscle single-shot DW-EPI. An analytical framework is developed for optimizing the reduction factor and diffusion weighting time to achieve maximum SNR. Arguments for the selection of the experimental parameters are then presented considering the compromise between SNR, B0-induced distortions, T2* blurring effects and tissue incoherent motion effects. Based on the selected parameters in a high resolution skeletal muscle single-shot DW-EPI protocol, imaging protocols at lower acquisition matrix sizes are defined with matched bandwidth in the phase-encoding direction and SNR. In vivo results show that high resolution skeletal muscle DTI with minimized sensitivity to geometric distortions and T2* blurring is feasible using the proposed methodology. In particular, a significant benefit is demonstrated from reducing partial volume effects on resolving multi-pennate muscles and muscles with small cross sections in calf muscle DTI. PMID:22081519

  20. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  1. Radiography simulation on single-shot dual-spectrum X-ray for cargo inspection system.

    PubMed

    Gil, Youngmi; Oh, Youngdo; Cho, Moohyun; Namkung, Won

    2011-02-01

    We propose a method to identify materials in the dual energy X-ray (DeX) inspection system. This method identifies materials by combining information on the relative proportions T of high-energy and low-energy X-rays transmitted through the material, and the ratio R of the attenuation coefficient of the material when high-energy are used to that when low energy X-rays are used. In Monte Carlo N-Particle Transport Code (MCNPX) simulations using the same geometry as that of the real container inspection system, this T vs. R method successfully identified tissue-equivalent plastic and several metals. In further simulations, the single-shot mode of operating the accelerator led to better distinguishing of materials than the dual-shot system. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Longitudinal Investigation of the Associations between Adolescents' Popularity and Cyber Social Behaviors

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2014-01-01

    As adolescents become increasingly immersed in electronic technologies, popular adolescents may act in similar ways online as they do offline. This longitudinal study employed peer nominations and self-reports to examine perceived popularity and social preference in relation to cyber social behaviors among 256 adolescents during the fall (T1) and…

  3. Cyber ACTS/SAASS: A Second Year of Command and Staff College for the Future Leaders of Our Cyber Forces

    DTIC Science & Technology

    2009-01-01

    objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.

  4. Traditional and cyber aggressors and victims: a comparison of psychosocial characteristics.

    PubMed

    Sontag, Lisa M; Clemans, Katherine H; Graber, Julia A; Lyndon, Sarah T

    2011-04-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically effortful control, manipulativeness, remorselessness, proactive and reactive aggression, and anxious/depressive symptoms. Participants (N = 300; 63.2% female; M age = 12.89, SD = .95; 52% Caucasian, 27% African American, 11% Latino, and 10% other) were categorized based on aggressor type (non/low aggressor, traditional-only, cyber-only, and combined traditional and cyber) and victim type (non-victim, traditional-only, cyber-only, and combined traditional and cyber). Cyber aggressors reported lower levels of reactive aggression compared to traditional-only and combined aggressors. Combined aggressors demonstrated the poorest psychosocial profile compared to all other aggressor groups. For victimization, cyber-only and combined victims reported higher levels of reactive aggression and were more likely to be cyber aggressors themselves compared to traditional-only victims and non-victims. Findings suggest that there may be unique aspects about cyber aggression and victimization that warrant further investigation.

  5. The Defender's Role in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.

  6. Offering Annual Fecal Occult Blood Tests at Annual Flu Shot Clinics Increases Colorectal Cancer Screening Rates

    PubMed Central

    Potter, Michael B.; Phengrasamy, La; Hudes, Esther S.; McPhee, Stephen J.; Walsh, Judith M.E.

    2009-01-01

    PURPOSE We wanted to determine whether providing home fecal occult blood test (FOBT) kits to eligible patients during influenza inoculation (flu shot) clinics can contribute to higher colorectal cancer screening (CRCS) rates. METHODS The study was time randomized. On 8 dates of an annual flu shot clinic at the San Francisco General Hospital, patients were offered flu shots as usual (control group) and on 9 other dates, patients were offered both flu shots and FOBT kits (intervention group). RESULTS The study included 514 patients aged 50 to 79 years, with 246 in the control group and 268 in the intervention group. At the conclusion of flu season, FOBT screening rates increased by 4.4 percentage points from 52.9% at baseline to 57.3% (P = .07) in the control group, and increased by 29.8 percentage points from 54.5% to 84.3% (P <.001) in the intervention group, with the change among intervention participants 25.4 percentage points greater than among control participants (P value for change difference <.001). Among patients initially due for CRCS, 20.7% in the control group and 68.0% in the intervention group were up-to-date at the conclusion of the study (P <.001). In multivariate analyses, the odds ratio for becoming up-to-date with screening in the intervention group (vs the control group) was 11.3 (95% CI, 5.8–22.0). CONCLUSIONS Offering FOBT kits during flu shot clinics dramatically increased the CRCS rate for flu shot clinic attendees. Pairing home FOBT kits with annual flu shots may be a useful strategy to improve CRCS rates in other primary care or public health settings. PMID:19139445

  7. Comparison between multi-shot gradient echo EPI and balanced SSFP in unenhanced 3T MRA of thoracic aorta in healthy volunteers.

    PubMed

    Iyama, Yuji; Nakaura, Takeshi; Nagayama, Yasunori; Oda, Seitaro; Utsunomiya, Daisuke; Kidoh, Masafumi; Yuki, Hideaki; Hirata, Kenichiro; Namimoto, Tomohiro; Kitajima, Mika; Morita, Kosuke; Funama, Yoshinori; Takemura, Atsushi; Tokuyasu, Shinichi; Okuaki, Tomoyuki; Yamashita, Yasuyuki

    2017-11-01

    The purpose of this study was to compare scan time and image quality between magnetic resonance angiography (MRA) of the thoracic aorta using a multi-shot gradient echo planar imaging (MSG-EPI) and MRA using balanced steady-state free precession (b-SSFP). Healthy volunteers (n=17) underwent unenhanced thoracic aorta MRA using balanced steady-state free precession (b-SSFP) and MSG-EPI sequences on a 3T MRI. The acquisition time, total scan time, signal-to-noise ratio (SNR) of the thoracic aorta, and the coefficient of variation (CV) of thoracic aorta were compared with paired t-tests. Two radiologists independently recorded the images' contrast, noise, sharpness, artifacts, and overall quality on a 4-point scale. The acquisition time was 36.2% shorter for MSG-EPI than b-SSFP (115.5±14.4 vs 181.0±14.9s, p<0.01). The total scan time was 40.4% shorter for MSG-EPI than b-SSFP (272±78 vs 456±144s, p<0.01). There was no significant difference in mean SNR between MSG-EPI and b-SSFP scans (17.3±3.6 vs 15.2±4.3, p=0.08). The CV was significantly lower for MSG-EPI than b-SSFP (0.2±0.1 vs. 0.5±0.2, p<0.01). All qualitative scores except for image noise were significantly higher in MSG-EPI than b-SSFP scans (p<0.05). The MSG-EPI sequence is a promising technique for shortening scan time and yielding more homogenous image quality in MRA of thoracic aorta on 3T scanners compared with the b-SSFP. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Normative beliefs about aggression and cyber aggression among young adults: a longitudinal investigation.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-01-01

    This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression. © 2013 Wiley Periodicals, Inc.

  9. Optimization and Control of Cyber-Physical Vehicle Systems

    PubMed Central

    Bradley, Justin M.; Atkins, Ella M.

    2015-01-01

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined. PMID:26378541

  10. Optimization and Control of Cyber-Physical Vehicle Systems.

    PubMed

    Bradley, Justin M; Atkins, Ella M

    2015-09-11

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.

  11. Leadership of Cyber Warriors: Enduring Principles and New Directions

    DTIC Science & Technology

    2011-07-11

    cyber warfare threat against the United States, the creation of United States Cyber Command and the designation of cyberspace as a warfighting domain now necessitate study of the attributes of successful cyber warfare leaders and the leadership techniques required to successfully lead cyber warriors. In particular, we must develop an understanding of where traditional kinetic leadership paradigms succeed, where they fail, and where new techniques must be adopted. Leadership is not a one size fits all endeavor. The capabilities and characteristics of

  12. Research Directions for Cyber Experimentation: Workshop Discussion Analysis.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeWaard, Elizabeth; Deccio, Casey; Fritz, David Jakob

    Sandia National Laboratories hosted a workshop on August 11, 2017 entitled "Research Directions for Cyber Experimentation," which focused on identifying and addressing research gaps within the field of cyber experimentation , particularly emulation testbeds . This report mainly documents the discussion toward the end of the workshop, which included research gaps such as developing a sustainable research infrastructure, exp anding cyber experimentation, and making the field more accessible to subject matter experts who may not have a background in computer science . Other gaps include methodologies for rigorous experimentation, validation, and uncertainty quantification, which , if addressed, also have themore » potential to bridge the gap between cyber experimentation and cyber engineering. Workshop attendees presented various ways to overcome these research gaps, however the main conclusion for overcoming these gaps is better commun ication through increased workshops, conferences, email lists, and slack chann els, among other opportunities.« less

  13. Toward a theoretical framework for trustworthy cyber sensing

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    2010-04-01

    Cyberspace is an indispensable part of the economy and society, but has been "polluted" with many compromised computers that can be abused to launch further attacks against the others. Since it is likely that there always are compromised computers, it is important to be aware of the (dynamic) cyber security-related situation, which is however challenging because cyberspace is an extremely large-scale complex system. Our project aims to investigate a theoretical framework for trustworthy cyber sensing. With the perspective of treating cyberspace as a large-scale complex system, the core question we aim to address is: What would be a competent theoretical (mathematical and algorithmic) framework for designing, analyzing, deploying, managing, and adapting cyber sensor systems so as to provide trustworthy information or input to the higher layer of cyber situation-awareness management, even in the presence of sophisticated malicious attacks against the cyber sensor systems?

  14. Cyber-Cops: Angels on the Net.

    ERIC Educational Resources Information Center

    Educom Review, 1996

    1996-01-01

    Curtis Sliwa, founder of the Guardian Angels citizens' safety patrol, discusses the development of the Cyber Angels, an online citizens' patrol group that monitors Internet communication. Cyber Angels voluntarily look for and report any illegal activity conducted over the Internet, such as pyramid scams, transmission of stolen credit card and…

  15. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  16. Reconstruction of Cyber and Physical Software Using Novel Spread Method

    NASA Astrophysics Data System (ADS)

    Ma, Wubin; Deng, Su; Huang, Hongbin

    2018-03-01

    Cyber and Physical software has been concerned for many years since 2010. Actually, many researchers would disagree with the deployment of traditional Spread Method for reconstruction of Cyber and physical software, which embodies the key principles reconstruction of cyber physical system. NSM(novel spread method), our new methodology for reconstruction of cyber and physical software, is the solution to all of these challenges.

  17. Cerebral perfusion alterations in epileptic patients during peri-ictal and post-ictal phase: PASL vs DSC-MRI.

    PubMed

    Pizzini, Francesca B; Farace, Paolo; Manganotti, Paolo; Zoccatelli, Giada; Bongiovanni, Luigi G; Golay, Xavier; Beltramello, Alberto; Osculati, Antonio; Bertini, Giuseppe; Fabene, Paolo F

    2013-07-01

    Non-invasive pulsed arterial spin labeling (PASL) MRI is a method to study brain perfusion that does not require the administration of a contrast agent, which makes it a valuable diagnostic tool as it reduces cost and side effects. The purpose of the present study was to establish the viability of PASL as an alternative to dynamic susceptibility contrast (DSC-MRI) and other perfusion imaging methods in characterizing changes in perfusion patterns caused by seizures in epileptic patients. We evaluated 19 patients with PASL. Of these, the 9 affected by high-frequency seizures were observed during the peri-ictal period (within 5hours since the last seizure), while the 10 patients affected by low-frequency seizures were observed in the post-ictal period. For comparison, 17/19 patients were also evaluated with DSC-MRI and CBF/CBV. PASL imaging showed focal vascular changes, which allowed the classification of patients in three categories: 8 patients characterized by increased perfusion, 4 patients with normal perfusion and 7 patients with decreased perfusion. PASL perfusion imaging findings were comparable to those obtained by DSC-MRI. Since PASL is a) sensitive to vascular alterations induced by epileptic seizures, b) comparable to DSC-MRI for detecting perfusion asymmetries, c) potentially capable of detecting time-related perfusion changes, it can be recommended for repeated evaluations, to identify the epileptic focus, and in follow-up and/or therapy-response assessment. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Pediatric air gun shot injury.

    PubMed

    Khan, Ubaid U; Kamal, Naglaa M; Mirza, Shazia J; Sherief, Laila M

    2014-12-01

    Air guns (AGs) use air or another compressed gas to propel a projectile. Different injuries may occur in children due to their body structure, which is less-resistant with thin soft tissue coverage that can be easily penetrated by an AG shot. We present 3 cases of pediatric AG shot injury. The first-case had right lumber deep tissue penetration of AG pallet without internal damage, the second-case had a complex course of pellet into the perineum, and the third-case was shot in the left shoulder. All cases were accidentally shot. The shooters were all children, and relatives of the victims. All patients were generally stable on arrival. Two cases were operated, and one received conservative management. On follow up, no complications were noted.  At first sight, AGs and air rifles may appear relatively harmless, but they are potentially lethal and children should not be allowed to play with them. 

  19. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  20. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    PubMed

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  1. CyberShake: Running Seismic Hazard Workflows on Distributed HPC Resources

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Graves, R. W.; Gill, D.; Olsen, K. B.; Milner, K. R.; Yu, J.; Jordan, T. H.

    2013-12-01

    As part of its program of earthquake system science research, the Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, to perform physics-based probabilistic seismic hazard analysis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by simulating a tensor-valued wavefield of Strain Green Tensors, and then using seismic reciprocity to calculate synthetic seismograms for about 415,000 events per site of interest. These seismograms are processed to compute ground motion intensity measures, which are then combined with probabilities from an earthquake rupture forecast to produce a site-specific hazard curve. Seismic hazard curves for hundreds of sites in a region can be used to calculate a seismic hazard map, representing the seismic hazard for a region. We present a recently completed PHSA study in which we calculated four CyberShake seismic hazard maps for the Southern California area to compare how CyberShake hazard results are affected by different SGT computational codes (AWP-ODC and AWP-RWG) and different community velocity models (Community Velocity Model - SCEC (CVM-S4) v11.11 and Community Velocity Model - Harvard (CVM-H) v11.9). We present our approach to running workflow applications on distributed HPC resources, including systems without support for remote job submission. We show how our approach extends the benefits of scientific workflows, such as job and data management, to large-scale applications on Track 1 and Leadership class open-science HPC resources. We used our distributed workflow approach to perform CyberShake Study 13.4 on two new NSF open-science HPC computing resources, Blue Waters and Stampede, executing over 470 million tasks to calculate physics-based hazard curves for 286 locations in the Southern California region. For each location, we calculated seismic hazard curves with two different community velocity models and two different SGT codes, resulting in over

  2. Shot-noise-limited magnetometer with sub-picotesla sensitivity at room temperature

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lucivero, Vito Giovanni, E-mail: vito-giovanni.lucivero@icfo.es; Anielski, Pawel; Gawlik, Wojciech

    2014-11-15

    We report a photon shot-noise-limited (SNL) optical magnetometer based on amplitude modulated optical rotation using a room-temperature {sup 85}Rb vapor in a cell with anti-relaxation coating. The instrument achieves a room-temperature sensitivity of 70 fT/√(Hz) at 7.6 μT. Experimental scaling of noise with optical power, in agreement with theoretical predictions, confirms the SNL behaviour from 5 μT to 75 μT. The combination of best-in-class sensitivity and SNL operation makes the system a promising candidate for application of squeezed light to a state-of-the-art atomic sensor.

  3. Cyber High School Students' Transition to a Traditional University

    ERIC Educational Resources Information Center

    Gracey, Dorothy M.

    2010-01-01

    This mixed-method study identifies cyber high school graduates' perceptions of the effect of a cyber high school education on successful transition to a traditional university. The study examined students' perceptions of the advantages and disadvantages their cyber education experience contributed to their academic and social transition to…

  4. Data fusion in cyber security: first order entity extraction from common cyber data

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  5. Changes of multi-scale structure during mimicked DSC heating reveal the nature of starch gelatinization

    NASA Astrophysics Data System (ADS)

    Wang, Shujun; Zhang, Xiu; Wang, Shuo; Copeland, Les

    2016-06-01

    A thorough understanding of starch gelatinization is extremely important for precise control of starch functional properties for food processing and human nutrition. Here we reveal the molecular mechanism of starch gelatinization by differential scanning calorimetry (DSC) in conjunction with a protocol using the rapid viscosity analyzer (RVA) to generate material for analysis under conditions that simulated the DSC heating profiles. The results from DSC, FTIR, Raman, X-ray diffraction and small angle X-ray scattering (SAXS) analyses all showed that residual structural order remained in starch that was heated to the DSC endotherm end temperature in starch:water mixtures of 0.5 to 4:1 (v/w). We conclude from this study that the DSC endotherm of starch at a water:starch ratio of 2 to 4 (v/w) does not represent complete starch gelatinization. The DSC endotherm of starch involves not only the water uptake and swelling of amorphous regions, but also the melting of starch crystallites.

  6. Changes of multi-scale structure during mimicked DSC heating reveal the nature of starch gelatinization

    PubMed Central

    Wang, Shujun; Zhang, Xiu; Wang, Shuo; Copeland, Les

    2016-01-01

    A thorough understanding of starch gelatinization is extremely important for precise control of starch functional properties for food processing and human nutrition. Here we reveal the molecular mechanism of starch gelatinization by differential scanning calorimetry (DSC) in conjunction with a protocol using the rapid viscosity analyzer (RVA) to generate material for analysis under conditions that simulated the DSC heating profiles. The results from DSC, FTIR, Raman, X-ray diffraction and small angle X-ray scattering (SAXS) analyses all showed that residual structural order remained in starch that was heated to the DSC endotherm end temperature in starch:water mixtures of 0.5 to 4:1 (v/w). We conclude from this study that the DSC endotherm of starch at a water:starch ratio of 2 to 4 (v/w) does not represent complete starch gelatinization. The DSC endotherm of starch involves not only the water uptake and swelling of amorphous regions, but also the melting of starch crystallites. PMID:27319782

  7. Automatic twin vessel recrystallizer. Effective purification of acetaminophen by successive automatic recrystallization and absolute determination of purity by DSC.

    PubMed

    Nara, Osamu

    2011-01-24

    I describe an interchangeable twin vessel (J, N) automatic glass recrystallizer that eliminates the time-consuming recovery and recycling of crystals for repeated recrystallization. The sample goes in the dissolution vessel J containing a magnetic stir-bar K; J is clamped to the upper joint H of recrystallizer body D. Empty crystallization vessel N is clamped to the lower joint M. Pure solvent is delivered to the dissolution vessel and the crystallization vessel via the head of the condenser A. Crystallization vessel is heated (P). The dissolution reservoir is stirred and heated by the solvent vapor (F). Continuous outflow of filtrate E out of J keeps N at a stable boiling temperature. This results in efficient dissolution, evaporation and separation of pure crystals Q. Pure solvent in the dissolution reservoir is recovered by suction. Empty dissolution and crystallization vessels are detached. Stirrer magnet is transferred to the crystallization vessel and the role of the vessels are then reversed. Evacuating mother liquor out of the upper twin vessel, the apparatus unit is ready for the next automatic recrystallization by refilling twin vessels with pure solvent. We show successive automatic recrystallization of acetaminophen from diethyl ether obtaining acetaminophen of higher melting temperatures than USP and JP reference standards by 8× automatic recrystallization, 96% yield at each stage. Also, I demonstrate a novel approach to the determination of absolute purity by combining the successive automatic recrystallization with differential scanning calorimetry (DSC) measurement requiring no reference standards. This involves the measurement of the criterial melting temperature T(0) corresponding to the 100% pure material and quantitative ΔT in DSC based on the van't Hoff law of melting point depression. The purity of six commercial acetaminophen samples and reference standards and an eight times recrystallized product evaluated were 98.8 mol%, 97.9 mol%, 99

  8. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  9. Multiple hypothesis tracking for the cyber domain

    NASA Astrophysics Data System (ADS)

    Schwoegler, Stefan; Blackman, Sam; Holsopple, Jared; Hirsch, Michael J.

    2011-09-01

    This paper discusses how methods used for conventional multiple hypothesis tracking (MHT) can be extended to domain-agnostic tracking of entities from non-kinematic constraints such as those imposed by cyber attacks in a potentially dense false alarm background. MHT is widely recognized as the premier method to avoid corrupting tracks with spurious data in the kinematic domain but it has not been extensively applied to other problem domains. The traditional approach is to tightly couple track maintenance (prediction, gating, filtering, probabilistic pruning, and target confirmation) with hypothesis management (clustering, incompatibility maintenance, hypothesis formation, and Nassociation pruning). However, by separating the domain specific track maintenance portion from the domain agnostic hypothesis management piece, we can begin to apply the wealth of knowledge gained from ground and air tracking solutions to the cyber (and other) domains. These realizations led to the creation of Raytheon's Multiple Hypothesis Extensible Tracking Architecture (MHETA). In this paper, we showcase MHETA for the cyber domain, plugging in a well established method, CUBRC's INFormation Engine for Real-time Decision making, (INFERD), for the association portion of the MHT. The result is a CyberMHT. We demonstrate the power of MHETA-INFERD using simulated data. Using metrics from both the tracking and cyber domains, we show that while no tracker is perfect, by applying MHETA-INFERD, advanced nonkinematic tracks can be captured in an automated way, perform better than non-MHT approaches, and decrease analyst response time to cyber threats.

  10. Correlates of cyber dating abuse among teens.

    PubMed

    Zweig, Janine M; Lachman, Pamela; Yahner, Jennifer; Dank, Meredith

    2014-08-01

    Recent advancements in technology (e.g., social networking, texting) have created new ways for dating youth to relate to one another, including in abusive ways via "cyber dating abuse." Cyber dating abuse is a form of teen dating violence that overlaps with other types of abuse (e.g., psychological) but also has several unique characteristics. Given the phenomenon's limited presence in dating violence literature, we focus on identifying how experiencing cyber dating abuse relates to youths' individual behaviors and experiences (e.g., substance use, sexual activity), psychosocial adjustment, school connection, family relationships, and partner relationships. A total of 3,745 youth (52% female, 74% White) in three northeastern states participated in the survey and reported currently being in a dating relationship or having been in one during the prior year. We found that experiences of cyber dating abuse were most significantly correlated with being female, committing a greater variety of delinquent behaviors, having had sexual activity in one's lifetime, having higher levels of depressive symptoms, and having higher levels of anger/hostility. Further, cyber dating abuse appeared somewhat more strongly related to depressive symptoms and delinquency than did other forms of teen dating violence and abuse.

  11. International Cyber Incident Repository System: Information Sharing on a Global Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelatedmore » Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.« less

  12. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best

  13. Multinational Experiment 7. Outcome 3 - Cyber Domain Objective 3.4: Cyber Situational Awareness Standard Operating Procedure

    DTIC Science & Technology

    2012-12-01

    and activity coordination (for example, SOC management ). 10. In Reference D the information sharing framework represents a hub & node model in... management , vulnerabilities, critical assets, threats, impacts on operations etc. UNCLASSIFIED UNCLASSIFIED 6 PART 3 - CYBER SITUATIONAL AWARENESS...limit the effect of cyber incidents. 23. Tasks of the SOC include: • System maintenance and management including applying the directed security

  14. Realizing situation awareness within a cyber environment

    NASA Astrophysics Data System (ADS)

    Tadda, George; Salerno, John J.; Boulware, Douglas; Hinman, Michael; Gorton, Samuel

    2006-04-01

    Situation Awareness (SA) problems all require an understanding of current activities, an ability to anticipate what may happen next, and techniques to analyze the threat or impact of current activities and predictions. These processes of SA are common regardless of the domain and can be applied to the detection of cyber attacks. This paper will describe the application of a SA framework to implementing Cyber SA, describe some metrics for measuring and evaluating systems implementing Cyber SA, and discuss ongoing work in this area. We conclude with some ideas for future activities.

  15. Cyber-Bullying: The Situation in Ireland

    ERIC Educational Resources Information Center

    O'Moore, Mona

    2012-01-01

    This paper reports on the first major survey of cyber-bullying undertaken in Ireland. While preliminary results have been published they were based on a smaller and incomplete sample of 12-16 year olds living in Ireland. The preliminary results addressed the incidence level of cyber-bullying and that of the different subcategories of…

  16. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  17. Single-Breath-Hold Whole-heart Unenhanced Coronary MRA Using Multi-shot Gradient Echo EPI at 3T: Comparison with Free-breathing Turbo-field-echo Coronary MRA on Healthy Volunteers.

    PubMed

    Iyama, Yuji; Nakaura, Takeshi; Nagayama, Yasunori; Oda, Seitaro; Utsunomiya, Daisuke; Kidoh, Masafumi; Yuki, Hideaki; Hirata, Kenichiro; Namimoto, Tomohiro; Kitajima, Mika; Morita, Kosuke; Funama, Yoshinori; Takemura, Atsushi; Okuaki, Tomoyuki; Yamashita, Yasuyuki

    2018-04-10

    We investigated the feasibility of single breath hold unenhanced coronary MRA using multi-shot gradient echo planar imaging (MSG-EPI) on a 3T-scanner. Fourteen volunteers underwent single breath hold coronary MRA with a MSG-EPI and free-breathing turbo field echo (TFE) coronary MRA at 3T. The acquisition time, signal to noise ratio (SNR), and the contrast of the sequences were compared with the paired t-test. Readers evaluated the image contrast, noise, sharpness, artifacts, and the overall image quality. The acquisition time was 88.1% shorter for MSG-EPI than TFE (24.7 ± 2.5 vs 206.4 ± 23.1 sec, P < 0.01). The SNR was significantly higher on MSG-EPI than TFE scans (P < 0.01). There was no significant difference in the contrast on MSG-EPI and TFE scans (1.8 ± 0.3 vs 1.9 ± 0.3, P = 0.24). There was no significant difference in image contrast, image sharpness, and overall image quality between two scan techniques. The score of image noise and artifact were significantly higher on MSG-EPI than TFE scans (P < 0.05). The single breath hold MSG-EPI sequence is a promising technique for shortening the scan time and for preserving the image quality of unenhanced whole heart coronary MRA on a 3T scanner.

  18. Seeking Balance in Cyber Education

    DTIC Science & Technology

    2015-02-01

    properties that can be applied to computer systems, networks, and software. For example, in our Introduction to Cyber Security Course, given to...Below is the submittal schedule for the areas of emphasis we are looking for: Data Mining in Metrics? Jul/ JAug 2015 Issue Submission Deadline: Feb...Phone Arena. PhoneArena.com, 12 Nov. 2013. Web. 08 Aug. 2014. 8. Various. “SI110: Introduction to Cyber Security, Technical Foundations.” SI110

  19. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  20. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  1. CYBER: CHANGING THE LANDSCAPE OF FOREIGN INTERVENTION IN DEMOCRATIC ELECTIONS

    DTIC Science & Technology

    than the costs); and 3) the methods and tools for intervening are readily available. Cyber has had a significant impact on all three of the components...significant domestic actor and can act unilaterally to influence public opinion. Second, cyber lowers both the actual and perceived costs of...intervention. Finally, cyber methods and tools are available to almost anyone at any level. Cyber has lowered the barrier to electoral intervention. As a

  2. An Analysis of Pennsylvania's Cyber Charter Schools. Issue Brief

    ERIC Educational Resources Information Center

    Jack, James; Sludden, John; Schott, Adam

    2013-01-01

    Pennsylvania's first cyber charter school opened in 1998, enrolling 44 full-time students. From this modest beginning, Pennsylvania's cyber charter sector has grown to 16 schools enrolling 35,000 students from all but one school district in the Commonwealth. Pennsylvania has one of the nation's most extensive cyber charter sectors, and six…

  3. 30 CFR 75.1320 - Multiple-shot blasting.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... in a round shall be initiated in sequence from the opener hole or holes. (e) Arrangement of detonator... blasting coal off the solid— (i) Each shot in the round shall be initiated in sequence from the opener hole or holes; and (ii) After the first shot or shots, the interval between the designated delay periods...

  4. 30 CFR 75.1320 - Multiple-shot blasting.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... in a round shall be initiated in sequence from the opener hole or holes. (e) Arrangement of detonator... blasting coal off the solid— (i) Each shot in the round shall be initiated in sequence from the opener hole or holes; and (ii) After the first shot or shots, the interval between the designated delay periods...

  5. 30 CFR 75.1320 - Multiple-shot blasting.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... in a round shall be initiated in sequence from the opener hole or holes. (e) Arrangement of detonator... blasting coal off the solid— (i) Each shot in the round shall be initiated in sequence from the opener hole or holes; and (ii) After the first shot or shots, the interval between the designated delay periods...

  6. 30 CFR 75.1320 - Multiple-shot blasting.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... in a round shall be initiated in sequence from the opener hole or holes. (e) Arrangement of detonator... blasting coal off the solid— (i) Each shot in the round shall be initiated in sequence from the opener hole or holes; and (ii) After the first shot or shots, the interval between the designated delay periods...

  7. 30 CFR 75.1320 - Multiple-shot blasting.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in a round shall be initiated in sequence from the opener hole or holes. (e) Arrangement of detonator... blasting coal off the solid— (i) Each shot in the round shall be initiated in sequence from the opener hole or holes; and (ii) After the first shot or shots, the interval between the designated delay periods...

  8. Investigation of kinematics of knuckling shot in soccer

    NASA Astrophysics Data System (ADS)

    Asai, T.; Hong, S.

    2017-02-01

    In this study, we use four high-speed video cameras to investigate the swing characteristics of the kicking leg while delivering the knuckling shot in soccer. We attempt to elucidate the impact process of the kicking foot at the instant of its impact with the ball and the technical mechanisms of the knuckling shot via comparison of its curved motion with that of the straight and curved shots. Two high-speed cameras (Fastcam, Photron Inc., Tokyo, Japan; 1000 fps, 1024 × 1024 pixels) are set up 2 m away from the site of impact with a line of sight perpendicular to the kicking-leg side. In addition, two semi-high-speed cameras (EX-F1, Casio Computer Co., Ltd., Tokyo, Japan; 300 fps; 720 × 480 pixels) are positioned, one at the rear and the other on the kicking-leg side, to capture the kicking motion. We observe that the ankle joint at impact in the knuckling shot flexes in an approximate L-shape in a manner similar to the joint flexing for the curve shot. The hip's external rotation torque in the knuckling shot is greater than those of other shots, which suggests the tendency of the kicker to push the heel forward and impact with the inside of the foot. The angle of attack in the knuckling shot is smaller than that in other shots, and we speculate that this small attack angle is a factor in soccer kicks which generate shots with smaller rotational frequencies of the ball.

  9. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zakrzewska, Anita N; Ferragut, Erik M

    2011-01-01

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less

  10. D-DSC: Decoding Delay-based Distributed Source Coding for Internet of Sensing Things

    PubMed Central

    Akan, Ozgur B.

    2018-01-01

    Spatial correlation between densely deployed sensor nodes in a wireless sensor network (WSN) can be exploited to reduce the power consumption through a proper source coding mechanism such as distributed source coding (DSC). In this paper, we propose the Decoding Delay-based Distributed Source Coding (D-DSC) to improve the energy efficiency of the classical DSC by employing the decoding delay concept which enables the use of the maximum correlated portion of sensor samples during the event estimation. In D-DSC, network is partitioned into clusters, where the clusterheads communicate their uncompressed samples carrying the side information, and the cluster members send their compressed samples. Sink performs joint decoding of the compressed and uncompressed samples and then reconstructs the event signal using the decoded sensor readings. Based on the observed degree of the correlation among sensor samples, the sink dynamically updates and broadcasts the varying compression rates back to the sensor nodes. Simulation results for the performance evaluation reveal that D-DSC can achieve reliable and energy-efficient event communication and estimation for practical signal detection/estimation applications having massive number of sensors towards the realization of Internet of Sensing Things (IoST). PMID:29538405

  11. D-DSC: Decoding Delay-based Distributed Source Coding for Internet of Sensing Things.

    PubMed

    Aktas, Metin; Kuscu, Murat; Dinc, Ergin; Akan, Ozgur B

    2018-01-01

    Spatial correlation between densely deployed sensor nodes in a wireless sensor network (WSN) can be exploited to reduce the power consumption through a proper source coding mechanism such as distributed source coding (DSC). In this paper, we propose the Decoding Delay-based Distributed Source Coding (D-DSC) to improve the energy efficiency of the classical DSC by employing the decoding delay concept which enables the use of the maximum correlated portion of sensor samples during the event estimation. In D-DSC, network is partitioned into clusters, where the clusterheads communicate their uncompressed samples carrying the side information, and the cluster members send their compressed samples. Sink performs joint decoding of the compressed and uncompressed samples and then reconstructs the event signal using the decoded sensor readings. Based on the observed degree of the correlation among sensor samples, the sink dynamically updates and broadcasts the varying compression rates back to the sensor nodes. Simulation results for the performance evaluation reveal that D-DSC can achieve reliable and energy-efficient event communication and estimation for practical signal detection/estimation applications having massive number of sensors towards the realization of Internet of Sensing Things (IoST).

  12. Temporal Cyber Attack Detection.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ingram, Joey Burton; Draelos, Timothy J.; Galiardi, Meghan

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms requiremore » large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.« less

  13. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted

  14. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  15. Rapid Delivery of Cyber Capabilities: Evaluation of the Requirement for a Rapid Cyber Acquisition Process

    DTIC Science & Technology

    2012-06-01

    record (PoR) to give both a quantitative and qualitative perspective on the rapid cyber acquisitions framework . It also investigates if cyber operations...acquisition is a complex topic that does not yet have a solidified framework . To scope this research, a comprehensive review of past, present and...for AT&L is working with the DoD cyberspace community to develop a common framework for Services and Agencies to acquire capabilities for cyberspace

  16. Online social networking and the experience of cyber-bullying.

    PubMed

    O'Dea, Bridianne; Campbell, Andrew

    2012-01-01

    Online social networking sites (SNS) are popular social tools used amongst adolescents and account for much of their daily internet activity. Recently, these sites have presented opportunities for youth to experience cyber-bullying. Often resulting in psychological distress, cyber-bullying is a common experience for many young people. Continual use of SNS signifies the importance of examining its links to cyber-bullying. This study examined the relationship between online social networking and the experience of cyber-bullying. A total of 400 participants (Mage=14.31 years) completed an online survey which examined the perceived definitions and frequency of cyber-bullying. Users of SNS reported significantly higher frequencies of stranger contact compared to non-users. Spearman's rho correlations determined no significant relationship between daily time on SNS and the frequency of stranger contact. This suggests that ownership of a SNS profile may be a stronger predictor of some cyber-bullying experiences compared to time spent on these sites. Findings encourage continued research on the nature of internet activities used by young adolescents and the possible exposure to online victimization.

  17. Structural Causes and Cyber Effects: A Response to Our Critics

    DTIC Science & Technology

    2015-01-01

    the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15

  18. Shot-noise-limited optical Faraday polarimetry with enhanced laser noise cancelling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Jiaming; Department of Physics, Indiana University Purdue University Indianapolis, Indianapolis, Indiana 46202; Luo, Le, E-mail: leluo@iupui.edu

    2014-03-14

    We present a shot-noise-limited measurement of optical Faraday rotations with sub-ten-nanoradian angular sensitivity. This extremely high sensitivity is achieved by using electronic laser noise cancelling and phase sensitive detection. Specially, an electronic laser noise canceller with a common mode rejection ratio of over 100 dB was designed and built for enhanced laser noise cancelling. By measuring the Faraday rotation of ambient air, we demonstrate an angular sensitivity of up to 9.0×10{sup −9} rad/√(Hz), which is limited only by the shot-noise of the photocurrent of the detector. To date, this is the highest angular sensitivity ever reported for Faraday polarimeters in the absencemore » of cavity enhancement. The measured Verdet constant of ambient air, 1.93(3)×10{sup −9}rad/(G cm) at 633 nm wavelength, agrees extremely well with the earlier experiments using high finesse optical cavities. Further, we demonstrate the applications of this sensitive technique in materials science by measuring the Faraday effect of an ultrathin iron film.« less

  19. Investigation on surface layer characteristics of shot peened graphene reinforced Al composite by X-ray diffraction method

    NASA Astrophysics Data System (ADS)

    Zhan, Ke; Wu, Yihao; Li, Jiongli; Zhao, Bin; Yan, Ya; Xie, Lechun; Wang, Lianbo; Ji, V.

    2018-03-01

    Graphene reinforced Al composite with high mechanical property was successfully reported. However, there are quite limited studies about shot peening effect on this new type material. Here, 1.0 wt% graphene reinforced Al composite was produced by powder metallurgy and treated by shot peening. The surface layer characteristics of shot peened composite was investigated by X-ray diffraction line profile analysis. The microstructure including domain size, micro-strain, dislocation density and crystalline texture were analyzed. The results showed that after surface shot-peening, the domain size were refined, the dislocation density of the composite was increased sharply to 9.0 × 1011/cm2 at the top surface. The original strong texture was diminished after shot peening. Based on the calculated results, the microstructure variation of composite was more severe than that of Al without graphene reinforcement after shot peening. Besides, the micro-hardness of composite at the top surface increased up to 75HV one time higher than that of matrix. It is concluded that shot peening can be considered as an essential process of improving the surface properties of graphene reinforced Al composite.

  20. Psychological Impact of Cyber-Bullying: Implications for School Counsellors

    ERIC Educational Resources Information Center

    Nordahl, Jennifer; Beran, Tanya; Dittrick, Crystal J.

    2013-01-01

    Cyber-bullying is a significant problem for children today. This study provides evidence of the psychological impact of cyber-bullying among victimized children ages 10 to 17 years (M = 12.48, SD = 1.79) from 23 urban schools in a western province of Canada (N = 239). Students who were cyber-bullied reported high levels of anxious,…

  1. Longitudinal DSC-MRI for Distinguishing Tumor Recurrence From Pseudoprogression in Patients With a High-grade Glioma.

    PubMed

    Boxerman, Jerrold L; Ellingson, Benjamin M; Jeyapalan, Suriya; Elinzano, Heinrich; Harris, Robert J; Rogg, Jeffrey M; Pope, Whitney B; Safran, Howard

    2017-06-01

    For patients with high-grade glioma on clinical trials it is important to accurately assess time of disease progression. However, differentiation between pseudoprogression (PsP) and progressive disease (PD) is unreliable with standard magnetic resonance imaging (MRI) techniques. Dynamic susceptibility contrast perfusion MRI (DSC-MRI) can measure relative cerebral blood volume (rCBV) and may help distinguish PsP from PD. A subset of patients with high-grade glioma on a phase II clinical trial with temozolomide, paclitaxel poliglumex, and concurrent radiation were assessed. Nine patients (3 grade III, 6 grade IV), with a total of 19 enhancing lesions demonstrating progressive enhancement (≥25% increase from nadir) on postchemoradiation conventional contrast-enhanced MRI, had serial DSC-MRI. Mean leakage-corrected rCBV within enhancing lesions was computed for all postchemoradiation time points. Of the 19 progressively enhancing lesions, 10 were classified as PsP and 9 as PD by biopsy/surgery or serial enhancement patterns during interval follow-up MRI. Mean rCBV at initial progressive enhancement did not differ significantly between PsP and PD (2.35 vs. 2.17; P=0.67). However, change in rCBV at first subsequent follow-up (-0.84 vs. 0.84; P=0.001) and the overall linear trend in rCBV after initial progressive enhancement (negative vs. positive slope; P=0.04) differed significantly between PsP and PD. Longitudinal trends in rCBV may be more useful than absolute rCBV in distinguishing PsP from PD in chemoradiation-treated high-grade gliomas with DSC-MRI. Further studies of DSC-MRI in high-grade glioma as a potential technique for distinguishing PsP from PD are indicated.

  2. Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army’s Cyber Operations Officer

    DTIC Science & Technology

    2017-09-01

    For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With...management model. The purpose of our research is to evaluate the effectiveness of that model to recruit Cyber Operations Officers and to examine the...performance (MOPs) and measures of effectiveness (MOEs) based on data collected from: Army institutions; a survey of the Cyber Branch population; and the

  3. Cyber War: The Next Frontier for NATO

    DTIC Science & Technology

    2015-03-01

    cyber-attacks as a way to advance their agenda. Common examples of cyber- attacks include computer viruses, worms , malware, and distributed denial of...take advantage of security holes and cause damage to computer systems, steal financial data, or acquire sensitive secrets. As technology becomes

  4. Optimizing CyberShake Seismic Hazard Workflows for Large HPC Resources

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.

    2014-12-01

    The CyberShake computational platform is a well-integrated collection of scientific software and middleware that calculates 3D simulation-based probabilistic seismic hazard curves and hazard maps for the Los Angeles region. Currently each CyberShake model comprises about 235 million synthetic seismograms from about 415,000 rupture variations computed at 286 sites. CyberShake integrates large-scale parallel and high-throughput serial seismological research codes into a processing framework in which early stages produce files used as inputs by later stages. Scientific workflow tools are used to manage the jobs, data, and metadata. The Southern California Earthquake Center (SCEC) developed the CyberShake platform using USC High Performance Computing and Communications systems and open-science NSF resources.CyberShake calculations were migrated to the NSF Track 1 system NCSA Blue Waters when it became operational in 2013, via an interdisciplinary team approach including domain scientists, computer scientists, and middleware developers. Due to the excellent performance of Blue Waters and CyberShake software optimizations, we reduced the makespan (a measure of wallclock time-to-solution) of a CyberShake study from 1467 to 342 hours. We will describe the technical enhancements behind this improvement, including judicious introduction of new GPU software, improved scientific software components, increased workflow-based automation, and Blue Waters-specific workflow optimizations.Our CyberShake performance improvements highlight the benefits of scientific workflow tools. The CyberShake workflow software stack includes the Pegasus Workflow Management System (Pegasus-WMS, which includes Condor DAGMan), HTCondor, and Globus GRAM, with Pegasus-mpi-cluster managing the high-throughput tasks on the HPC resources. The workflow tools handle data management, automatically transferring about 13 TB back to SCEC storage.We will present performance metrics from the most recent Cyber

  5. Single-shot terahertz time-domain spectroscopy in pulsed high magnetic fields.

    PubMed

    Noe, G Timothy; Katayama, Ikufumi; Katsutani, Fumiya; Allred, James J; Horowitz, Jeffrey A; Sullivan, David M; Zhang, Qi; Sekiguchi, Fumiya; Woods, Gary L; Hoffmann, Matthias C; Nojiri, Hiroyuki; Takeda, Jun; Kono, Junichiro

    2016-12-26

    We have developed a single-shot terahertz time-domain spectrometer to perform optical-pump/terahertz-probe experiments in pulsed, high magnetic fields up to 30 T. The single-shot detection scheme for measuring a terahertz waveform incorporates a reflective echelon to create time-delayed beamlets across the intensity profile of the optical gate beam before it spatially and temporally overlaps with the terahertz radiation in a ZnTe detection crystal. After imaging the gate beam onto a camera, we can retrieve the terahertz time-domain waveform by analyzing the resulting image. To demonstrate the utility of our technique, we measured cyclotron resonance absorption of optically excited carriers in the terahertz frequency range in intrinsic silicon at high magnetic fields, with results that agree well with published values.

  6. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  7. Gelatinisation kinetics of corn and chickpea starches using DSC, RVA, and dynamic rheometry

    USDA-ARS?s Scientific Manuscript database

    The gelatinisation kinetics (non-isothermal) of corn and chickpea starches at different heating rates were calculated using differential scanning calorimetry (DSC), rapid visco analyser (RVA), and oscillatory dynamic rheometry. The data obtained from the DSC thermogram and the RVA profiles were fitt...

  8. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus onmore » our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.« less

  9. How to give a heparin shot

    MedlinePlus

    ... Ask your provider for a chart. Keep your shots 1 inch (2.5 centimeters) away from scars and 2 inches (5 centimeters) away from your navel. DO NOT put a shot in a spot that is bruised, swollen, or ...

  10. CyberPetri at CDX 2016: Real-time Network Situation Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.

    CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.

  11. T1 mapping using saturation recovery single-shot acquisition at 3-tesla magnetic resonance imaging in hypertrophic cardiomyopathy: comparison to late gadolinium enhancement.

    PubMed

    Ogawa, Ryo; Kido, Tomoyuki; Nakamura, Masashi; Kido, Teruhito; Kurata, Akira; Uetani, Teruyoshi; Ogimoto, Akiyoshi; Miyagawa, Masao; Mochizuki, Teruhito

    2017-03-01

    We evaluated the T1 values of segments and slices and the reproducibility in healthy controls, using saturation recovery single-shot acquisition (SASHA) at 3T magnetic resonance imaging. Moreover, we examined the difference in T1 values between hypertrophic cardiomyopathy (HCM) and healthy controls, and compared those with late gadolinium enhancement (LGE). Twenty-one HCM patients and 10 healthy controls underwent T1 mapping before and after contrast administration. T1 values were measured in 12 segments. Native T1 values were significantly longer in HCM than in healthy controls [1373 ms (1312-1452 ms) vs. 1279 ms (1229-1326 ms); p < 0.0001]. Even in HCM segments without LGE, native T1 values were significantly longer than in healthy control segments [1366 ms (1300-1439 ms) vs. 1279 ms (1229-1326 ms); p < 0.0001]. Using a cutoff value of 1327 ms for septal native T1 values, we differentiated between HCM and healthy controls with 95% sensitivity, 90% specificity, 94% accuracy, and an area under the curve of 0.95. Native T1 values using a SASHA at 3T could differentiate HCM from healthy controls. Moreover, native T1 values have the potential to detect abnormal myocardium that cannot be identified adequately by LGE in HCM.

  12. Cyber English

    ERIC Educational Resources Information Center

    Nellen, Ted; Hogue, Dawn; Patterson, Nancy G.; Schulze, Patricia

    2004-01-01

    Four experienced teachers replaced the traditional classroom dynamics and environment having micromanaged routines with CyberEnglish classroom structure that supports scholars' choices and voices. The lack of voice in students' writing was one of the reasons for the changes in the classrooms and exciting results were achieved with different…

  13. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  14. Problematic alcohol use as a risk factor for cyber aggression within romantic relationships.

    PubMed

    Crane, Cory A; Umehira, Nicole; Berbary, Cassandra; Easton, Caroline J

    2018-06-06

    Cyber aggression has emerged as a modern form of intimate partner violence which has yet to undergo sufficient research necessary to identify risk factors that may increase the likelihood or severity of cyber aggressive behavior toward a relationship partner. Prior research offers contradictory findings pertaining to the relationship between problematic alcohol use and cyber aggression. We recruited 100 (40 female) adult participants through online crowdsourcing to complete a series of questionnaires assessing traditional partner violence, cyber aggression, and problematic alcohol use. Forty-two percent of the sample reported perpetrating cyber relational aggression and 35% reported perpetrating cyber privacy invasion during the year prior to study participation. Traditional partner violence was associated with both forms of cyber aggression. Problematic alcohol use was only associated with privacy invasion after accounting for demographic factors and traditional partner violence. Cyber aggression was prevalent among the current adult sample. Results suggest that problematic alcohol use is a risk factor for cyber privacy invasion but not cyber relational aggression. Findings add to and clarify the nascent, conflicting results that have emerged from prior research on alcohol-related cyber aggression. (Am J Addict 2018;XX:1-7). © 2018 American Academy of Addiction Psychiatry.

  15. Diffusion of liquid polystyrene into glassy poly(phenylene oxide) characterized by DSC

    NASA Astrophysics Data System (ADS)

    Li, Linling; Wang, Xiaoliang; Zhou, Dongshan; Xue, Gi

    2013-03-01

    We report a diffusion study on the polystyrene/poly(phenylene oxide) (PS/PPO) mixture consisted by the PS and PPO nanoparticles. Diffusion of liquid PS into glassy PPO (l-PS/g-PPO) is promoted by annealing the PS/PPO mixture at several temperatures below Tg of the PPO. By tracing the Tgs of the PS-rich domain behind the diffusion front using DSC, we get the relationships of PS weight fractions and diffusion front advances with the elapsed diffusion times at different diffusion temperatures using the Gordon-Taylor equation and core-shell model. We find that the plots of weight fraction of PS vs. elapsed diffusion times at different temperatures can be converted to a master curve by Time-Temperature superposition, and the shift factors obey the Arrhenius equation. Besides, the diffusion front advances of l-PS into g-PPO show an excellent agreement with the t1/2 scaling law at the beginning of the diffusion process, and the diffusion coefficients of different diffusion temperatures also obey the Arrhenius equation. We believe the diffusion mechanism for l-PS/g-PPO should be the Fickean law rather than the Case II, though there are departures of original linearity at longer diffusion times due to the limited liquid supply system. Diffusion of liquid polystyrene into glassy poly(phenylene oxide) characterized by DSC

  16. Cyber Deterrence by Engagement and Surprise

    DTIC Science & Technology

    2017-12-21

    virtual, psychological , moral, and physical aspects in an integrated way, thus lever- aging cyber power (i.e. information power) together with...are going to receive if they continue what they are doing. This psychologi - cal state could be reached through a number of factors, to include...dominance if they are integrated appropriately into conventional military capabil- ities.7 An examination of retaliation in the cyber domain reveals

  17. SU-E-T-281: Reduction of Treatment Times in CyberKnife Prostate SBRT Using a Water Filled Rectal Balloon

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Desai, P; Caroprese, B; McKellar, H

    2014-06-01

    Purpose: To illustrate 25% reduction in CyberKnife prostate SBRT treatment times using a water filled rectal balloon. Methods: We perform prostate SBRT using a 3800cGy in 4 fraction regimen prescribed between 51% 59% iso-dose lines to 95% of PTV using a CyberKnife System. The resultant heterogeneous dosimetry is analogous to HDR dosimetry. Our patients are treated in a feet first supine position to decrease treatment couch sag and also to position the prostate anatomy closer to the robot. CT imaging is performed with a Radiadyne Immobiloc rectal balloon filled with 45-50cc water placed firmly inside the patient's rectum. A treatmentmore » plan is developed from this CT study using Multiplan. The patient is treated every other day for 4 days using the rectal balloon for each fraction. Gold fiducials previously implanted inside the prostate are used for tracking by the CyberKnife system. Results: Critical structures comprise the usual GU anatomy of bladder, rectum, urethra, femoral-heads along with emphasis on doses to anterior rectal wall and rectal mucosa. The water filled rectal balloon localizes the rectum, which enables the physician to accurately contour both anterior rectal wall, and rectal mucosa. The balloon also has a gas release valve enabling better patient comfort. Rectum localization enables the CyberKnife system to make fewer corrections resulting in fewer treatment interruptions and time lost to re-adjustment for rectal motion, bowel filling and gas creation. Effective treatment times are reduced by 25% to approximately 45 minutes. Adoption of the balloon has required minimal change to our planning strategy and plan evaluation process. Conclusion: Patient follow-up comparisons show no difference in effectiveness of treatment with and without balloons We conclude that rectal balloons enhance patient comfort and decrease effective treatment times.« less

  18. Distinct Roles of the DmNav and DSC1 Channels in the Action of DDT and Pyrethroids

    PubMed Central

    Rinkevich, Frank D.; Du, Yuzhe; Tolinski, Josh; Ueda, Atsushi; Wu, Chun-Fang; Zhorov, Boris S.; Dong, Ke

    2015-01-01

    Voltage-gated sodium channels (Nav channels) are critical for electrical signaling in the nervous system and are the primary targets of the insecticides DDT and pyrethroids. In Drosophila melanogaster, besides the canonical Nav channel, Para (also called DmNav), there is a sodium channel-like cation channel called DSC1 (Drosophila sodium channel 1). Temperature-sensitive paralytic mutations in DmNav (parats) confer resistance to DDT and pyrethroids, whereas DSC1 knockout flies exhibit enhanced sensitivity to pyrethroids. To further define the roles and interaction of DmNav and DSC1 channels in DDT and pyrethroid neurotoxicology, we generated a DmNav/DSC1 double mutant line by introducing a parats1 allele (carrying the I265N mutation) into a DSC1 knockout line. We confirmed that the I265N mutation reduced the sensitivity to two pyrethroids, permethrin and deltamethrin of a DmNav variant expressed in Xenopus oocytes. Computer modeling predicts that the I265N mutation confers pyrethroid resistance by allosterically altering the second pyrethroid receptor site on the DmNav channel. Furthermore, we found that I265N-mediated pyrethroid resistance in parats1 mutant flies was almost completely abolished in parats1;DSC1−/− double mutant flies. Unexpectedly, however, the DSC1 knockout flies were less sensitive to DDT, compared to the control flies (w1118A), and the parats1;DSC1−/− double mutant flies were even more resistant to DDT compared to the DSC1 knockout or parats1 mutant. Our findings revealed distinct roles of the DmNav and DSC1 channels in the neurotoxicology of DDT vs. pyrethroids and implicate the exciting possibility of using DSC1 channel blockers or modifiers in the management of pyrethroid resistance. PMID:25687544

  19. Distinct roles of the DmNav and DSC1 channels in the action of DDT and pyrethroids.

    PubMed

    Rinkevich, Frank D; Du, Yuzhe; Tolinski, Josh; Ueda, Atsushi; Wu, Chun-Fang; Zhorov, Boris S; Dong, Ke

    2015-03-01

    Voltage-gated sodium channels (Nav channels) are critical for electrical signaling in the nervous system and are the primary targets of the insecticides DDT and pyrethroids. In Drosophila melanogaster, besides the canonical Nav channel, Para (also called DmNav), there is a sodium channel-like cation channel called DSC1 (Drosophila sodium channel 1). Temperature-sensitive paralytic mutations in DmNav (para(ts)) confer resistance to DDT and pyrethroids, whereas DSC1 knockout flies exhibit enhanced sensitivity to pyrethroids. To further define the roles and interaction of DmNav and DSC1 channels in DDT and pyrethroid neurotoxicology, we generated a DmNav/DSC1 double mutant line by introducing a para(ts1) allele (carrying the I265N mutation) into a DSC1 knockout line. We confirmed that the I265N mutation reduced the sensitivity to two pyrethroids, permethrin and deltamethrin of a DmNav variant expressed in Xenopus oocytes. Computer modeling predicts that the I265N mutation confers pyrethroid resistance by allosterically altering the second pyrethroid receptor site on the DmNav channel. Furthermore, we found that I265N-mediated pyrethroid resistance in para(ts1) mutant flies was almost completely abolished in para(ts1);DSC1(-/-) double mutant flies. Unexpectedly, however, the DSC1 knockout flies were less sensitive to DDT, compared to the control flies (w(1118A)), and the para(ts1);DSC1(-/-) double mutant flies were even more resistant to DDT compared to the DSC1 knockout or para(ts1) mutant. Our findings revealed distinct roles of the DmNav and DSC1 channels in the neurotoxicology of DDT vs. pyrethroids and implicate the exciting possibility of using DSC1 channel blockers or modifiers in the management of pyrethroid resistance. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Defense Science Board (DSB) Task Force on Cyber Deterrence

    DTIC Science & Technology

    2017-02-01

    the 2015 cyber heist from the Office of Personnel Management of some 18 million records containing personal information as so egregious as to warrant...major war, including through misperception and inadvertent escalation. The dynamics of cyber offensive weapons will increase challenges to crisis ...may have hoped to gain. − Proposed norms for the conduct of offensive cyber operations, in crisis and conflict. These norms will provide boundaries

  1. A continuous arc delivery optimization algorithm for CyberKnife m6.

    PubMed

    Kearney, Vasant; Descovich, Martina; Sudhyadhom, Atchar; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D

    2018-06-01

    This study aims to reduce the delivery time of CyberKnife m6 treatments by allowing for noncoplanar continuous arc delivery. To achieve this, a novel noncoplanar continuous arc delivery optimization algorithm was developed for the CyberKnife m6 treatment system (CyberArc-m6). CyberArc-m6 uses a five-step overarching strategy, in which an initial set of beam geometries is determined, the robotic delivery path is calculated, direct aperture optimization is conducted, intermediate MLC configurations are extracted, and the final beam weights are computed for the continuous arc radiation source model. This algorithm was implemented on five prostate and three brain patients, previously planned using a conventional step-and-shoot CyberKnife m6 delivery technique. The dosimetric quality of the CyberArc-m6 plans was assessed using locally confined mutual information (LCMI), conformity index (CI), heterogeneity index (HI), and a variety of common clinical dosimetric objectives. Using conservative optimization tuning parameters, CyberArc-m6 plans were able to achieve an average CI difference of 0.036 ± 0.025, an average HI difference of 0.046 ± 0.038, and an average LCMI of 0.920 ± 0.030 compared with the original CyberKnife m6 plans. Including a 5 s per minute image alignment time and a 5-min setup time, conservative CyberArc-m6 plans achieved an average treatment delivery speed up of 1.545x ± 0.305x compared with step-and-shoot plans. The CyberArc-m6 algorithm was able to achieve dosimetrically similar plans compared to their step-and-shoot CyberKnife m6 counterparts, while simultaneously reducing treatment delivery times. © 2018 American Association of Physicists in Medicine.

  2. Influence of Running on Pistol Shot Hit Patterns.

    PubMed

    Kerkhoff, Wim; Bolck, Annabel; Mattijssen, Erwin J A T

    2016-01-01

    In shooting scene reconstructions, risk assessment of the situation can be important for the legal system. Shooting accuracy and precision, and thus risk assessment, might be correlated with the shooter's physical movement and experience. The hit patterns of inexperienced and experienced shooters, while shooting stationary (10 shots) and in running motion (10 shots) with a semi-automatic pistol, were compared visually (with confidence ellipses) and statistically. The results show a significant difference in precision (circumference of the hit patterns) between stationary shots and shots fired in motion for both inexperienced and experienced shooters. The decrease in precision for all shooters was significantly larger in the y-direction than in the x-direction. The precision of the experienced shooters is overall better than that of the inexperienced shooters. No significant change in accuracy (shift in the hit pattern center) between stationary shots and shots fired in motion can be seen for all shooters. © 2015 American Academy of Forensic Sciences.

  3. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  4. Emotional Problems in Traditional and Cyber Victimization

    ERIC Educational Resources Information Center

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  5. Human Subject Research Protocol: Computer-Aided Human Centric Cyber Situation Awareness: Understanding Cognitive Processes of Cyber Analysts

    DTIC Science & Technology

    2013-11-01

    by existing cyber-attack detection tools far exceeds the analysts’ cognitive capabilities. Grounded in perceptual and cognitive theory , many visual...Processes Inspired by the sense-making theory discussed earlier, we model the analytical reasoning process of cyber analysts using three key...analyst are called “working hypotheses”); each hypothesis could trigger further actions to confirm or disconfirm it. New actions will lead to new

  6. Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense

    DTIC Science & Technology

    2017-03-06

    analogy (e.g., Susceptible, Infected, Recovered [SIR]) • Abstract wargaming: game -theoretic model of cyber conflict without modeling the underlying...malware. 3.7 Abstract Wargaming Here, a game -theoretic process is modeled with moves and effects inspired by cyber conflict but without modeling the...underlying processes of cyber attack and defense. Examples in literature include the following: • Cho J-H, Gao J. Cyber war game in temporal networks

  7. Implementation of DSC model and application for analysis of field pile tests under cyclic loading

    NASA Astrophysics Data System (ADS)

    Shao, Changming; Desai, Chandra S.

    2000-05-01

    The disturbed state concept (DSC) model, and a new and simplified procedure for unloading and reloading behavior are implemented in a nonlinear finite element procedure for dynamic analysis for coupled response of saturated porous materials. The DSC model is used to characterize the cyclic behavior of saturated clays and clay-steel interfaces. In the DSC, the relative intact (RI) behavior is characterized by using the hierarchical single surface (HISS) plasticity model; and the fully adjusted (FA) behavior is modeled by using the critical state concept. The DSC model is validated with respect to laboratory triaxial tests for clay and shear tests for clay-steel interfaces. The computer procedure is used to predict field behavior of an instrumented pile subjected to cyclic loading. The predictions provide very good correlation with the field data. They also yield improved results compared to those from a HISS model with anisotropic hardening, partly because the DSC model allows for degradation or softening and interface response.

  8. Neural Cognition and Affective Computing on Cyber Language.

    PubMed

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana; Yu, Xueer

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space.

  9. Neural Cognition and Affective Computing on Cyber Language

    PubMed Central

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space. PMID:26491431

  10. CyberEconomics.

    ERIC Educational Resources Information Center

    Schenk, Robert

    2003-01-01

    Describes CyberEconomics, a complete, free, two-semester principles of economics textbook available on the World Wide Web. Contains chapters, sections, a table of contents, a set of learning objectives, and links to chapter introductions and sections. Offers a CD-ROM version available for a fee that contains interactive review questions. (JEH)

  11. Single-shot terahertz time-domain spectroscopy in pulsed high magnetic fields

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Noe, II, G. Timothy; Katayama, Ikufumi; Katsutani, Fumiya

    Here, we have developed a single-shot terahertz time-domain spectrometer to perform optical-pump/terahertz-probe experiments in pulsed, high magnetic fields up to 30 T. The single-shot detection scheme for measuring a terahertz waveform incorporates a reflective echelon to create time-delayed beamlets across the intensity profile of the optical gate beam before it spatially and temporally overlaps with the terahertz radiation in a ZnTe detection crystal. After imaging the gate beam onto a camera, we can retrieve the terahertz time-domain waveform by analyzing the resulting image. To demonstrate the utility of our technique, we measured cyclotron resonance absorption of optically excited carriers inmore » the terahertz frequency range in intrinsic silicon at high magnetic fields, with results that agree well with published values.« less

  12. Single-shot terahertz time-domain spectroscopy in pulsed high magnetic fields

    DOE PAGES

    Noe, II, G. Timothy; Katayama, Ikufumi; Katsutani, Fumiya; ...

    2016-12-22

    Here, we have developed a single-shot terahertz time-domain spectrometer to perform optical-pump/terahertz-probe experiments in pulsed, high magnetic fields up to 30 T. The single-shot detection scheme for measuring a terahertz waveform incorporates a reflective echelon to create time-delayed beamlets across the intensity profile of the optical gate beam before it spatially and temporally overlaps with the terahertz radiation in a ZnTe detection crystal. After imaging the gate beam onto a camera, we can retrieve the terahertz time-domain waveform by analyzing the resulting image. To demonstrate the utility of our technique, we measured cyclotron resonance absorption of optically excited carriers inmore » the terahertz frequency range in intrinsic silicon at high magnetic fields, with results that agree well with published values.« less

  13. Shot Peening Numerical Simulation of Aircraft Aluminum Alloy Structure

    NASA Astrophysics Data System (ADS)

    Liu, Yong; Lv, Sheng-Li; Zhang, Wei

    2018-03-01

    After shot peening, the 7050 aluminum alloy has good anti-fatigue and anti-stress corrosion properties. In the shot peening process, the pellet collides with target material randomly, and generated residual stress distribution on the target material surface, which has great significance to improve material property. In this paper, a simplified numerical simulation model of shot peening was established. The influence of pellet collision velocity, pellet collision position and pellet collision time interval on the residual stress of shot peening was studied, which is simulated by the ANSYS/LS-DYNA software. The analysis results show that different velocity, different positions and different time intervals have great influence on the residual stress after shot peening. Comparing with the numerical simulation results based on Kriging model, the accuracy of the simulation results in this paper was verified. This study provides a reference for the optimization of the shot peening process, and makes an effective exploration for the precise shot peening numerical simulation.

  14. Dialog detection in narrative video by shot and face analysis

    NASA Astrophysics Data System (ADS)

    Kroon, B.; Nesvadba, J.; Hanjalic, A.

    2007-01-01

    The proliferation of captured personal and broadcast content in personal consumer archives necessitates comfortable access to stored audiovisual content. Intuitive retrieval and navigation solutions require however a semantic level that cannot be reached by generic multimedia content analysis alone. A fusion with film grammar rules can help to boost the reliability significantly. The current paper describes the fusion of low-level content analysis cues including face parameters and inter-shot similarities to segment commercial content into film grammar rule-based entities and subsequently classify those sequences into so-called shot reverse shots, i.e. dialog sequences. Moreover shot reverse shot specific mid-level cues are analyzed augmenting the shot reverse shot information with dialog specific descriptions.

  15. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  16. Interview with a Cyber-Student: A Look behind Online Cheating

    ERIC Educational Resources Information Center

    Davis, Julia

    2014-01-01

    This case study offers insights into the motivation and experiences of a cyber-student, an individual who completes all or portions of an online class for the registered student. The cyber-student shares information on the inner-workings of online companies specializing in matching cyber-students with potential clients. A portrait of both a…

  17. Serious Hazards of Transfusion (SHOT) haemovigilance and progress is improving transfusion safety

    PubMed Central

    Bolton-Maggs, Paula H B; Cohen, Hannah

    2013-01-01

    Summary The Serious Hazards of Transfusion (SHOT) UK confidential haemovigilance reporting scheme began in 1996. Over the 16 years of reporting, the evidence gathered has prompted changes in transfusion practice from the selection and management of donors to changes in hospital practice, particularly better education and training. However, half or more reports relate to errors in the transfusion process despite the introduction of several measures to improve practice. Transfusion in the UK is very safe: 2·9 million components were issued in 2012, and very few deaths are related to transfusion. The risk of death from transfusion as estimated from SHOT data in 2012 is 1 in 322 580 components issued and for major morbidity, 1 in 21 413 components issued; the risk of transfusion-transmitted infection is much lower. Acute transfusion reactions and transfusion-associated circulatory overload carry the highest risk for morbidity and death. The high rate of participation in SHOT by National Health Service organizations, 99·5%, is encouraging. Despite the very useful information gained about transfusion reactions, the main risks remain human factors. The recommendations on reduction of errors through a ‘back to basics’ approach from the first annual SHOT report remain absolutely relevant today. PMID:24032719

  18. Kicking the digital dog: a longitudinal investigation of young adults' victimization and cyber-displaced aggression.

    PubMed

    Wright, Michelle F; Li, Yan

    2012-09-01

    Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced aggression. Findings indicated that victimization in both social contexts (face-to-face and cyber) contributed to cyber-displaced aggression 6 months later (Time 2), after controlling for gender, cyber aggression, face-to-face displaced aggression, and cyber-displaced aggression at Time 1. A significant two-way interaction revealed that Time 1 cyber victimization was more strongly related to Time 2 cyber-displaced aggression when young adults had higher levels of face-to-face victimization at Time 1. Implications of these findings are discussed as well as a call for more research investigating displaced aggression in the cyber context.

  19. Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.

    PubMed

    Modecki, Kathryn L; Minchin, Jeannie; Harbaugh, Allen G; Guerra, Nancy G; Runions, Kevin C

    2014-11-01

    Bullying involvement in any form can have lasting physical and emotional consequences for adolescents. For programs and policies to best safeguard youth, it is important to understand prevalence of bullying across cyber and traditional contexts. We conducted a thorough review of the literature and identified 80 studies that reported corresponding prevalence rates for cyber and traditional bullying and/or aggression in adolescents. Weighted mean effect sizes were calculated, and measurement features were entered as moderators to explain variation in prevalence rates and in traditional-cyber correlations within the sample of studies. Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber and traditional bullying were highly correlated. A number of measurement features moderated variability in bullying prevalence; whereas a focus on traditional relational aggression increased correlations between cyber and traditional aggressions. In our meta-analytic review, traditional bullying was twice as common as cyber bullying. Cyber and traditional bullying were also highly correlated, suggesting that polyaggression involvement should be a primary target for interventions and policy. Results of moderation analyses highlight the need for greater consensus in measurement approaches for both cyber and traditional bullying. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Hepatitis A and the Vaccine (Shot) to Prevent It

    MedlinePlus

    ... Resources Maternal Immunization Resources Related Links Vaccines & Immunizations Hepatitis A and the Vaccine (Shot) to Prevent It ... the vaccine. Why should my child get the hepatitis A shot? The hepatitis A shot: Protects your ...

  1. Functional characterization of the Dsc E3 ligase complex in the citrus postharvest pathogen Penicillium digitatum.

    PubMed

    Ruan, Ruoxin; Chung, Kuang-Ren; Li, Hongye

    2017-12-01

    Sterol regulatory element binding proteins (SREBPs) are required for sterol homeostasis in eukaryotes. Activation of SREBPs is regulated by the Dsc E3 ligase complex in Schizosaccharomyces pombe and Aspergillus spp. Previous studies indicated that an SREBP-coding gene PdsreA is required for fungicide resistance and ergosterol biosynthesis in the citrus postharvest pathogen Penicillium digitatum. In this study, five genes, designated PddscA, PddscB, PddscC, PddscD, and PddscE encoding the Dsc E3 ligase complex were characterized to be required for fungicide resistance, ergosterol biosynthesis and CoCl 2 tolerance in P. digitatum. Each of the dsc genes was inactivated by target gene disruption and the resulted phenotypes were analyzed and compared. Genetic analysis reveals that, of five Dsc complex components, PddscB is the core subunit gene in P. digitatum. Although the resultant dsc mutants were able to infect citrus fruit and induce maceration lesions as the wild-type, the mutants rarely produced aerial mycelia on affected citrus fruit peels. P. digitatum Dsc proteins regulated not only the expression of genes involved in ergosterol biosynthesis but also that of PdsreA. Yeast two-hybrid assays revealed a direct interaction between the PdSreA protein and the Dsc proteins. Ectopic expression of the PdSreA N-terminus restored fungicide resistance in the dsc mutants. Our results provide important evidence to understand the mechanisms underlying SREBP activation and regulation of ergosterol biosynthesis in plant pathogenic fungi. Copyright © 2017 Elsevier GmbH. All rights reserved.

  2. Middle School Students' Perceptions of and Responses to Cyber Bullying

    ERIC Educational Resources Information Center

    Holfeld, Brett; Grabe, Mark

    2012-01-01

    This study explored the nature and extent of middle school students' (n = 665) experiences with cyber bullying. Approximately one in five students reported being cyber bullied in the past year, with 55% of those students being repeatedly victimized within the past 30 days. Female students were more likely to be involved in cyber bullying (victim,…

  3. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    ERIC Educational Resources Information Center

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  4. CyberShake Physics-Based PSHA in Central California

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Goulet, C. A.; Milner, K. R.; Graves, R. W.; Olsen, K. B.; Jordan, T. H.

    2017-12-01

    The Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, which performs physics-based probabilistic seismic hazard analyis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by simulating a wavefield of Strain Green Tensors. An earthquake rupture forecast (ERF) is then extended by varying hypocenters and slips on finite faults, generating about 500,000 events per site of interest. Seismic reciprocity is used to calculate synthetic seismograms, which are processed to obtain intensity measures (IMs) such as RotD100. These are combined with ERF probabilities to produce hazard curves. PSHA results from hundreds of locations across a region are interpolated to produce a hazard map. CyberShake simulations with SCEC 3D Community Velocity Models have shown how the site and path effects vary with differences in upper crustal structure, and they are particularly informative about epistemic uncertainties in basin effects, which are not well parameterized by depths to iso-velocity surfaces, common inputs to GMPEs. In 2017, SCEC performed CyberShake Study 17.3, expanding into Central California for the first time. Seismic hazard calculations were performed at 1 Hz at 438 sites, using both a 3D tomographically-derived central California velocity model and a regionally averaged 1D model. Our simulation volumes extended outside of Central California, so we included other SCEC velocity models and developed a smoothing algorithm to minimize reflection and refraction effects along interfaces. CyberShake Study 17.3 ran for 31 days on NCSA's Blue Waters and ORNL's Titan supercomputers, burning 21.6 million core-hours and producing 285 million two-component seismograms and 43 billion IMs. These results demonstrate that CyberShake can be successfully expanded into new regions, and lend insights into the effects of directivity-basin coupling associated with basins near major faults such as the San Andreas. In

  5. Shot model parameters for Cygnus X-1 through phase portrait fitting

    NASA Technical Reports Server (NTRS)

    Lochner, James C.; Swank, J. H.; Szymkowiak, A. E.

    1991-01-01

    Shot models for systems having about 1/f power density spectrum are developed by utilizing a distribution of shot durations. Parameters of the distribution are determined by fitting the power spectrum either with analytic forms for the spectrum of a shot model with a given shot profile, or with the spectrum derived from numerical realizations of trial shot models. The shot fraction is specified by fitting the phase portrait, which is a plot of intensity at a given time versus intensity at a delayed time and in principle is sensitive to different shot profiles. These techniques have been extensively applied to the X-ray variability of Cygnus X-1, using HEAO 1 A-2 and an Exosat ME observation. The power spectra suggest models having characteristic shot durations lasting from milliseconds to a few seconds, while the phase portrait fits give shot fractions of about 50 percent. Best fits to the portraits are obtained if the amplitude of the shot is a power-law function of the duration of the shot. These fits prefer shots having a symmetric exponential rise and decay. Results are interpreted in terms of a distribution of magnetic flares in the accretion disk.

  6. TCIA Secure Cyber Critical Infrastructure Modernization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  7. 9.4T Human MRI: Preliminary Results

    PubMed Central

    Vaughan, Thomas; DelaBarre, Lance; Snyder, Carl; Tian, Jinfeng; Akgun, Can; Shrivastava, Devashish; Liu, Wanzahn; Olson, Chris; Adriany, Gregor; Strupp, John; Andersen, Peter; Gopinath, Anand; van de Moortele, Pierre-Francois; Garwood, Michael; Ugurbil, Kamil

    2014-01-01

    This work reports the preliminary results of the first human images at the new high-field benchmark of 9.4T. A 65-cm-diameter bore magnet was used together with an asymmetric 40-cm-diameter head gradient and shim set. A multichannel transmission line (transverse electromagnetic (TEM)) head coil was driven by a programmable parallel transceiver to control the relative phase and magnitude of each channel independently. These new RF field control methods facilitated compensation for RF artifacts attributed to destructive interference patterns, in order to achieve homogeneous 9.4T head images or localize anatomic targets. Prior to FDA investigational device exemptions (IDEs) and internal review board (IRB)-approved human studies, preliminary RF safety studies were performed on porcine models. These data are reported together with exit interview results from the first 44 human volunteers. Although several points for improvement are discussed, the preliminary results demonstrate the feasibility of safe and successful human imaging at 9.4T. PMID:17075852

  8. RPD-based Hypothesis Reasoning for Cyber Situation Awareness

    NASA Astrophysics Data System (ADS)

    Yen, John; McNeese, Michael; Mullen, Tracy; Hall, David; Fan, Xiaocong; Liu, Peng

    Intelligence workers such as analysts, commanders, and soldiers often need a hypothesis reasoning framework to gain improved situation awareness of the highly dynamic cyber space. The development of such a framework requires the integration of interdisciplinary techniques, including supports for distributed cognition (human-in-the-loop hypothesis generation), supports for team collaboration (identification of information for hypothesis evaluation), and supports for resource-constrained information collection (hypotheses competing for information collection resources). We here describe a cognitively-inspired framework that is built upon Klein’s recognition-primed decision model and integrates the three components of Endsley’s situation awareness model. The framework naturally connects the logic world of tools for cyber situation awareness with the mental world of human analysts, enabling the perception, comprehension, and prediction of cyber situations for better prevention, survival, and response to cyber attacks by adapting missions at the operational, tactical, and strategic levels.

  9. Value of a single-shot turbo spin-echo pulse sequence for assessing the architecture of the subarachnoid space and the constitutive nature of cerebrospinal fluid.

    PubMed

    Pease, Anthony; Sullivan, Stacey; Olby, Natasha; Galano, Heather; Cerda-Gonzalez, Sophia; Robertson, Ian D; Gavin, Patrick; Thrall, Donald

    2006-01-01

    Three case history reports are presented to illustrate the value of the single-shot turbo spin-echo pulse sequence for assessment of the subarachnoid space. The use of the single-shot turbo spin-echo pulse sequence, which is a heavily T2-weighted sequence, allows for a rapid, noninvasive evaluation of the subarachnoid space by using the high signal from cerebrospinal fluid. This sequence can be completed in seconds rather than the several minutes required for a T2-fast spin-echo sequence. Unlike the standard T2-fast spin-echo sequence, a single-shot turbo spin-echo pulse sequence also provides qualitative information about the protein and the cellular content of the cerebrospinal fluid, such as in patients with inflammatory debris or hemorrhage in the cerebrospinal fluid. Although the resolution of the single-shot turbo spin-echo pulse sequence images is relatively poor compared with more conventional sequences, the qualitative information about the subarachnoid space and cerebrospinal fluid and the rapid acquisition time, make it a useful sequence to include in standard protocols of spinal magnetic resonance imaging.

  10. One-shot estimate of MRMC variance: AUC.

    PubMed

    Gallas, Brandon D

    2006-03-01

    One popular study design for estimating the area under the receiver operating characteristic curve (AUC) is the one in which a set of readers reads a set of cases: a fully crossed design in which every reader reads every case. The variability of the subsequent reader-averaged AUC has two sources: the multiple readers and the multiple cases (MRMC). In this article, we present a nonparametric estimate for the variance of the reader-averaged AUC that is unbiased and does not use resampling tools. The one-shot estimate is based on the MRMC variance derived by the mechanistic approach of Barrett et al. (2005), as well as the nonparametric variance of a single-reader AUC derived in the literature on U statistics. We investigate the bias and variance properties of the one-shot estimate through a set of Monte Carlo simulations with simulated model observers and images. The different simulation configurations vary numbers of readers and cases, amounts of image noise and internal noise, as well as how the readers are constructed. We compare the one-shot estimate to a method that uses the jackknife resampling technique with an analysis of variance model at its foundation (Dorfman et al. 1992). The name one-shot highlights that resampling is not used. The one-shot and jackknife estimators behave similarly, with the one-shot being marginally more efficient when the number of cases is small. We have derived a one-shot estimate of the MRMC variance of AUC that is based on a probabilistic foundation with limited assumptions, is unbiased, and compares favorably to an established estimate.

  11. SU-D-18C-02: Feasibility of Using a Short ASL Scan for Calibrating Cerebral Blood Flow Obtained From DSC-MRI

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, P; Chang, T; Huang, K

    2014-06-01

    Purpose: This study aimed to evaluate the feasibility of using a short arterial spin labeling (ASL) scan for calibrating the dynamic susceptibility contrast- (DSC-) MRI in a group of patients with internal carotid artery stenosis. Methods: Six patients with unilateral ICA stenosis enrolled in the study on a 3T clinical MRI scanner. The ASL-cerebral blood flow (-CBF) maps were calculated by averaging different number of dynamic points (N=1-45) acquired by using a Q2TIPS sequence. For DSC perfusion analysis, arterial input function was selected to derive the relative cerebral blood flow (rCBF) map and the delay (Tmax) map. Patient-specific CF wasmore » calculated from the mean ASL- and DSC-CBF obtained from three different masks: (1)Tmax< 3s, (2)combined gray matter mask with mask 1, (3)mask 2 with large vessels removed. One CF value was created for each number of averages by using each of the three masks for calibrating the DSC-CBF map. The CF value of the largest number of averages (NL=45) was used to determine the acceptable range(< 10%, <15%, and <20%) of CF values corresponding to the minimally acceptable number of average (NS) for each patient. Results: Comparing DSC CBF maps corrected by CF values of NL (CBFL) in ACA, MCA and PCA territories, all masks resulted in smaller CBF on the ipsilateral side than the contralateral side of the MCA territory(p<.05). The values obtained from mask 1 were significantly different than the mask 3(p<.05). Using mask 3, the medium values of Ns were 4(<10%), 2(<15%) and 2(<20%), with the worst case scenario (maximum Ns) of 25, 4, and 4, respectively. Conclusion: This study found that reliable calibration of DSC-CBF can be achieved from a short pulsed ASL scan. We suggested use a mask based on the Tmax threshold, the inclusion of gray matter only and the exclusion of large vessels for performing the calibration.« less

  12. Degradation of components in drug formulations: a comparison between HPLC and DSC methods.

    PubMed

    Ceschel, G C; Badiello, R; Ronchi, C; Maffei, P

    2003-08-08

    Information about the stability of drug components and drug formulations is needed to predict the shelf-life of the final products. The studies on the interaction between the drug and the excipients may be carried out by means of accelerated stability tests followed by analytical determination of the active principle (HPLC and other methods) and by means of the differential scanning calorimetry (DSC). This research has been focused to the acetyl salicylic acid (ASA) physical-chemical characterisation by using DSC method in order to evaluate its compatibility with some of the most used excipients. It was possible to show, with the DSC method, the incompatibility of magnesium stearate with ASA; the HPLC data confirm the reduction of ASA concentration in the presence of magnesium stearate. With the other excipients the characteristic endotherms of the drug were always present and no or little degradation was observed with the accelerated stability tests. Therefore, the results with the DSC method are comparable and in good agreement with the results obtained with other methods.

  13. Empirical analysis of the effects of cyber security incidents.

    PubMed

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  14. One-shot Synesthesia.

    PubMed

    Kirschner, Alexandra; Nikolić, Danko

    2017-01-01

    Synesthesia is commonly thought to be a phenomenon of fixed associations between an outside inducer and a vivid concurrent experience. Hence, it has been proposed that synesthesia occurs due to additional connections in the brain with which synesthetes are born. Here we show that synesthesia can be a much richer and more flexible phenomenon with a capability to creatively construct novel synesthetic experiences as events unfold in people's lives. We describe here cases of synesthetes who occasionally generate novel synesthetic experience, called one-shot synesthesias. These synesthetic experiences seem to share all the properties with the classical synesthetic associations except that they occur extremely rarely, people recalling only a few events over the lifetime. It appears that these one-shots are not created at random but are instead responses to specific life events. We contrast the properties of those rare synesthetic events with other, more commonly known forms of synesthesia that also create novel synesthetic experiences, but at a high rate-sometimes creating novel experiences every few seconds. We argue that one-shot synesthesias indicate that synesthetic associations are by their nature not prewired at birth but are dynamically constructed through mental operations and according to the needs of a synesthetic mind. Our conclusions have implications for understanding the biological underpinnings of synesthesia and the role the phenomenon plays in the lives of people endowed with synesthetic capacities.

  15. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyers, C A; Powers, S S; Faissol, D M

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform futuremore » studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.« less

  16. 7 Key Challenges for Visualization in Cyber Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  17. Analyzing Online Teacher Networks: Cyber Networks Require Cyber Research Tools

    ERIC Educational Resources Information Center

    Schlager, Mark S.; Farooq, Umer; Fusco, Judith; Schank, Patricia; Dwyer, Nathan

    2009-01-01

    The authors argue that conceptual and methodological limitations in existing research approaches severely hamper theory building and empirical exploration of teacher learning and collaboration through cyber-enabled networks. They conclude that new frameworks, tools, and techniques are needed to understand and maximize the benefits of teacher…

  18. SunShot Initiative Portfolio Book 2014

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solar Energy Technologies Office

    2014-05-01

    The 2014 SunShot Initiative Portfolio Book outlines the progress towards the goals outlined in the SunShot Vision Study. Contents include overviews of each of SunShot’s five subprogram areas, as well as a description of every active project in the SunShot’s project portfolio as of May 2014.

  19. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  20. Cyber incivility @ work: the new age of interpersonal deviance.

    PubMed

    Giumetti, Gary W; McKibben, Eric S; Hatfield, Andrea L; Schroeder, Amber N; Kowalski, Robin M

    2012-03-01

    The current study was designed to extend the interpersonal deviance literature into the online domain by examining the incidence and impact of supervisor cyber incivility and neuroticism on employee outcomes at work. Conservation of Resources (COR) theory was used as the guiding framework because cyber incivility is thought to deplete energetic resources in much the same way that other stressors do, ultimately leading to negative outcomes like burnout. Results indicate that supervisor cyber incivility is positively related to burnout, absenteeism, and turnover intentions. Support was also found for the role of neuroticism as a moderator of the relationship between supervisor cyber incivility and outcomes. In general, the relations between cyber incivility and outcomes were stronger for those individuals reporting higher levels of neuroticism. Results are discussed in terms of COR theory, and possible mechanisms for the role of neuroticism in the stressor-strain relationship are discussed. The current study highlights the importance of understanding workplace online behavior and its impact on employee health and organizational well-being. Future research directions examining online interpersonal deviance are suggested.

  1. Psychometric properties of the Florence CyberBullying-CyberVictimization Scales.

    PubMed

    Palladino, Benedetta Emanuela; Nocentini, Annalaura; Menesini, Ersilia

    2015-02-01

    The present study tried to answer the research need for empirically validated and theoretically based instruments to assess cyberbullying and cybervictimization. The psychometric properties of the Florence CyberBullying-CyberVictimization Scales (FCBVSs) were analyzed in a sample of 1,142 adolescents (Mage=15.18 years; SD=1.12 years; 54.5% male). For both cybervictimization and cyberbullying, results support a gender invariant model involving 14 items and four factors covering four types of behaviors (written-verbal, visual, impersonation, and exclusion). The second-order confirmatory factor analysis confirmed that a "global," second-order measure of cyberbullying and cybervictimization fits the data well. Overall, the scales showed good validity (construct, concurrent, and convergent) and reliability (internal consistency and test-retest). In addition, using the global key question measure as a criterion, ROC analyses, determining the ability of a test to discriminate between groups, allowed us to identify cutoff points to classify respondents as involved/not involved starting from the continuum measure derived from the scales.

  2. Resilience of Cyber Systems with Over- and Underregulation.

    PubMed

    Gisladottir, Viktoria; Ganin, Alexander A; Keisler, Jeffrey M; Kepner, Jeremy; Linkov, Igor

    2017-09-01

    Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber defense strategies. This unintentionally increases time and effort that employees spend on training and policy implementation and decreases the time and latitude to perform critical job functions, thus raising overall levels of stress. People's performance under stress, coupled with an overabundance of information, results in even more vulnerabilities for adversaries to exploit. In this article, we embed a simple regulatory model that accounts for cybersecurity human factors and an organization's regulatory environment in a model of a corporate cyber network under attack. The resulting model demonstrates the effect of under- and overregulation on an organization's resilience with respect to insider threats. Currently, there is a tendency to use ad-hoc approaches to account for human factors rather than to incorporate them into cyber resilience modeling. It is clear that using a systematic approach utilizing behavioral science, which already exists in cyber resilience assessment, would provide a more holistic view for decisionmakers. © 2016 Society for Risk Analysis.

  3. Rolling contact fatigue strengths of shot-peened and crack-healed ceramics

    NASA Astrophysics Data System (ADS)

    Takahashi, K.; Oki, T.

    2018-06-01

    The effects of shot-peening (SP) and crack-healing on the rolling contact fatigue (RCF) strengths of Al2O3/SiC composite ceramics were investigated. Non-shot-peened, shot- peened, and shot-peened + crack-healed specimens were prepared. SP was performed using ZrO2 beads. The shot-peened + crack-healed specimen was crack-healed after SP. X-ray diffraction clearly showed that SP induced a compressive residual stress up to 300 MPa at the specimen surfaces. Furthermore, the shot-peened + crack-healed specimen retained a compressive residual stress of 200 MPa. The apparent surface fracture toughness of the shot- peened specimens increased owing to the positive effects of the compressive residual stress. RCF tests were performed using a thrust load-bearing test device. The RCF lives of the shot- peened specimens did not improve compared to that of the non-shot-peened specimen, because the numerous SP-introduced surface cracks could act as crack initiation sites during the RCF tests. However, the RCF life of the shot-peened + crack-healed specimen did improve compared to those of non-shot-peened and shot-peened specimens, implying that combining SP and crack-healing was an effective strategy for improving the RCF lives of Al2O3/SiC composite ceramics.

  4. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  5. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  6. R&D100 Finalist: Neuromorphic Cyber Microscope

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Follett, David; Naegle, John; Suppona, Roger

    The Neuromorphic Cyber Microscope provides security analysts with unprecedented visibility of their network, computer and storage assets. This processor is the world's first practical implementation of neuromorphic technology to a major computer science mission. Working with Lewis Rhodes Labs, engineers at Sandia National Laboratories have created a device that is orders of magnitude faster at analyzing data to identify cyber-attacks.

  7. Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students

    ERIC Educational Resources Information Center

    Dilmac, Bulent

    2009-01-01

    Recent surveys show that cyber bullying is a pervasive problem in North America. Many news stories have reported cyber bullying incidents around the world. Reports on the prevalence of cyber bullying and victimization as a result of cyber bullying increase yearly. Although we know what cyber bullying is it is important that we learn more about the…

  8. An analytic approach to cyber adversarial dynamics

    NASA Astrophysics Data System (ADS)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  9. Full report of laser doppler velocimetry (Het-V) data, results , and analysis for pRad shot 0632

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tupa, Dale; Tainter, Amy Marie

    This was a collaborative shot with AWE investigators Paul Willis-Patel, David Bell, Seth Grant, David Tarr, and James Richley. The shot was assembled in Los Alamos, after which David Bell set up the probe holder and finalized the alignment. The probe holder location and configuration was modified from previous years to make room for the laser illuminated visible imaging diagnostic. The LANL pRad PDV team was Dale Tupa, Amy Tainter, and Patrick Medina. This shot had three PDV probes: one aimed at the center, one aimed at a feature, one aimed at the reverse side of the shot. The shotmore » also had 9 points of a spectroscopy diagnostic. The pRad team helped set up and field the spectroscopy, but did not help with any data analysis. (The support documentation for the PDV results includes a timing map for the spectroscopy.) Please direct questions on the velocimetry to Dale Tupa or Amy Tainter. The shot radiographs were classified, but the data from the optical diagnostics are not.« less

  10. Investigation of Phase Mixing in Amorphous Solid Dispersions of AMG 517 in HPMC-AS Using DSC, Solid-State NMR, and Solution Calorimetry.

    PubMed

    Calahan, Julie L; Azali, Stephanie C; Munson, Eric J; Nagapudi, Karthik

    2015-11-02

    Intimate phase mixing between the drug and the polymer is considered a prerequisite to achieve good physical stability for amorphous solid dispersions. In this article, spray dried amorphous dispersions (ASDs) of AMG 517 and HPMC-as were studied by differential scanning calorimetry (DSC), solid-state NMR (SSNMR), and solution calorimetry. DSC analysis showed a weakly asymmetric (ΔTg ≈ 13.5) system with a single glass transition for blends of different compositions indicating phase mixing. The Tg-composition data was modeled using the BKCV equation to accommodate the observed negative deviation from ideality. Proton spin-lattice relaxation times in the laboratory and rotating frames ((1)H T1 and T1ρ), as measured by SSNMR, were consistent with the observation that the components of the dispersion were in intimate contact over a 10-20 nm length scale. Based on the heat of mixing calculated from solution calorimetry and the entropy of mixing calculated from the Flory-Huggins theory, the free energy of mixing was calculated. The free energy of mixing was found to be positive for all ASDs, indicating that the drug and polymer are thermodynamically predisposed to phase separation at 25 °C. This suggests that miscibility measured by DSC and SSNMR is achieved kinetically as the result of intimate mixing between drug and polymer during the spray drying process. This kinetic phase mixing is responsible for the physical stability of the ASD.

  11. Cyber Astronomy: A Cyber University Course for School Students

    ERIC Educational Resources Information Center

    Chan, C. W.; Wong, K. Y. Michael

    2003-01-01

    Teaching university physics through the internet is not new, but a new course providing the same service for secondary school students is the first of its kind in Hong Kong. Taking advantage of the fast and affordable broadband internet in the region, some university courses have been converted to a cyber curriculum suitable for secondary school…

  12. Lead shot incidence on a New Mexico public hunting area

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schranck, B.W.; Dollahon, G.R.

    The incidence of lead shot was investigated on a 20.2-ha (50-acre) seasonal marsh used for waterfowl hunting at the Bitter Lake National Wildlife Refuge, Roswell, New Mexico. Of the 162 soil samples taken randomly, 59% contained 1 to 5 lead shot. A minimum lead shot incidence of 98,985 shot per ha (40,075 per acre) was calculated. More shot was found in firm than in mucky soils. Management recommendations to limit waterfowl exposure to lead ingestion are offered.

  13. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  14. Phase-Space Detection of Cyber Events

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Ferber, Aaron E; Prowell, Stacy J

    Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The datamore » analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.« less

  15. Cyber Warfare as a Form of Conflict: Evaluation of Models of Cyber Conflict as a Prototype to Conceptual Analysis

    ERIC Educational Resources Information Center

    Liles, Samuel P.

    2012-01-01

    In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…

  16. Feasibility Study on Applying Radiophotoluminescent Glass Dosimeters for CyberKnife SRS Dose Verification

    PubMed Central

    Hsu, Shih-Ming; Hung, Chao-Hsiung; Liao, Yi-Jen; Fu, Hsiao-Mei; Tsai, Jo-Ting

    2017-01-01

    CyberKnife is one of multiple modalities for stereotactic radiosurgery (SRS). Due to the nature of CyberKnife and the characteristics of SRS, dose evaluation of the CyberKnife procedure is critical. A radiophotoluminescent glass dosimeter was used to verify the dose accuracy for the CyberKnife procedure and validate a viable dose verification system for CyberKnife treatment. A radiophotoluminescent glass dosimeter, thermoluminescent dosimeter, and Kodak EDR2 film were used to measure the lateral dose profile and percent depth dose of CyberKnife. A Monte Carlo simulation for dose verification was performed using BEAMnrc to verify the measured results. This study also used a radiophotoluminescent glass dosimeter coupled with an anthropomorphic phantom to evaluate the accuracy of the dose given by CyberKnife. Measurements from the radiophotoluminescent glass dosimeter were compared with the results of a thermoluminescent dosimeter and EDR2 film, and the differences found were less than 5%. The radiophotoluminescent glass dosimeter has some advantages in terms of dose measurements over CyberKnife, such as repeatability, stability, and small effective size. These advantages make radiophotoluminescent glass dosimeters a potential candidate dosimeter for the CyberKnife procedure. This study concludes that radiophotoluminescent glass dosimeters are a promising and reliable dosimeter for CyberKnife dose verification with clinically acceptable accuracy within 5%. PMID:28046056

  17. Toxicity of Lead and Proposed Substitute Shot to Mallards

    USGS Publications Warehouse

    Longcore, J.R.; Andrews, R.; Locke, L.N.; Bagley, George E.; Young, L.T.

    1974-01-01

    Poisoning of North American waterfowl resulting from the ingestion of lead shot by ducks, geese, and swans causes an estimated annual mortality of 2 to 3% of the population (Bellrose 1959). To alleviate this problem the search for a suitable substitute for lead has been underway since the early 1950's. Proposed substitutes for lead shot were evaluated in a series of acute toxicity tests with pen-reared mallards (Anas platyrhynchos). Most candidate materials were as toxic to ducks as commercial lead shot. Coating or alloying lead with other metals only delayed mortality among dosed ducks. The reputedly 'disintegrable' lead shot with the water-soluble binder and the lead containing biochemical additives were also as toxic to mallards as the commercial lead shot. Mortality was not significantly different among lead-dosed adult or first-year hen and drake pen-reared mallards; lead-dosed adult, wild mallards of both sexes; and lead-dosed adult, male black ducks (Anas rubripes). The ingestion of one lead shot, size 4, by each of 80 pen-reared mallards caused an average 19% mortality. The presence and type of grit in the gizzard had a measurable effect on erosion of ingested shot and on shot retention among dosed mallards. Significantly fewer lead-dosed ducks died when fed crushed oystershell grit than when fed either quartz grit or no grit.

  18. The Relationship between Cyber-Loafing and Internet Addiction

    ERIC Educational Resources Information Center

    Keser, Hafize; Kavuk, Melike; Numanoglu, Gulcan

    2016-01-01

    The goal of this study was to investigate the relationship between preservice teachers' internet addiction level and cyber-loafing activities. This study was conducted as a survey study. Participants of the study was Computer Education and Instructional Technology department students (n = 139) at Ankara University. "Cyber loafing activity…

  19. Caffeine Content in Popular Energy Drinks and Energy Shots.

    PubMed

    Attipoe, Selasi; Leggit, Jeffrey; Deuster, Patricia A

    2016-09-01

    The use of energy beverages is high among the general population and military personnel. Previous studies have reported discrepancies between the actual amount of caffeine in products and the amount of caffeine on stated labels. Thus, the purpose of this study was to examine the content of caffeine listed on the labels of various energy drinks and energy shots. Top-selling energy drinks (n = 9) and energy shots (n = 5) were purchased from retail stores. Three of each of the 14 products were purchased and analyzed for caffeine content by an independent laboratory. Of the 14 products tested, 5 did not provide caffeine amounts on their facts panel-of those, 3 listed caffeine as an ingredient and 2 listed caffeine as part of a proprietary blend. The remaining 9 (of 14) products stated the amounts of caffeine on their labels, all of which were within 15% of the amount indicated on the label. In this study, although the energy beverages that indicated the amount of caffeine it contained had values within ±15% of the amount listed on the label, a potentially acceptable range, this finding is not acceptable with regard to current labeling regulations, which require added ingredients to total 100%. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.

  20. Allergy Shots: Could They Help Your Allergies?

    MedlinePlus

    ... do I have to get? Most people get 1 or 2 shots each week at first. After about 6 months ... Teens, Procedures & Devices, Your Health ResourcesTags: allergy, allergy shots April 1, 1998 Copyright © American Academy of Family Physicians This ...

  1. Computer-aided Human Centric Cyber Situation Awareness

    DTIC Science & Technology

    2016-03-20

    in Video, IJCAI: International Joint Conf. on Artificial Intelligence . 16-JUL-11, . : , Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang...Cyber-Security Conference, June 2015. 2. V.S. Subrahmanian, Invited Speaker, Summer School on Business Intelligence and Big Data Analysis, Capri, Italy... Cybersecurity Conference, Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Bureau, Prime

  2. National Guard Forces in the Cyber Domain

    DTIC Science & Technology

    2015-05-22

    TITLE AND SUBTITLE National Guard Forces in the Cyber Domain 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...Soldiers. Army Cyber Command (ARCYBER) commander, Lieutenant General Edward Cardon stated that Guard will begin to build combat power with...90 2014 Quadrennial Defense Review, 15. 91 Ibid. 92 Edward C. Cardon , "ARMY.MIL, The Official Homepage of the United

  3. Defining Cyber and Focusing the Military’s Role in Cyberspace

    DTIC Science & Technology

    2013-03-01

    Service (USSS) and the U.S. Immigration and Customs Enforcement (ICE) to investigate cyber criminals .7 DoD’s role is not only to defend its own...identify trends, tactics, techniques, and procedures that cyber criminals use so that if the same type of events meet the definition of cyber war, DoD

  4. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    DOE PAGES

    Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing

    2016-07-14

    Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less

  5. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing

    Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less

  6. Towards Open-World Person Re-Identification by One-Shot Group-Based Verification.

    PubMed

    Zheng, Wei-Shi; Gong, Shaogang; Xiang, Tao

    2016-03-01

    Solving the problem of matching people across non-overlapping multi-camera views, known as person re-identification (re-id), has received increasing interests in computer vision. In a real-world application scenario, a watch-list (gallery set) of a handful of known target people are provided with very few (in many cases only a single) image(s) (shots) per target. Existing re-id methods are largely unsuitable to address this open-world re-id challenge because they are designed for (1) a closed-world scenario where the gallery and probe sets are assumed to contain exactly the same people, (2) person-wise identification whereby the model attempts to verify exhaustively against each individual in the gallery set, and (3) learning a matching model using multi-shots. In this paper, a novel transfer local relative distance comparison (t-LRDC) model is formulated to address the open-world person re-identification problem by one-shot group-based verification. The model is designed to mine and transfer useful information from a labelled open-world non-target dataset. Extensive experiments demonstrate that the proposed approach outperforms both non-transfer learning and existing transfer learning based re-id methods.

  7. Sex hormone-dependent tRNA halves enhance cell proliferation in breast and prostate cancers.

    PubMed

    Honda, Shozo; Loher, Phillipe; Shigematsu, Megumi; Palazzo, Juan P; Suzuki, Ryusuke; Imoto, Issei; Rigoutsos, Isidore; Kirino, Yohei

    2015-07-21

    Sex hormones and their receptors play critical roles in the development and progression of the breast and prostate cancers. Here we report that a novel type of transfer RNA (tRNA)-derived small RNA, termed Sex HOrmone-dependent TRNA-derived RNAs (SHOT-RNAs), are specifically and abundantly expressed in estrogen receptor (ER)-positive breast cancer and androgen receptor (AR)-positive prostate cancer cell lines. SHOT-RNAs are not abundantly present in ER(-) breast cancer, AR(-) prostate cancer, or other examined cancer cell lines from other tissues. ER-dependent accumulation of SHOT-RNAs is not limited to a cell culture system, but it also occurs in luminal-type breast cancer patient tissues. SHOT-RNAs are produced from aminoacylated mature tRNAs by angiogenin-mediated anticodon cleavage, which is promoted by sex hormones and their receptors. Resultant 5'- and 3'-SHOT-RNAs, corresponding to 5'- and 3'-tRNA halves, bear a cyclic phosphate (cP) and an amino acid at the 3'-end, respectively. By devising a "cP-RNA-seq" method that is able to exclusively amplify and sequence cP-containing RNAs, we identified the complete repertoire of 5'-SHOT-RNAs. Furthermore, 5'-SHOT-RNA, but not 3'-SHOT-RNA, has significant functional involvement in cell proliferation. These results have unveiled a novel tRNA-engaged pathway in tumorigenesis of hormone-dependent cancers and implicate SHOT-RNAs as potential candidates for biomarkers and therapeutic targets.

  8. Sex hormone-dependent tRNA halves enhance cell proliferation in breast and prostate cancers

    PubMed Central

    Honda, Shozo; Loher, Phillipe; Shigematsu, Megumi; Palazzo, Juan P.; Suzuki, Ryusuke; Imoto, Issei; Rigoutsos, Isidore; Kirino, Yohei

    2015-01-01

    Sex hormones and their receptors play critical roles in the development and progression of the breast and prostate cancers. Here we report that a novel type of transfer RNA (tRNA)-derived small RNA, termed Sex HOrmone-dependent TRNA-derived RNAs (SHOT-RNAs), are specifically and abundantly expressed in estrogen receptor (ER)-positive breast cancer and androgen receptor (AR)-positive prostate cancer cell lines. SHOT-RNAs are not abundantly present in ER− breast cancer, AR− prostate cancer, or other examined cancer cell lines from other tissues. ER-dependent accumulation of SHOT-RNAs is not limited to a cell culture system, but it also occurs in luminal-type breast cancer patient tissues. SHOT-RNAs are produced from aminoacylated mature tRNAs by angiogenin-mediated anticodon cleavage, which is promoted by sex hormones and their receptors. Resultant 5′- and 3′-SHOT-RNAs, corresponding to 5′- and 3′-tRNA halves, bear a cyclic phosphate (cP) and an amino acid at the 3′-end, respectively. By devising a “cP-RNA-seq” method that is able to exclusively amplify and sequence cP-containing RNAs, we identified the complete repertoire of 5′-SHOT-RNAs. Furthermore, 5′-SHOT-RNA, but not 3′-SHOT-RNA, has significant functional involvement in cell proliferation. These results have unveiled a novel tRNA-engaged pathway in tumorigenesis of hormone-dependent cancers and implicate SHOT-RNAs as potential candidates for biomarkers and therapeutic targets. PMID:26124144

  9. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    DTIC Science & Technology

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data

  10. Cyber Mentoring in an Online Introductory Statistics Course

    ERIC Educational Resources Information Center

    Rashid, Mamunur; Sarkar, Jyotirmoy

    2018-01-01

    Students in an online statistics course were prone to become increasingly disengaged as the semester progressed. In Spring 2015, we took a proactive measure to retain student engagement by introducing a cyber mentoring session. We describe the framework, operation and effectiveness of cyber mentoring in improving students' learning experience and…

  11. One-shot Synesthesia

    PubMed Central

    Kirschner, Alexandra; Nikolić, Danko

    2017-01-01

    Abstract Synesthesia is commonly thought to be a phenomenon of fixed associations between an outside inducer and a vivid concurrent experience. Hence, it has been proposed that synesthesia occurs due to additional connections in the brain with which synesthetes are born. Here we show that synesthesia can be a much richer and more flexible phenomenon with a capability to creatively construct novel synesthetic experiences as events unfold in people’s lives. We describe here cases of synesthetes who occasionally generate novel synesthetic experience, called one-shot synesthesias. These synesthetic experiences seem to share all the properties with the classical synesthetic associations except that they occur extremely rarely, people recalling only a few events over the lifetime. It appears that these one-shots are not created at random but are instead responses to specific life events. We contrast the properties of those rare synesthetic events with other, more commonly known forms of synesthesia that also create novel synesthetic experiences, but at a high rate—sometimes creating novel experiences every few seconds. We argue that one-shot synesthesias indicate that synesthetic associations are by their nature not prewired at birth but are dynamically constructed through mental operations and according to the needs of a synesthetic mind. Our conclusions have implications for understanding the biological underpinnings of synesthesia and the role the phenomenon plays in the lives of people endowed with synesthetic capacities. PMID:29188078

  12. Competitive Cyber-Insurance and Internet Security

    NASA Astrophysics Data System (ADS)

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  13. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eric Cornelius; Mark Fabro

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are notmore » comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address

  14. WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT

    DTIC Science & Technology

    2017-04-06

    use these increased cyber capabilities in attempts to wield greater influence in statecraft, cyber tools have not lived up to the hype of the great... influenced by, the cyber domain. A 2017 U.S. Defense Science Board report recognizes the significant economic, social, and military advantages the U.S. gains...reliant upon or connected to the internet, look to cyber to provide them a disproportionate level of influence in international affairs. The lack of

  15. Spectrometer for shot-to-shot photon energy characterization in the multi-bunch mode of the free electron laser at Hamburg

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Palutke, S., E-mail: steffen.palutke@desy.de; Wurth, W.; Deutsches Elekronen Synchrotron

    The setup and first results from commissioning of a fast online photon energy spectrometer for the vacuum ultraviolet free electron laser at Hamburg (FLASH) at DESY are presented. With the use of the latest advances in detector development, the presented spectrometer reaches readout frequencies up to 1 MHz. In this paper, we demonstrate the ability to record online photon energy spectra on a shot-to-shot base in the multi-bunch mode of FLASH. Clearly resolved shifts in the mean wavelength over the pulse train as well as shot-to-shot wavelength fluctuations arising from the statistical nature of the photon generating self-amplified spontaneous emissionmore » process have been observed. In addition to an online tool for beam calibration and photon diagnostics, the spectrometer enables the determination and selection of spectral data taken with a transparent experiment up front over the photon energy of every shot. This leads to higher spectral resolutions without the loss of efficiency or photon flux by using single-bunch mode or monochromators.« less

  16. The Hardest Straight-in Pool Shot

    ERIC Educational Resources Information Center

    Mabry, Rick

    2010-01-01

    When playing pool or billiards, a player often has the opportunity to make a "straight-in" shot, that is, one in which the cue ball, the object ball, and the target (e.g., a pocket) are collinear. With the distance from the cue ball to the target assumed fixed, the relative difficulty is here explored of shots taken at varying positions of the…

  17. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    NASA Astrophysics Data System (ADS)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  18. Cyber threats to health information systems: A systematic review.

    PubMed

    Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott

    2016-01-01

    Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.

  19. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    PubMed

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  20. SecureCPS: Defending a nanosatellite cyber-physical system

    NASA Astrophysics Data System (ADS)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  1. Single-shot spectroscopy of broadband Yb fiber laser

    NASA Astrophysics Data System (ADS)

    Suzuki, Masayuki; Yoneya, Shin; Kuroda, Hiroto

    2017-02-01

    We have experimentally reported on a real-time single-shot spectroscopy of a broadband Yb-doped fiber (YDF) laser which based on a nonlinear polarization evolution by using a time-stretched dispersive Fourier transformation technique. We have measured an 8000 consecutive single-shot spectra of mode locking and noise-like pulse (NLP), because our developed broadband YDF oscillator can individually operate the mode locking and NLP by controlling a pump LD power and angle of waveplates. A shot-to-shot spectral fluctuation was observed in NLP. For the investigation of pulse formation dynamics, we have measured the spectral evolution in an initial fluctuations of mode locked broadband YDF laser at an intracavity dispersion of 1500 and 6200 fs2 for the first time. In both case, a build-up time between cw and steady-state mode locking was estimated to be 50 us, the dynamics of spectral evolution between cw and mode locking, however, was completely different. A shot-to-shot strong spectral fluctuation, as can be seen in NLP spectra, was observed in the initial timescale of 20 us at the intracavity dispersion of 1500 fs2. These new findings would impact on understanding the birth of the broadband spectral formation in fiber laser oscillator.

  2. Spent shot availability and ingestion on areas managed for mourning doves

    USGS Publications Warehouse

    Schulz, J.H.; Millspaugh, J.J.; Washburn, B.E.; Wester, G.R.; Lanigan, J. T.; Franson, J.C.

    2002-01-01

    Mourning dove (Zenaida macroura) hunting is becoming increasingly popular, especially in managed shooting fields. Given the possible increase in the availability of lead (Pb) shot on these areas, our objective was to estimate availability and ingestion of spent shot at the Eagle Bluffs Conservation Area (EBCA, hunted with nontoxic shot) and the James A. Reed Memorial Wildlife Area (JARWA, hunted with Pb shot) in Missouri. During 1998, we collected soil samples one or 2 weeks prior to the hunting season (prehunt) and after 4 days of dove hunting (posthunt). We also collected information on number of doves harvested, number of shots fired, shotgun gauge, and shotshell size used. Dove carcasses were collected on both areas during 1998-99. At EBCA, 60 hunters deposited an estimated 64,775 pellets/ha of nontoxic shot on or around the managed field. At JARWA, approximately 1,086,275 pellets/ha of Pb shot were deposited by 728 hunters. Our posthunt estimates of spent-shot availability from soil sampling were 0 pellets/ha for EBCA and 6,342 pellets/ha for JARWA. Our findings suggest that existing soil sampling protocols may not provide accurate estimates of spent-shot availability in managed dove shooting fields. During 1998-99, 15 of 310 (4.8%) mourning doves collected from EBCA had ingested nontoxic shot. Of those doves, 6 (40.0%) contained a?Y7 shot pellets. In comparison, only 2 of 574 (0.3%) doves collected from JARWA had ingested Pb shot. Because a greater proportion of doves ingested multiple steel pellets compared to Pb pellets, we suggest that doves feeding in fields hunted with Pb shot may succumb to acute Pb toxicosis and thus become unavailable to harvest, resulting in an underestimate of ingestion rates. Although further research is needed to test this hypothesis, our findings may partially explain why previous studies have shown few doves with ingested Pb shot despite their feeding on areas with high Pb shot availability.

  3. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  4. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    DTIC Science & Technology

    2016-07-27

    Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) 5a. CONTRACT NUMBER FA8650-16-C-6722 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This...Prescribed by ANSI Std. Z39-18 Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) Gregory Funke, Gregory Dye, Brett Borghetti

  5. Cryptotomography: reconstructing 3D Fourier intensities from randomly oriented single-shot diffraction patterns (CXIDB ID 9)

    DOE Data Explorer

    Loh, Ne-Te Duane

    2011-08-01

    These 2000 single-shot diffraction patterns include were either background-scattering only or hits (background-scattering plus diffraction signal from sub-micron ellipsoidal particles at random, undetermined orientations). Candidate hits were identified by eye, and the remainder were presumed as background. 54 usable, background-subtracted hits in this set (procedure in referenced article) were used to reconstruct the 3D diffraction intensities of the average ellipsoidal particle.

  6. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.

  7. Removal of Retained Lead Shot Through Laparoscopic Appendectomy

    PubMed Central

    Lloyd, D. M.

    2003-01-01

    We describe a patient presenting with lead shot in his appendix. A plain radiograph of his lumbar spine was performed for back pain, and an incidental finding of lead shot retained within the appendix was seen. Lead shot in the appendix is associated with appendicitis, and 2 cases have been reported of lead intoxication. We suggest that an elective laparoscopic appendectomy should be offered to patients as a possible management option. PMID:12856854

  8. [Contact shot from infantry weapons with a flash-suppressor].

    PubMed

    Perdekamp, Markus Grosse; Braunwarth, Roland; Schmidt, Ulrike; Schmidt, Wolfgang; Pollak, Stefan

    2003-01-01

    The number of reports on contact shots from firearms with a flash suppressor attached to the muzzle is small. On the basis of a case report (suicidal shot to the forehead with a Kalschnikow AKMS 47 assault rifle) the morphological peculiarities (characteristics soot pattern, relatively small powder cavity and only minor skin tears in the presence of a bony support) are presented and the conclusions to be drawn from the findings regarding the flash-suppressor, the shot distance, the angle of the shot and the way of holding the weapon are discussed.

  9. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  10. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?

    NASA Astrophysics Data System (ADS)

    Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting

    2016-10-01

    Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.

  11. The Cyber Security Crisis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight intomore » causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'« less

  12. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene

    2018-05-11

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  13. Histopathology of mallards dosed with lead and selected substitute shot

    USGS Publications Warehouse

    Locke, L.N.; Irby, H.D.; Bagley, George E.

    1967-01-01

    The histopathological response of male game farm mallards fed lead, three types of plastic-coated lead, two lead-magnesium alloys, iron, copper, zinc-coated iron, and molybdenum-coated iron shot was studied. Mallards fed lead, plastic-coated lead, or lead-magnesium alloy shot developed a similar pathological response, including the formation of acid-fast intranuclear inclusion bodies in the kidneys. Birds fed iron or molybdenum-coated iron shot developed hemosiderosis of the liver. Two of four mallards fed zinc-coated iron shot also developed hemosiderosis of the liver. No lesions were found in mallards fed copper shot.

  14. Cyber Bullying in ADHD and Asperger Syndrome Populations

    ERIC Educational Resources Information Center

    Kowalski, Robin M.; Fedina, Cristin

    2011-01-01

    Cyber bullying or electronic bullying refers to bullying that occurs through the Internet or cellular phones. With the rise of technology, researchers have shown a keen interest in the topic of cyber bullying. However, that interest has not extended to individuals with special needs. To address this gap in the literature, the current study…

  15. Transductive multi-view zero-shot learning.

    PubMed

    Fu, Yanwei; Hospedales, Timothy M; Xiang, Tao; Gong, Shaogang

    2015-11-01

    Most existing zero-shot learning approaches exploit transfer learning via an intermediate semantic representation shared between an annotated auxiliary dataset and a target dataset with different classes and no annotation. A projection from a low-level feature space to the semantic representation space is learned from the auxiliary dataset and applied without adaptation to the target dataset. In this paper we identify two inherent limitations with these approaches. First, due to having disjoint and potentially unrelated classes, the projection functions learned from the auxiliary dataset/domain are biased when applied directly to the target dataset/domain. We call this problem the projection domain shift problem and propose a novel framework, transductive multi-view embedding, to solve it. The second limitation is the prototype sparsity problem which refers to the fact that for each target class, only a single prototype is available for zero-shot learning given a semantic representation. To overcome this problem, a novel heterogeneous multi-view hypergraph label propagation method is formulated for zero-shot learning in the transductive embedding space. It effectively exploits the complementary information offered by different semantic representations and takes advantage of the manifold structures of multiple representation spaces in a coherent manner. We demonstrate through extensive experiments that the proposed approach (1) rectifies the projection shift between the auxiliary and target domains, (2) exploits the complementarity of multiple semantic representations, (3) significantly outperforms existing methods for both zero-shot and N-shot recognition on three image and video benchmark datasets, and (4) enables novel cross-view annotation tasks.

  16. Three‐dimensional motion corrected sensitivity encoding reconstruction for multi‐shot multi‐slice MRI: Application to neonatal brain imaging

    PubMed Central

    Hughes, Emer J.; Hutter, Jana; Price, Anthony N.; Hajnal, Joseph V.

    2017-01-01

    Purpose To introduce a methodology for the reconstruction of multi‐shot, multi‐slice magnetic resonance imaging able to cope with both within‐plane and through‐plane rigid motion and to describe its application in structural brain imaging. Theory and Methods The method alternates between motion estimation and reconstruction using a common objective function for both. Estimates of three‐dimensional motion states for each shot and slice are gradually refined by improving on the fit of current reconstructions to the partial k‐space information from multiple coils. Overlapped slices and super‐resolution allow recovery of through‐plane motion and outlier rejection discards artifacted shots. The method is applied to T 2 and T 1 brain scans acquired in different views. Results The procedure has greatly diminished artifacts in a database of 1883 neonatal image volumes, as assessed by image quality metrics and visual inspection. Examples showing the ability to correct for motion and robustness against damaged shots are provided. Combination of motion corrected reconstructions for different views has shown further artifact suppression and resolution recovery. Conclusion The proposed method addresses the problem of rigid motion in multi‐shot multi‐slice anatomical brain scans. Tests on a large collection of potentially corrupted datasets have shown a remarkable image quality improvement. Magn Reson Med 79:1365–1376, 2018. © 2017 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. PMID:28626962

  17. Securing Cyber Acquisitions

    DTIC Science & Technology

    2015-02-01

    networking provides 24-hour access to data and information between friends and strangers alike. Technology also has played a significant role in the world’s...economic environment, many or- ganizations look at cyber budgets as areas to cut back. And many top-level managers and members of the acquisition

  18. Single-shot speckle reduction in numerical reconstruction of digitally recorded holograms.

    PubMed

    Hincapie, Diego; Herrera-Ramírez, Jorge; Garcia-Sucerquia, Jorge

    2015-04-15

    A single-shot method to reduce the speckle noise in the numerical reconstructions of electronically recorded holograms is presented. A recorded hologram with the dimensions N×M is split into S=T×T sub-holograms. The uncorrelated superposition of the individually reconstructed sub-holograms leads to an image with the speckle noise reduced proportionally to the 1/S law. The experimental results are presented to support the proposed methodology.

  19. Cyber situation awareness as distributed socio-cognitive work

    NASA Astrophysics Data System (ADS)

    Tyworth, Michael; Giacobe, Nicklaus A.; Mancuso, Vincent

    2012-06-01

    A key challenge for human cybersecurity operators is to develop an understanding of what is happening within, and to, their network. This understanding, or situation awareness, provides the cognitive basis for human operators to take action within their environments. Yet developing situation awareness of cyberspace (cyber-SA) is understood to be extremely difficult given the scope of the operating environment, the highly dynamic nature of the environment and the absence of physical constraints that serve to bound the cognitive task23. As a result, human cybersecurity operators are often "flying blind" regarding understanding the source, nature, and likely impact of malicious activity on their networked assets. In recent years, many scholars have dedicated their attention to finding ways to improve cyber-SA in human operators. In this paper we present our findings from our ongoing research of how cybersecurity analysts develop and maintain cyber-SA. Drawing from over twenty interviews of analysts working in the military, government, industrial, and educational domains, we find that cyber-SA to be distributed across human operators and technological artifacts operating in different functional areas.

  20. Comparative kinetic analysis on thermal degradation of some cephalosporins using TG and DSC data

    PubMed Central

    2013-01-01

    Background The thermal decomposition of cephalexine, cefadroxil and cefoperazone under non-isothermal conditions using the TG, respectively DSC methods, was studied. In case of TG, a hyphenated technique, including EGA, was used. Results The kinetic analysis was performed using the TG and DSC data in air for the first step of cephalosporin’s decomposition at four heating rates. The both TG and DSC data were processed according to an appropriate strategy to the following kinetic methods: Kissinger-Akahira-Sunose, Friedman, and NPK, in order to obtain realistic kinetic parameters, even if the decomposition process is a complex one. The EGA data offer some valuable indications about a possible decomposition mechanism. The obtained data indicate a rather good agreement between the activation energy’s values obtained by different methods, whereas the EGA data and the chemical structures give a possible explanation of the observed differences on the thermal stability. A complete kinetic analysis needs a data processing strategy using two or more methods, but the kinetic methods must also be applied to the different types of experimental data (TG and DSC). Conclusion The simultaneous use of DSC and TG data for the kinetic analysis coupled with evolved gas analysis (EGA) provided us a more complete picture of the degradation of the three cephalosporins. It was possible to estimate kinetic parameters by using three different kinetic methods and this allowed us to compare the Ea values obtained from different experimental data, TG and DSC. The thermodegradation being a complex process, the both differential and integral methods based on the single step hypothesis are inadequate for obtaining believable kinetic parameters. Only the modified NPK method allowed an objective separation of the temperature, respective conversion influence on the reaction rate and in the same time to ascertain the existence of two simultaneous steps. PMID:23594763

  1. An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample.

    PubMed

    Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C; Stuart, Gregory L

    2016-01-01

    To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. College students in a dating relationship ( N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2-31%. Men and women did not differ in their victimization by cyber abuse. Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem.

  2. The human Vδ2+ T-cell compartment comprises distinct innate-like Vγ9+ and adaptive Vγ9- subsets.

    PubMed

    Davey, Martin S; Willcox, Carrie R; Hunter, Stuart; Kasatskaya, Sofya A; Remmerswaal, Ester B M; Salim, Mahboob; Mohammed, Fiyaz; Bemelman, Frederike J; Chudakov, Dmitriy M; Oo, Ye H; Willcox, Benjamin E

    2018-05-02

    Vδ2 + T cells form the predominant human γδ T-cell population in peripheral blood and mediate T-cell receptor (TCR)-dependent anti-microbial and anti-tumour immunity. Here we show that the Vδ2 + compartment comprises both innate-like and adaptive subsets. Vγ9 + Vδ2 + T cells display semi-invariant TCR repertoires, featuring public Vγ9 TCR sequences equivalent in cord and adult blood. By contrast, we also identify a separate, Vγ9 - Vδ2 + T-cell subset that typically has a CD27 hi CCR7 + CD28 + IL-7Rα + naive-like phenotype and a diverse TCR repertoire, however in response to viral infection, undergoes clonal expansion and differentiation to a CD27 lo CD45RA + CX 3 CR1 + granzymeA/B + effector phenotype. Consistent with a function in solid tissue immunosurveillance, we detect human intrahepatic Vγ9 - Vδ2 + T cells featuring dominant clonal expansions and an effector phenotype. These findings redefine human γδ T-cell subsets by delineating the Vδ2 + T-cell compartment into innate-like (Vγ9 + ) and adaptive (Vγ9 - ) subsets, which have distinct functions in microbial immunosurveillance.

  3. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  4. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs

    DTIC Science & Technology

    2016-04-01

    in Anaheim, California, April 14-16, 2016. 15. SUBJECT TERMS Cyber, career intentions, retention , cognitive ability, job fit, normative commitment...Predictors of Cyber Job Career Intentions 1 The views, opinions, and findings contained in this article are solely those of the authors and should...other documentation. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs Kristophor Canali U. S. Army

  5. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  6. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  7. Cyber Bullying @ Schools: What Do Turkish Adolescents Think?

    ERIC Educational Resources Information Center

    Topcu, Cigdem; Yildirim, Ali; Erdur-Baker, Ozgur

    2013-01-01

    Cyber bullying is an emerging form of peer bullying, becoming prominent especially over the past decade. The aim of this study was to investigate through interviews the perceptions of Turkish high school students about cyber bullying. The sample consisted of six male and one female high school students all aged 15 years who identified as being…

  8. The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents' Cyber Aggression.

    PubMed

    Wright, Michelle F

    2017-03-01

    The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.

  9. CYBER 200 Applications Seminar

    NASA Technical Reports Server (NTRS)

    Gary, J. P. (Compiler)

    1984-01-01

    Applications suited for the CYBER 200 digital computer are discussed. Various areas of application including meteorology, algorithms, fluid dynamics, monte carlo methods, petroleum, electronic circuit simulation, biochemistry, lattice gauge theory, economics and ray tracing are discussed.

  10. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    NASA Technical Reports Server (NTRS)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure

  11. Biomechanical analysis of the jump shot in basketball.

    PubMed

    Struzik, Artur; Pietraszewski, Bogdan; Zawadzki, Jerzy

    2014-09-29

    Basketball players usually score points during the game using the jump shot. For this reason, the jump shot is considered to be the most important element of technique in basketball and requires a high level of performance. The aim of this study was to compare the biomechanical characteristics of the lower limbs during a jump shot without the ball and a countermovement jump without an arm swing. The differences between variables provide information about the potential that an athlete can utilise during a game when performing a jump shot. The study was conducted among 20 second-league basketball players by means of a Kistler force plate and the BTS SMART system for motion analysis. The variables measured included the take-off time, mean power, peak power, relative mean power, jump height, maximum landing force and calculated impact ratio. Surprisingly, more advantageous variables were found for the jump shot. This finding suggests a very high performance level in the jump shot in the studied group and a maximum utilisation of their motor abilities. Both types of jumps were characterised by high mean and peak power values and average heights. The high forces at landing, which result in considerable impact ratios, may have prompted the studied group to land softly. Use of the countermovement jump without an arm swing is recommended to assess and predict the progression of player's jumping ability.

  12. Uncovering the Structure of and Gender and Developmental Differences in Cyber Bullying

    ERIC Educational Resources Information Center

    Griezel, Lucy; Finger, Linda R.; Bodkin-Andrews, Gawaian H.; Craven, Rhonda G.; Yeung, Alexander Seeshing

    2012-01-01

    Although literature on traditional bullying is abundant, a limited body of sound empirical research exists regarding its newest form: cyber bullying. The sample comprised Australian secondary students (N = 803) and aimed to identify the underlying structure of cyber bullying, and differences in traditional and cyber bullying behaviors across…

  13. The Effect of Uphill and Downhill Slopes on Weight Transfer, Alignment and Shot Outcome in Golf.

    PubMed

    Blenkinsop, Glen M; Liang, Ying; Gallimore, Nicholas J; Hiley, Michael J

    2018-04-13

    The aim of the study was to examine changes in weight transfer, alignment and shot outcome during golf shots from flat, uphill, and downhill slopes. Twelve elite male golfers hit 30 shots with a six-iron from a computer assisted rehabilitation environment (CAREN) used to create 5° slopes while collecting 3D kinematics and kinetics of the swing. A launch monitor measured performance outcomes. A shift in the centre of pressure was found throughout the swing when performed on a slope, with the mean position moving approximately 9% closer to the lower foot. The golfers attempted to remain perpendicular to the slope, resulting in the weight transfer towards the lower foot. The golfers adopted a wider stance in the sloped conditions and moved the ball towards the higher foot at address. Ball speed was not significantly affected by the slope, but launch angle and ball spin were. As predicted by the coaching literature, golfers were more likely to hit shots to the left from an uphill slope and to the right for a downhill slope. No consistent compensatory adjustments in alignment at address or azimuth were found, with the change in final shot dispersion due to the lateral spin of the ball.

  14. DSC: software tool for simulation-based design of control strategies applied to wastewater treatment plants.

    PubMed

    Ruano, M V; Ribes, J; Seco, A; Ferrer, J

    2011-01-01

    This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP.

  15. Evaluation of a complementary cyber education program for a pathophysiology class.

    PubMed

    Yoo, Ji-Soo; Ryue, Sook-Hee; Lee, Jung Eun; Ahn, Jeong-Ah

    2009-12-01

    The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures complemented five lectures in the classroom. To evaluate the course's educational effectiveness, we performed an online objective questionnaire and an open questionnaire survey anonymously, and compared the complementary cyber education program with traditional classroom education. The complementary cyber education program effected significant improvements in scores for importance with regard to major, clarity of goals and education plans for courses, professor readiness, preciseness and description of lectures, amount and efficiency of assignments, and fairness in appraisal standards compared with the traditional classroom education group. This study indicates that a complementary cyber education program provides nursing students with the flexibility of time and space, the newest information through updated lectures, efficient motivational aids through intimacy between the lecturer and students, and concrete and meaningful tasks. The complementary cyber education course also increased student effort toward studying and student satisfaction with the class.

  16. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety

    PubMed Central

    Sackner-Bernstein, Jonathan

    2017-01-01

    Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161

  17. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    PubMed

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  18. Cyber Space and Digital Democracy in South Korea

    NASA Astrophysics Data System (ADS)

    Lee, Jin Ro

    2017-03-01

    tries to monitor citizen by the use of digital media, that society is called ‘surveillance society’. As the government is open and transparent, the citizens’ democracy will increase. The market should limit to gather and accumulate peoples’ information and profile for protecting their privacy. Cyber space is a public sphere, which is two-way, economic, and open to every people. Ithas various positive sides. It promotes the communication by people of political information and opinion freely and actively. It makes people form groups against thewrong-doing of big companies and keeps people’s privileges. People buy goods morecheaply via e-commerce, which also helps companies lessen the expenses. However, the cyber space has several negative sides, too. The government and companies can accumulate people’s information and use it for diverse purposes. If the government uses that information to monitor and control people, such a society may become a ‘surveillance society’ threatening democracy as in George Orwell’s ‘1984’. As companies alsotake advantage of big data to sell more products for their profit increase, so people often feel they are captivated by a lot of commercial messages, including much advertising spammail. The more civil society depends on the cyber space, the more it can become fragile and risky. The digital media guarantees neither democracy nor a surveillance society. It’s true that new technology gives us the opportunity to expand democracy. However, if we don’t use new media rightly and positively, we may find it negative or even harmless. Therefore, the positive use of the digital media and keeping our cyber space democratic is very important. With democracy, the Internet and SNS industry can be flourished by the cooperation of netizen, business managers, IT researchers, and politicians.

  19. INL@Work Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chaffin, May

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks.Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  20. Increased distance of shooting on basketball jump shot.

    PubMed

    Okazaki, Victor Hugo Alves; Rodacki, André Luiz Félix

    2012-01-01

    The present study analyzed the effect of increased distance on basketball jump shot outcome and performance. Ten male expert basketball players were filmed and a number of kinematic variables analyzed during jump shot that were performed from three conditions to represent close, intermediate and far distances (2.8, 4.6, and 6.4m, respectively). Shot accuracy decreased from 59% (close) to 37% (far), in function of the task constraints (p < 0.05). Ball release height decreased (p < 0.05) from 2.46 m (close) to 2.38m (intermediate) and to 2.33m (long). Release angle also decreased (p < 0.05) when shot was performed from close (78.92°) in comparison to intermediate distances (65.60°). While, ball release velocity increased (p < 0.05) from 4.39 m/s (close) to 5.75 m·s(-1) (intermediate) to 6.89 m·s(-1) (far). These changes in ball release height, angle and velocity, related to movement performance adaptations were suggested as the main factors that influence jump shot accuracy when distance is augmented. Key pointsThe increased distance leads to greater spatial con-straint over shot movement that demands an adapta-tion of the movement for the regulation of the accu-racy and the impulse generation to release the ball.The reduction in balls release height and release angle, in addition to the increase in balls release ve-locity, were suggested as the main factors that de-creased shot accuracy with the distance increased.Players should look for release angles of shooting that provide an optimal balls release velocity to im-prove accuracy.

  1. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    PubMed

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  2. School Bullying Among US Adolescents: Physical, Verbal, Relational and Cyber

    PubMed Central

    Wang, Jing; Iannotti, Ronald J.; Nansel, Tonja R.

    2009-01-01

    Purpose Four forms of school bullying behaviors among US adolescents and their association with socio-demographic characteristics, parental support and friends were examined. Methods Data were obtained from the Health Behavior in School-Aged Children (HBSC) 2005 Survey, a nationally-representative sample of grades 6 to 10 (N = 7182). The Olweus Bully/Victim Questionnaire was used to measure physical, verbal and relational forms of bullying. Two items were added using the same format to measure cyber bullying. For each form, four categories were created: bully, victim, bully-victim, and not involved. Multinomial logistic regressions were applied, with socio-demographic variables, parental support and number of friends as predictors. Results Prevalence rates of having bullied others or having been bullied at school for at least once in the last 2 months were 20.8% physically, 53.6% verbally, 51.4% socially or 13.6% electronically. Boys were more involved in physical or verbal bullying, while girls were more involved in relational bullying. Boys were more likely to be cyber bullies, while girls were more likely to be cyber victims. African-American adolescents were involved in more bullying (physical, verbal or cyber) but less victimization (verbal or relational). Higher parental support was associated with less involvement across all forms and classifications of bullying. Having more friends was associated with more bullying and less victimization for physical, verbal and relational forms, but was not associated with cyber bullying. Conclusions Parental support may protect adolescents from all four forms of bullying. Friends associate differentially with traditional and cyber bullying. Results indicate that cyber bullying has a distinct nature from traditional bullying. PMID:19766941

  3. A Situational-Awareness System For Networked Infantry Including An Accelerometer-Based Shot-Identification Algorithm For Direct-Fire Weapons

    DTIC Science & Technology

    2016-09-01

    noise density and temperature sensitivity of these devices are all on the same order of magnitude. Even the worst- case noise density of the GCDC...accelerations from a handgun firing were distinct from other impulsive events on the wrist, such as using a hammer. Loeffler first identified potential shots by...spikes, taking various statistical parameters. He used a logistic regression model on these parameters and was able to classify 98.9% of shots

  4. What You Can Expect with a Cortisone Shot

    MedlinePlus

    ... should avoid before your cortisone shot. What you can expect During the cortisone shot Your doctor might ... ll then be positioned so that your doctor can easily insert the needle. The area around the ...

  5. CYBER DETERRENCE

    DTIC Science & Technology

    2016-02-11

    directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http

  6. Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel

    ERIC Educational Resources Information Center

    Bhat, Christine Suniti

    2008-01-01

    Cyber bullying or bullying via information and communications technology tools such as the internet and mobile phones is a problem of growing concern with school-aged students. Cyber bullying actions may not take place on school premises, but detrimental effects are experienced by victims of cyber bullying in schools. Tools used by cyber bullies…

  7. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less

  8. Cyber anthropology or anthropology in cyberspace.

    PubMed

    Svilicić, Niksa

    2012-03-01

    As a variety of anthropology, cyber anthropology is considered to be the fastest growing sub branch in the science. It is based on synergic effects of multimedia systems and hypermedia, using their comparative advantages. One of the least researched fields of cyber anthropology is the relationship of individuals and social groups with a multimedia document in terms of their perception of such subject. This is because the foundation of social-informatics perception in the society is created based on the evidence of a real life, whereas here the perception is established at the level of virtual, i.e. online life. The rhetorical question here is whether an identical content causes the same or different user reactions, depending on whether it was perceived offline or online, i.e. to what extend does the medium (and not the information content) dictate the user perception. In this respect the research titled "Perception of online museum content creators and actual habits of Croatian online museum visitors" can be a "case study" for the impact of "cyber potential" on the classic anthropological paradigm.

  9. An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample

    PubMed Central

    Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C.; Stuart, Gregory L.

    2015-01-01

    Objective To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. Method College students in a dating relationship (N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Results Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2–31%. Men and women did not differ in their victimization by cyber abuse. Conclusions Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem. PMID:27014498

  10. Cyber Bullying and Traditional Bullying: Differential Association with Depression

    PubMed Central

    Wang, Jing; Nansel, Tonja R.; Iannotti, Ronald J.

    2010-01-01

    Purpose The study compared levels of depression among bullies, victims and bully-victims of traditional (physical, verbal and relational) and cyber bullying, and examined the association between depression and frequency of involvement in each form of bullying. Methods A U.S. nationally-representative sample of students in grades 6 to 10 (N = 7313) completed the bullying and depression items in the Health Behavior in School-Aged Children (HBSC) 2005 Survey. Results Depression was associated with each of four forms of bullying. Cyber victims reported higher depression than bullies or bully-victims, a finding not observed in other forms of bullying. For physical, verbal and relational bullies, victims and bully victims, the frequently-involved group reported significantly higher level of depression than the corresponding occasionally-involved group. For cyber bullying, differences were found only between occasional and frequent victims. Conclusion Findings indicate the importance of further study of cyber bullying as its association with depression is distinct from traditional forms of bullying. PMID:21402273

  11. Cyber bullying behaviors among middle and high school students.

    PubMed

    Mishna, Faye; Cook, Charlene; Gadalla, Tahany; Daciuk, Joanne; Solomon, Steven

    2010-07-01

    Little research has been conducted that comprehensively examines cyber bullying with a large and diverse sample. The present study examines the prevalence, impact, and differential experience of cyber bullying among a large and diverse sample of middle and high school students (N = 2,186) from a large urban center. The survey examined technology use, cyber bullying behaviors, and the psychosocial impact of bullying and being bullied. About half (49.5%) of students indicated they had been bullied online and 33.7% indicated they had bullied others online. Most bullying was perpetrated by and to friends and participants generally did not tell anyone about the bullying. Participants reported feeling angry, sad, and depressed after being bullied online. Participants bullied others online because it made them feel as though they were funny, popular, and powerful, although many indicated feeling guilty afterward. Greater attention is required to understand and reduce cyber bullying within children's social worlds and with the support of educators and parents.

  12. Movement Analysis Applied to the Basketball Jump Shot--Part II.

    ERIC Educational Resources Information Center

    Martin, Thomas P.

    1981-01-01

    The jump shot is one of the most important shots in the game of basketball. The movement analysis of the jump shot designates four phases: (1) preparatory position; (2) movement phase I (crouch); (3) movement phase II (jump); and (4) follow-through. (JN)

  13. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.

    PubMed

    Dadkhah, Mehdi; Borchardt, Glenn; Maliszewski, Tomasz

    2017-01-01

    Day by day, researchers receive new suspicious e-mails in their inboxes. Many of them do not have sufficient information about these types of e-mails, and may become victims of cyber-attacks. In this short communication, we review current cyber threats in academic publishing and try to present general guidelines for authors. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Model Based Verification of Cyber Range Event Environments

    DTIC Science & Technology

    2015-12-10

    Model Based Verification of Cyber Range Event Environments Suresh K. Damodaran MIT Lincoln Laboratory 244 Wood St., Lexington, MA, USA...apply model based verification to cyber range event environment configurations, allowing for the early detection of errors in event environment...Environment Representation (CCER) ontology. We also provide an overview of a methodology to specify verification rules and the corresponding error

  15. AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT

    DTIC Science & Technology

    2017-04-05

    Cyber Strategic Approach The need to protect critical infrastructure, sensitive unclassified and classified data, and Command and Control systems that...high-reward approaches , particularly those that are non -material in nature. Finally, a systemic focus on feedback, memory and continuous...AIR WAR COLLEGE AIR UNIVERSITY AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT by Lance Baxter, Lt Col, USAF A Research

  16. Uncertainty and Risk Management in Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Li, Jason; Ou, Xinming; Rajagopalan, Raj

    Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

  17. Comparison of optimization algorithms for the slow shot phase in HPDC

    NASA Astrophysics Data System (ADS)

    Frings, Markus; Berkels, Benjamin; Behr, Marek; Elgeti, Stefanie

    2018-05-01

    High-pressure die casting (HPDC) is a popular manufacturing process for aluminum processing. The slow shot phase in HPDC is the first phase of this process. During this phase, the molten metal is pushed towards the cavity under moderate plunger movement. The so-called shot curve describes this plunger movement. A good design of the shot curve is important to produce high-quality cast parts. Three partially competing process goals characterize the slow shot phase: (1) reducing air entrapment, (2) avoiding temperature loss, and (3) minimizing oxide caused by the air-aluminum contact. Due to the rough process conditions with high pressure and temperature, it is hard to design the shot curve experimentally. There exist a few design rules that are based on theoretical considerations. Nevertheless, the quality of the shot curve design still depends on the experience of the machine operator. To improve the shot curve it seems to be natural to use numerical optimization. This work compares different optimization strategies for the slow shot phase optimization. The aim is to find the best optimization approach on a simple test problem.

  18. Laser Peening and Shot Peening Effects on Fatigue Life and Surface Roughness of Friction Stir Welded 7075-T7351 Aluminum

    NASA Technical Reports Server (NTRS)

    Hatamleh, Omar; Lyons, Jed; Forman, Royce

    2006-01-01

    The effects of laser peening, shot peening, and a combination of both on the fatigue life of Friction Stir Welds (FSW) was investigated. The fatigue samples consisted of dog bone specimens and the loading was applied in a direction perpendicular to the weld direction. Several laser peening conditions with different intensities, durations, and peening order were tested to obtain the optimum peening parameters. The surface roughness resulting from various peening techniques was assessed and characterized. The results indicate a significant increase in fatigue life using laser peening compared to shot peened versus their native welded specimens.

  19. Finite Element Simulation of Shot Peening: Prediction of Residual Stresses and Surface Roughness

    NASA Astrophysics Data System (ADS)

    Gariépy, Alexandre; Perron, Claude; Bocher, Philippe; Lévesque, Martin

    Shot peening is a surface treatment that consists of bombarding a ductile surface with numerous small and hard particles. Each impact creates localized plastic strains that permanently stretch the surface. Since the underlying material constrains this stretching, compressive residual stresses are generated near the surface. This process is commonly used in the automotive and aerospace industries to improve fatigue life. Finite element analyses can be used to predict residual stress profiles and surface roughness created by shot peening. This study investigates further the parameters and capabilities of a random impact model by evaluating the representative volume element and the calculated stress distribution. Using an isotropic-kinematic hardening constitutive law to describe the behaviour of AA2024-T351 aluminium alloy, promising results were achieved in terms of residual stresses.

  20. Comparison of the Diagnostic Accuracy of DSC- and Dynamic Contrast-Enhanced MRI in the Preoperative Grading of Astrocytomas.

    PubMed

    Nguyen, T B; Cron, G O; Perdrizet, K; Bezzina, K; Torres, C H; Chakraborty, S; Woulfe, J; Jansen, G H; Sinclair, J; Thornhill, R E; Foottit, C; Zanette, B; Cameron, I G

    2015-11-01

    Dynamic contrast-enhanced MR imaging parameters can be biased by poor measurement of the vascular input function. We have compared the diagnostic accuracy of dynamic contrast-enhanced MR imaging by using a phase-derived vascular input function and "bookend" T1 measurements with DSC MR imaging for preoperative grading of astrocytomas. This prospective study included 48 patients with a new pathologic diagnosis of an astrocytoma. Preoperative MR imaging was performed at 3T, which included 2 injections of 5-mL gadobutrol for dynamic contrast-enhanced and DSC MR imaging. During dynamic contrast-enhanced MR imaging, both magnitude and phase images were acquired to estimate plasma volume obtained from phase-derived vascular input function (Vp_Φ) and volume transfer constant obtained from phase-derived vascular input function (K(trans)_Φ) as well as plasma volume obtained from magnitude-derived vascular input function (Vp_SI) and volume transfer constant obtained from magnitude-derived vascular input function (K(trans)_SI). From DSC MR imaging, corrected relative CBV was computed. Four ROIs were placed over the solid part of the tumor, and the highest value among the ROIs was recorded. A Mann-Whitney U test was used to test for difference between grades. Diagnostic accuracy was assessed by using receiver operating characteristic analysis. Vp_ Φ and K(trans)_Φ values were lower for grade II compared with grade III astrocytomas (P < .05). Vp_SI and K(trans)_SI were not significantly different between grade II and grade III astrocytomas (P = .08-0.15). Relative CBV and dynamic contrast-enhanced MR imaging parameters except for K(trans)_SI were lower for grade III compared with grade IV (P ≤ .05). In differentiating low- and high-grade astrocytomas, we found no statistically significant difference in diagnostic accuracy between relative CBV and dynamic contrast-enhanced MR imaging parameters. In the preoperative grading of astrocytomas, the diagnostic accuracy of dynamic

  1. Comparison of two DSC-based methods to predict drug-polymer solubility.

    PubMed

    Rask, Malte Bille; Knopp, Matthias Manne; Olesen, Niels Erik; Holm, René; Rades, Thomas

    2018-04-05

    The aim of the present study was to compare two DSC-based methods to predict drug-polymer solubility (melting point depression method and recrystallization method) and propose a guideline for selecting the most suitable method based on physicochemical properties of both the drug and the polymer. Using the two methods, the solubilities of celecoxib, indomethacin, carbamazepine, and ritonavir in polyvinylpyrrolidone, hydroxypropyl methylcellulose, and Soluplus® were determined at elevated temperatures and extrapolated to room temperature using the Flory-Huggins model. For the melting point depression method, it was observed that a well-defined drug melting point was required in order to predict drug-polymer solubility, since the method is based on the depression of the melting point as a function of polymer content. In contrast to previous findings, it was possible to measure melting point depression up to 20 °C below the glass transition temperature (T g ) of the polymer for some systems. Nevertheless, in general it was possible to obtain solubility measurements at lower temperatures using polymers with a low T g . Finally, for the recrystallization method it was found that the experimental composition dependence of the T g must be differentiable for compositions ranging from 50 to 90% drug (w/w) so that one T g corresponds to only one composition. Based on these findings, a guideline for selecting the most suitable thermal method to predict drug-polymer solubility based on the physicochemical properties of the drug and polymer is suggested in the form of a decision tree. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. SU-F-T-588: Asymmetries in the CyberKnife Iris 2 Collimator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cernica, G; Ji, H; McRae, D

    Purpose: The Iris 2 dodecahedral collimator in the CyberKnife unit can demonstrate visible asymmetry in the shaped radiation field, as seen on routine films. Specifically some edges of the collimator project longer than others. PDDs and output factors remain unaffected by this asymmetry. An in-house program was written to analyze the impact of this asymmetry on profiles. Methods: Two years of routine chromodynamic films were retrospectively analyzed using an in-house developed program. Films were obtained on a weekly basis in a plastic phantom on the vendor-provided mount. Profiles were obtained every degree. A dodecahedron was fitted to the 50% isodosemore » line and the positions and sizes of the upper and lower hexagonal collimators were derived. The collimators’ profiles at every degree, symmetry and centering were calculated and trended over the months. Results: Asymmetries in the obtained profiles were apparent. The upper and lower collimators were off-centered (0.31 mm, p<10–8), they did not project the same field size at 80 cm (0.46 mm difference, p<10–31). Profiles as a function of angle demonstrate a periodicity, but short and long profiles are rarely 15° apart, but vary from 9° to 21°. In addition, a second, intermediate minimum is seen at every other short profile. A trend in the field size over time is noted and can be monitored to identify servicing needs. Conclusion: Despite its differences, the asymmetric Iris 2 collimator did not demonstrate large deviations in PDDs and output factors. Due to the asymmetry, the 15° apart profiles obtained at commissioning do not represent the true large and short blade profiles of the collimator. Averaging of the profiles in the commissioning process hides this difference.« less

  3. Duration of mentally simulated movement before and after a golf shot.

    PubMed

    Koyama, Satoshi; Tsuruhara, Kiyoshi; Yamamoto, Yuji

    2009-02-01

    This report examined the temporal consistency of preshot routines and the temporal similarity and variability between simulated movements before and after a shot. 12 male amateur golfers ages 32 to 69 years (M=53.4, SD=10.5) were assigned into two groups according to their handicaps: skilled (M=4.0 handicap, SD=3.1) and less-skilled (M=16.0 handicap, SD=6.5). They performed their shots mentally from their preshot routines to the points when the balls came to rest, then performed the same shots physically and again recalled the shots mentally. For each of four par-three holes, participants' performances were filmed, and the durations of mental and actual shots were timed. Analysis showed that the skilled golfers had more consistent preshot routines in actual movement, and they also had longer durations for the ball flight phase than the less-skilled golfers in simulated movement. The present findings support the importance of consistent preshot routines for high performance in golf, however, the duration of simulated movements was underestimated both before and after the shots. This also suggests that skilled golfers attend to performance goals both before and after shots to execute their shots under proceduralized control and to correct their movements for their next shot.

  4. Advancing chimeric antigen receptor T cell therapy with CRISPR/Cas9.

    PubMed

    Ren, Jiangtao; Zhao, Yangbing

    2017-09-01

    The clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated 9 (CRISPR/Cas9) system, an RNA-guided DNA targeting technology, is triggering a revolution in the field of biology. CRISPR/Cas9 has demonstrated great potential for genetic manipulation. In this review, we discuss the current development of CRISPR/Cas9 technologies for therapeutic applications, especially chimeric antigen receptor (CAR) T cell-based adoptive immunotherapy. Different methods used to facilitate efficient CRISPR delivery and gene editing in T cells are compared. The potential of genetic manipulation using CRISPR/Cas9 system to generate universal CAR T cells and potent T cells that are resistant to exhaustion and inhibition is explored. We also address the safety concerns associated with the use of CRISPR/Cas9 gene editing and provide potential solutions and future directions of CRISPR application in the field of CAR T cell immunotherapy. As an integration-free gene insertion method, CRISPR/Cas9 holds great promise as an efficient gene knock-in platform. Given the tremendous progress that has been made in the past few years, we believe that the CRISPR/Cas9 technology holds immense promise for advancing immunotherapy.

  5. Single-shot imaging of trapped Fermi gas

    NASA Astrophysics Data System (ADS)

    Gajda, Mariusz; Mostowski, Jan; Sowiński, Tomasz; Załuska-Kotur, Magdalena

    2016-07-01

    Recently developed techniques allow for simultaneous measurements of the positions of all ultra-cold atoms in a trap with high resolution. Each such single-shot experiment detects one element of the quantum ensemble formed by the cloud of atoms. Repeated single-shot measurements can be used to determine all correlations between particle positions as opposed to standard measurements that determine particle density or two-particle correlations only. In this paper we discuss the possible outcomes of such single-shot measurements in the case of cloud of ultra-cold noninteracting Fermi atoms. We show that the Pauli exclusion principle alone leads to correlations between particle positions that originate from unexpected spatial structures formed by the atoms.

  6. Jello Shot Consumption among Underage Youths in the United States

    PubMed Central

    SIEGEL, MICHAEL; GALLOWAY, ASHLEY; ROSS, CRAIG S.; BINAKONSKY, JANE; JERNIGAN, DAVID H.

    2015-01-01

    We sought, for the first time, to identify the extent of jello shot consumption among underage youth. We conducted a study among a national sample of 1,031 youth, aged 13 to 20, using a pre-recruited internet panel maintained by GfK Knowledge Networks to assess past 30-day consumption of jello shots. Nearly one-fifth of underage youth have consumed jello shots in the past 30 days and jello shots make up an average of nearly 20% of their overall alcohol intake. Jello shot users in our sample were approximately 1.5 times more likely to binge drink, consumed approximately 1.6 times as many drinks per month, and were 1.7 times more likely to have been in a physical fight related to their alcohol use as drinkers in general. Ascertainment of jello shot use should become a standard part of youth alcohol surveillance and states should consider banning the sale of these products. PMID:27087771

  7. Considerations in high-resolution skeletal muscle diffusion tensor imaging using single-shot echo planar imaging with stimulated-echo preparation and sensitivity encoding.

    PubMed

    Karampinos, Dimitrios C; Banerjee, Suchandrima; King, Kevin F; Link, Thomas M; Majumdar, Sharmila

    2012-05-01

    Previous studies have shown that skeletal muscle diffusion tensor imaging (DTI) can noninvasively probe changes in the muscle fiber architecture and microstructure in diseased and damaged muscles. However, DTI fiber reconstruction in small muscles and in muscle regions close to aponeuroses and tendons remains challenging because of partial volume effects. Increasing the spatial resolution of skeletal muscle single-shot diffusion-weighted echo planar imaging (DW-EPI) can be hindered by the inherently low signal-to-noise ratio (SNR) of muscle DW-EPI because of the short muscle T(2) and the high sensitivity of single-shot EPI to off-resonance effects and T(2)* blurring. In this article, eddy current-compensated diffusion-weighted stimulated-echo preparation is combined with sensitivity encoding (SENSE) to maintain good SNR properties and to reduce the sensitivity to distortions and T(2)* blurring in high-resolution skeletal muscle single-shot DW-EPI. An analytical framework is developed to optimize the reduction factor and diffusion weighting time to achieve maximum SNR. Arguments for the selection of the experimental parameters are then presented considering the compromise between SNR, B(0)-induced distortions, T(2)* blurring effects and tissue incoherent motion effects. On the basis of the selected parameters in a high-resolution skeletal muscle single-shot DW-EPI protocol, imaging protocols at lower acquisition matrix sizes are defined with matched bandwidth in the phase-encoding direction and SNR. In  vivo results show that high-resolution skeletal muscle DTI with minimized sensitivity to geometric distortions and T(2)* blurring is feasible using the proposed methodology. In particular, a significant benefit is demonstrated from a reduction in partial volume effects for resolving multi-pennate muscles and muscles with small cross-sections in calf muscle DTI. Copyright © 2011 John Wiley & Sons, Ltd.

  8. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  9. 21st Century Cyber Security: Legal Authorities and Requirements

    DTIC Science & Technology

    2012-03-22

    Cyber warfare has risen to the level of strategic effect. Exigent threats in cyberspace are a critical U.S. strategic vulnerability for which U.S...operations cross many sections of United States Code. But, they have not yielded a genuine whole-of-government approach. This SRP argues that cyber warfare has

  10. A meta-analysis of sex differences in cyber-bullying behavior: the moderating role of age.

    PubMed

    Barlett, Christopher; Coyne, Sarah M

    2014-01-01

    The current research used meta-analysis to determine whether (a) sex differences emerged in cyber-bullying frequency, (b) if age moderated any sex effect, and (c) if any additional moderators (e.g., publication year and status, country and continent of data collection) influenced the sex effect. Theoretically, if cyber-bullying is considered a form of traditional bullying and aggression, males are likely to cyber-bully more than females. Conversely, if cyber-bullying is considered relational/indirect aggression, females will be slightly more likely to cyber-bully than males. Results from 122 effect size estimates showed that males were slightly more likely to cyber-bully than females; however, age moderated the overall effect. Specifically, females were more likely to report cyber-bullying during early to mid-adolescence than males, while males showed higher levels of cyber-bullying during later adolescence than females. Publication status and year and continent and country of data collection also moderated the overall effect. © 2014 Wiley Periodicals, Inc.

  11. Reducing Pb poisoning in birds and Pb exposure in game meat consumers: the dual benefit of effective Pb shot regulation.

    PubMed

    Mateo, Rafael; Vallverdú-Coll, Núria; López-Antia, Ana; Taggart, Mark A; Martínez-Haro, Monica; Guitart, Raimon; Ortiz-Santaliestra, Manuel E

    2014-02-01

    The use of lead (Pb) ammunition in the form of shot pellets has been identified as a Pb exposure risk in wildlife and their human consumers. We explore the hypothesis that Pb shot ban enforcement reduces the risk of avian Pb poisoning as well as Pb exposure in game meat consumers. We assessed compliance with a partial ban on Pb shot commencing in 2003 by examination of 937 waterbirds harvested by hunters between 2007 and 2012 in the Ebro delta (Spain). Prevalence of Pb shot ingestion was determined, as were Pb concentrations in liver and muscle tissue to evaluate the potential for Pb exposure in game meat consumers. Hunted birds with only embedded Pb shot (no steel) declined from 26.9% in 2007-08 to <2% over the following three hunting seasons after ban reinforcement. Pb shot ingestion in mallards decreased from a pre-ban value of 30.2% to 15.5% in the post-ban period. Liver Pb levels were predominantly defined by the presence of ingested shot, whereas muscle levels were defined by the presence of both ingested and embedded shot. Only 2.5% of mallard muscle tissue had Pb levels above European Union regulations for meat (0.1μg/g wet weight) in the 2008-09 season, when Pb shot ingestion prevalence was also at a minimum (5.1%). Effective restrictions in Pb ammunition use have a dual benefit since this reduces Pb exposure for game meat consumers due to embedded ammunition as well as reducing Pb poisoning in waterbirds. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Cyber-Dependent Crime Victimization: The Same Risk for Everyone?

    PubMed

    Bergmann, Marie Christine; Dreißigacker, Arne; von Skarczinski, Bennet; Wollinger, Gina Rosa

    2018-02-01

    The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors. Our analyses were based on a random sample of 26,665 Internet users in two federal states in Germany, aged 16 years and older; 16.6 percent of the respondents had experienced at least one form of cyber-dependent victimization during the year 2014. The results indicate that individual and household factors, as well as online and prevention behavior, influence the risk of cyber-dependent victimization. Furthermore, the effects differ between the three types of offences. In conclusion, the risk of being victimized by cyber-dependent crime is not the same for anyone, but depends on multivariate factors according to the idea of Routine Activity Approach. However, in view of the fact that crime-related factors also matter, studying different cybercrime offences separately seems to be an appropriate research approach.

  13. SU-E-T-404: Evaluation of the Effect of Spine Hardware for CyberKnife Spinal Stereotactic Radiosurgery

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuan, J; Zhang, Y; Zheng, Y

    2015-06-15

    Purpose: Spine hardware made of high-Z materials such as titanium has the potential to affect the dose distribution around the metal rods in CyberKnife spinal stereotactic radiosurgery (SRS) treatments. The purpose of this work was to evaluate the magnitude of such effect retrospectively for clinical CyberKnife plans. Methods: The dose calculation was performed within the MultiPlan treatment planning system using the ray tracing (RT) and Monte Carlo (MC) method. A custom density model was created by extending the CT-to-Density table to titanium density of 4.5 g/cm3 with the CT number of 4095. To understand the dose perturbation caused by themore » titanium rod, a simple beam setup (7.5 mm IRIS collimator) was used to irradiate a mimic rod (5 mm) with overridden high density. Five patient spinal SRS cases were found chronologically from 2010 to 2015 in our institution. For each case, the hardware was contoured manually. The original plan was re-calculated using both RT and MC methods with and without rod density override without changing clinical beam parameters. Results: The simple beam irradiation shows that there is 10% dose increase at the interface because of electron backscattering and 7% decrease behind the rod because of photon attenuation. For actual clinical plans, the iso-dose lines and DVHs are almost identical (<2%) for calculations with and without density override for both RT and MC methods. However, there is a difference of more than 10% for D90 between RT and MC method. Conclusion: Although the dose perturbation around the metal rods can be as large as 10% for a single beam irradiation, for clinical treatments with complex beam composition the effect of spinal hardware to the PTV and spinal dose is minimal. As such, the MC dose algorithm without rod density override for CyberKnife spinal SRS is acceptable.« less

  14. Study on Plastic Deformation Characteristics of Shot Peening of Ni-Based Superalloy GH4079

    NASA Astrophysics Data System (ADS)

    Zhong, L. Q.; Liang, Y. L.; Hu, H.

    2017-09-01

    In this paper, the X-ray stress diffractometer, surface roughness tester, field emission scanning electron microscope(SEM), dynamic ultra-small microhardness tester were used to measure the surface residual stress and roughness, topography and surface hardness changes of GH4079 superalloy, which was processed by metallographic grinding, turning, metallographic grinding +shot peening and turning + shot peening. Analysized the effects of shot peening parameters on shot peening plastic deformation features; and the effects of the surface state before shot peening on shot peening plastic deformation characteristics. Results show that: the surface residual compressive stress, surface roughness and surface hardness of GH4079 superalloy were increased by shot peening, in addition, the increment of the surface residual compressive stress, surface roughness and surface hardness induced by shot peening increased with increasing shot peening intensity, shot peening time, shot peening pressure and shot hardness, but harden layer depth was not affected considerably. The more plastic deformation degree of before shot peening surface state, the less increment of the surface residual compressive stress, surface roughness and surface hardness induced by shot peening.

  15. Kuipers works with DSC Hardware in the U.S. Laboratory

    NASA Image and Video Library

    2012-01-16

    ISS030-E-155917 (16 Jan. 2012) --- European Space Agency astronaut Andre Kuipers, Expedition 30 flight engineer, prepares to place Diffusion Soret Coefficient (DSC) hardware in stowage containers in the Destiny laboratory of the International Space Station.

  16. Ammonia Offgassing from SA9T

    NASA Technical Reports Server (NTRS)

    Monje, Oscar; Nolek, Sara D.; Wheeler, Raymond M.

    2011-01-01

    NH3 is a degradation product of SA9T, a solid-amine sorbent developed by Hamilton Sundstrand, that is continually emitted into the gas stream being conditioned by this sorbent. NH3 offgassing rates were measured using FTIR spectroscopy using a packed bed at similar contact times as offgassing tests conducted at Hamilton Sundstrand and at the Ames Research Center. The bed was challenged with moist air at several flow rates and humidities and NH3 concentration of the effluent was measured for several hours. The NH3 offgassing rates in open-loop testing were calculated from the steady state outlet NH3 concentration and flow rate. NH3 offgassing rates from SA9T were found to be influenced by the contact time with the adsorbent (flow rate) and by the humidity of the inlet gas stream, which are consistent with previous studies. Closed-loop vacuum-swing adsorption cycling rates verified that NH3 offgassing continues when a constant source of water vapor is present.

  17. Sharing the Cyber Journey

    DTIC Science & Technology

    2012-01-01

    destroy information; disrupt networks or communications; or deny service. In military terms, cyberspace is a contested environment. Hactivists, cyber ... criminals , terrorists, and adversarial nations are active in cyberspace networks across the globe; our military networks are no excep­ tion. DoD

  18. Hurtful Cyber-Teasing and Violence: Who's Laughing out Loud?

    ERIC Educational Resources Information Center

    Madlock, Paul E.; Westerman, David

    2011-01-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed…

  19. Cyber physical systems role in manufacturing technologies

    NASA Astrophysics Data System (ADS)

    Al-Ali, A. R.; Gupta, Ragini; Nabulsi, Ahmad Al

    2018-04-01

    Empowered by the recent development in single System-on-Chip, Internet of Things, and cloud computing technologies, cyber physical systems are evolving as a major controller during and post the manufacturing products process. In additional to their real physical space, cyber products nowadays have a virtual space. A product virtual space is a digital twin that is attached to it to enable manufacturers and their clients to better manufacture, monitor, maintain and operate it throughout its life time cycles, i.e. from the product manufacturing date, through operation and to the end of its lifespan. Each product is equipped with a tiny microcontroller that has a unique identification number, access code and WiFi conductivity to access it anytime and anywhere during its life cycle. This paper presents the cyber physical systems architecture and its role in manufacturing. Also, it highlights the role of Internet of Things and cloud computing in industrial manufacturing and factory automation.

  20. Allergy Shots (For Parents)

    MedlinePlus

    ... relief from symptoms. If your doctor recommends allergen immunology, your child might begin receiving shots containing very ... website of the American Academy of Allergy, Asthma Immunology, www.aaaai.org, has a listing of allergists ...